Design and analysis of a new RFID Security Protocol for Internet of things

被引:0
|
作者
Liu, Zixuan [1 ]
Yu, Jie [1 ]
机构
[1] North China Elect Power Univ, Beijing, Peoples R China
关键词
New; Internet of things; RFID Security Protocol;
D O I
10.1109/ISCTT51595.2020.00010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core of the third information revolution, the Internet of things plays an important role in the development of the times. According to the relevant investigation and research, we can find that the research on the Internet of things is still in the stage of LAN and private network, and its open advantages have not been fully utilized[1]. In this context, RFID technology as the core technology of the Internet of things, the security protocol plays an important role in the normal use of the technology. With the continuous development of Internet information technology, the disadvantages of security protocol become more and more obvious. These problems seriously affect the popularity of Internet of things technology. Therefore, in the future work, the relevant staff need to continue to strengthen research, according to the future development plan, effectively play the advantages of technology, and further promote its development.
引用
收藏
页码:16 / 18
页数:3
相关论文
共 50 条
  • [41] Hardware Design of UHF RFID reader for the Internet of Things
    Zhang, Lei
    Jin, Libiao
    Liu, Jianbo
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2204 - 2207
  • [42] Experimental analysis of an RFID security protocol
    Luo, Zongwei
    Chan, Terry
    Li, Jenny S.
    Wong, Edward
    Cheung, William
    Ng, Victor
    Fok, Wilton
    [J]. ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 62 - +
  • [43] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [44] Analysis of the Security of Internet of Multimedia Things
    Lv, Zhihan
    Qiao, Liang
    Song, Houbing
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [45] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [46] Design challenges and security issues in the Internet of Things
    Basu, Subho Shankar
    Tripathy, Somanath
    Chowdhury, Atanu Roy
    [J]. 2015 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2015, : 90 - 93
  • [47] Mobile RFID in Internet of Things: Security Attacks, Privacy Risks, and Countermeasures
    Khan, Wazir Zada
    Zangoti, Hussein Mohammed
    Aalsalem, Mohammed Y.
    Zahid, Muhammad
    Arshad, Quratulain
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2016, : 36 - 41
  • [48] Security of RFID Based Internet of Things Applications: Requirements and Open Issues
    Chamekh, Marwa
    Hamdi, Mohamed
    El Asmi, Sadok
    Kim, Tai-Hoon
    [J]. 2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 699 - 703
  • [49] RFID BASED SECURITY PLATFORM FOR INTERNET OF THINGS IN HEALTH CARE ENVIRONMENT
    Jisha, S.
    Philip, Mintu
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [50] Chaos encryption algorithm to deal with security threat to internet of things RFID
    Xiaoyong, Tian
    [J]. Journal of Networks, 2013, 8 (05) : 1168 - 1174