Study on security protocol analysis and design technology for RFID system

被引:1
作者
Yang, Pengpeng [1 ,2 ]
Cui, Baojiang [1 ,2 ]
Wang, Ziyue [1 ,2 ]
Liang, Xiaobing [3 ]
Fu, Yilun [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Security, Beijing, Peoples R China
[3] China Elect Power Res Inst, Beijing, Peoples R China
来源
2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2015年
关键词
RFID; LLRP; enhanced secure protocol;
D O I
10.1109/3PGCIC.2015.86
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the gradual rise of Internet of things, its applications gradually integrate into every corner of people's daily lives. RFID (Radio Frequency Identification) is the core of the Internet of things technology, which plays a vital role in the development of the Internet of things. Unfortunately, the security risks of RFID are also accompanied by a growing number of. This paper will focus on the security of LLRP released by EPCglobal and design an enhanced secure protocol of LLRP which is consisted of handshake protocol of authentication and integrity verification of the protocol interaction content. Additionally, the encryption will be added to the communication of the whole LLRP protocol for security. The performance evaluation of the enhanced protocol is carried out in the end.
引用
收藏
页码:416 / 419
页数:4
相关论文
共 19 条
  • [1] Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks
    Cattuto, Ciro
    Van den Broeck, Wouter
    Barrat, Alain
    Colizza, Vittoria
    Pinton, Jean-Francois
    Vespignani, Alessandro
    [J]. PLOS ONE, 2010, 5 (07):
  • [2] EPCglobal, 2010, LOW LEV READ PROT LL
  • [3] RFID applications: Interfacing with readers
    Floerkemeier, Christian
    Fleisch, Elgar
    [J]. IEEE SOFTWARE, 2008, 25 (03) : 67 - 70
  • [4] KANG SS, 2009, NEW TRENDS INF SERV, P815
  • [5] Kheddam R., 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST 2012), P529, DOI 10.1109/ICST.2012.138
  • [6] Kheddam R, 2013, INT CONF SOFTW, P76
  • [7] Landt J, 2005, IEEE POTENTIALS, V24, P8, DOI 10.1109/MP.2005.1549751
  • [8] Mobahat H, 2010, SOFTW TECHN ENG ICST, V2, pV2
  • [9] Accuracy of a radiofrequency identification (RFID) badge system to monitor hand hygiene behavior during routine clinical activities
    Pineles, Lisa L.
    Morgan, Daniel J.
    Limper, Heather M.
    Weber, Stephen G.
    Thom, Kerri A.
    Perencevich, Eli N.
    Harris, Anthony D.
    Landon, Emily
    [J]. AMERICAN JOURNAL OF INFECTION CONTROL, 2014, 42 (02) : 144 - 147
  • [10] Qadir S, 2009, INT J COMPUT SCI NET, V9, P40