The Research of RFID Identity Authentication Technology Based on 802.1 x

被引:0
|
作者
Fang, Ying [1 ]
机构
[1] Hubei Univ Technol, Coll Sci, Wuhan, Peoples R China
来源
关键词
IOT; 802.1x; RFID; Identity Authentications;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development and application of IOT (the Internet of Things), our lives are becoming more and more convenient, but there are also challenges against information safety. As one of the key technologies of IOT, the foundation of RFID application is identity authentication technology. This paper introduces the 802.1 x's principle and advantages, and designed a kind of RFID identity authentications based on 802.1 x.
引用
收藏
页码:490 / 494
页数:5
相关论文
共 50 条
  • [1] Research of AAA messages Based on 802.1x Authentication
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    Ma, Jun
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 618 - 621
  • [2] AAA Based on 802.1x Authentication
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    Ma, Jun
    PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 527 - 530
  • [3] An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol
    Chen, Han-Ying
    Liu, Xiao-Li
    FUZZY SYSTEMS AND DATA MINING II, 2016, 293 : 407 - 413
  • [4] Research on the 802.1x Authentication Mechanism and Existing Defects
    Wang, Xingong
    ADVANCED MECHANICAL ENGINEERING II, 2012, 192 : 385 - 389
  • [5] Research on Authentication Technology of Agriculture Products Traceability System Based on RFID
    Wang, Bin
    Zhang, Jian
    Sun, Xiaohua
    Wang, Na
    Zhao, Yan
    Wang, Fushun
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 1357 - 1362
  • [6] Research on identity authentication system of Internet of Things based on blockchain technology
    Liu, Yanhui
    Zhang, Jianbiao
    Pathan, Muhammad Salman
    Yuan, Yijian
    Zhang, Puzhe
    Maroc, Sarah
    Nag, Avishek
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10365 - 10377
  • [7] Research and practice about the identity authentication technology
    Yun Xia Fu
    Proceedings of the 2016 3rd International Conference on Mechatronics and Information Technology (ICMIT), 2016, 49 : 367 - 370
  • [8] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
  • [9] Design in the Authentication and Billing System Based on Radius and 802.1x Protocol
    Chen, Chaoyi
    Zhang, Jianyong
    Liu, Junli
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1438 - 1443
  • [10] Bulid campus network authentication system based on centralized 802.1x
    Liu, Bin, 1600, Editorial Board of Journal on Communications (35):