Design and analysis of a new RFID Security Protocol for Internet of things

被引:0
|
作者
Liu, Zixuan [1 ]
Yu, Jie [1 ]
机构
[1] North China Elect Power Univ, Beijing, Peoples R China
关键词
New; Internet of things; RFID Security Protocol;
D O I
10.1109/ISCTT51595.2020.00010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core of the third information revolution, the Internet of things plays an important role in the development of the times. According to the relevant investigation and research, we can find that the research on the Internet of things is still in the stage of LAN and private network, and its open advantages have not been fully utilized[1]. In this context, RFID technology as the core technology of the Internet of things, the security protocol plays an important role in the normal use of the technology. With the continuous development of Internet information technology, the disadvantages of security protocol become more and more obvious. These problems seriously affect the popularity of Internet of things technology. Therefore, in the future work, the relevant staff need to continue to strengthen research, according to the future development plan, effectively play the advantages of technology, and further promote its development.
引用
收藏
页码:16 / 18
页数:3
相关论文
共 50 条
  • [21] On the Design of Security Mechanisms for the Internet of Things
    Pal, Shantanu
    Hitchens, Michael
    Varadharajan, Vijay
    [J]. 2017 ELEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2017, : 286 - 291
  • [22] Delivering Security by Design in the Internet of Things
    Curtis, Bill
    [J]. 2014 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2014,
  • [23] Study on security protocol analysis and design technology for RFID system
    Yang, Pengpeng
    Cui, Baojiang
    Wang, Ziyue
    Liang, Xiaobing
    Fu, Yilun
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 416 - 419
  • [24] Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
    Alexandrov, V. A.
    Desnitsky, V. A.
    Chaly, D. Y.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (07) : 851 - 856
  • [25] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [26] Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
    V. A. Alexandrov
    V. A. Desnitsky
    D. Y. Chaly
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 851 - 856
  • [27] Protocol Design and Analysis for Cellular Internet of Things with Massive Access
    Shao, Xiaodan
    Chen, Xiaoming
    Zhong, Caijun
    Zhao, Junhui
    Zhang, Zhaoyang
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [28] Design and Implementation on A Things Management Protocol for Internet of Things
    Dai Guiping
    [J]. 2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 7361 - 7364
  • [29] Strong Security and Privacy of RFID System for Internet of Things Infrastructure
    Das, Manik Lal
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 56 - 69
  • [30] A Security and Privacy Model for Mobile RFID Systems in the Internet of Things
    Zhu, Weiling
    Yu, Jianping
    Wang, Ting
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 726 - 732