Study on security protocol analysis and design technology for RFID system

被引:1
|
作者
Yang, Pengpeng [1 ,2 ]
Cui, Baojiang [1 ,2 ]
Wang, Ziyue [1 ,2 ]
Liang, Xiaobing [3 ]
Fu, Yilun [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Security, Beijing, Peoples R China
[3] China Elect Power Res Inst, Beijing, Peoples R China
关键词
RFID; LLRP; enhanced secure protocol;
D O I
10.1109/3PGCIC.2015.86
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the gradual rise of Internet of things, its applications gradually integrate into every corner of people's daily lives. RFID (Radio Frequency Identification) is the core of the Internet of things technology, which plays a vital role in the development of the Internet of things. Unfortunately, the security risks of RFID are also accompanied by a growing number of. This paper will focus on the security of LLRP released by EPCglobal and design an enhanced secure protocol of LLRP which is consisted of handshake protocol of authentication and integrity verification of the protocol interaction content. Additionally, the encryption will be added to the communication of the whole LLRP protocol for security. The performance evaluation of the enhanced protocol is carried out in the end.
引用
收藏
页码:416 / 419
页数:4
相关论文
共 50 条
  • [1] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [2] Design and analysis of a new RFID Security Protocol for Internet of things
    Liu, Zixuan
    Yu, Jie
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, : 16 - 18
  • [3] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [4] Experimental analysis of an RFID security protocol
    Luo, Zongwei
    Chan, Terry
    Li, Jenny S.
    Wong, Edward
    Cheung, William
    Ng, Victor
    Fok, Wilton
    [J]. ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 62 - +
  • [5] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [6] Design of a Building Security System in a University Campus using RFID Technology
    Huerta, M.
    Ferreira, J.
    Rodriguez, L.
    Clotet, R.
    Gonzalez, R.
    Rivas, D.
    [J]. 2017 IEEE 37TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXVII), 2017,
  • [7] A High Security RFID System Authentication Protocol Design Base on Cloud Computer
    Hong Sun
    Cheng Su
    Shi-ping Chen
    [J]. Wireless Personal Communications, 2018, 102 : 1255 - 1267
  • [8] A High Security RFID System Authentication Protocol Design Base on Cloud Computer
    Sun, Hong
    Su, Cheng
    Chen, Shi-ping
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) : 1255 - 1267
  • [9] Design and Analysis of Security Protocol for RFID without Back-End Database
    Hao Yong-sheng
    Ren Shao-jie
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1479 - 1484
  • [10] Security analysis of an RFID tag search protocol
    Jannati, Hoda
    Bahrak, Behnam
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (10) : 618 - 622