Design and analysis of a new RFID Security Protocol for Internet of things

被引:0
|
作者
Liu, Zixuan [1 ]
Yu, Jie [1 ]
机构
[1] North China Elect Power Univ, Beijing, Peoples R China
关键词
New; Internet of things; RFID Security Protocol;
D O I
10.1109/ISCTT51595.2020.00010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core of the third information revolution, the Internet of things plays an important role in the development of the times. According to the relevant investigation and research, we can find that the research on the Internet of things is still in the stage of LAN and private network, and its open advantages have not been fully utilized[1]. In this context, RFID technology as the core technology of the Internet of things, the security protocol plays an important role in the normal use of the technology. With the continuous development of Internet information technology, the disadvantages of security protocol become more and more obvious. These problems seriously affect the popularity of Internet of things technology. Therefore, in the future work, the relevant staff need to continue to strengthen research, according to the future development plan, effectively play the advantages of technology, and further promote its development.
引用
收藏
页码:16 / 18
页数:3
相关论文
共 50 条
  • [1] Scalable RFID security framework and protocol supporting Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    [J]. COMPUTER NETWORKS, 2014, 67 : 89 - 103
  • [2] Lightweight Security Protocol for Chipless RFID in Internet of Things (IoT) Applications
    Sharma, Vijay
    Vithalkar, Amogh
    Hashmi, Mohammad
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 468 - 471
  • [3] Analysis and Design of Security in Internet of Things
    Tian, Cuihua
    Chen, Xuhui
    Guo, Di
    Sun, Jinhua
    Liu, Ling
    Hong, Jiangshui
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 678 - 684
  • [4] Security Analysis of the Constrained Application Protocol in the Internet of Things
    Alghamdi, Thamer A.
    Lasebae, Aboubaker
    Aiash, Mahdi
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT 2013), 2013, : 163 - 168
  • [5] RFID Security Certification based on the Internet of Things
    Zhang, Meng
    Zhao, Zhen-Yu
    Yu, Song-Sen
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 755 - 760
  • [6] A Communication Protocol of RFID Systems in Internet of Things
    Gao, HuiDan
    Guo, YaJun
    Cui, JianQun
    Hao, HengGeng
    Shi, Hui
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 91 - 102
  • [7] Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology
    Yan, Tao
    Wen, Qiaoyan
    [J]. ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 1, 2011, 104 : 143 - 149
  • [8] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    [J]. PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [9] Security for the Internet of Things and the Bluetooth Protocol
    Fagua Arevalo, Rodrigo Alexander
    Salcedo Parra, Octavio Jose
    Sanchez Cespedes, Juan Manuel
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 74 - 79
  • [10] Security Analysis of the MQTT-SN Protocol for the Internet of Things
    Roldan-Gomez, Jose
    Carrillo-Mondejar, Javier
    Castelo Gomez, Juan Manuel
    Ruiz-Villafranca, Sergio
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):