【电信学】【2015.05】物联网认证研究

在这里插入图片描述

本文为印度Rourkela国立技术研究院(作者:Mente Sindhu)的硕士论文,共60页。

物联网(IoT)是一种快速发展的技术,在当前无所不在的计算领域日益重要。这一概念背后的主要目的是为我们周围的所有事物提供通信能力,以便这些设备能够以智能方式直接在它们之间进行通信,从而消除了人为干预的需要。这种通信是通过使用RFID标签、传感器等建立的,这些标签、传感器等具有唯一标识的地址,并能够相互通信。物联网的主要问题是提供安全和隐私。在众多用于设备间通信的无线技术中,射频识别技术是最流行和应用最广泛的技术,在尺寸、重量、能耗等方面的各种优势导致了该技术的流行。因此,本文主要研究RFID及其安全问题。射频识别是一种无线通信技术,很容易受到敌人的攻击和入侵。因此,我们必须开发强大的认证算法,以提供最大的安全性,使这项技术可以用于物联网的实现。但问题是,就内存和计算能力而言,RFID标签包含的标签资源非常少,开发使用最少标记资源和提供最大安全性的身份验证协议是非常困难的。因此,我们的目标是开发轻量级身份验证协议,该协议使用诸如XOR、Rot等更简单的操作,这些操作旨在消耗很少的标记资源,提供最大的安全性。

Internet of Things (IoT) is a rapidly growing technology that is gaining importance in the area of ubiquitous computing. The main aim behind this concept is to provide communication capabilities to all the things present around us, so that these devices can communicate directly among themselves in an intelligent manner eliminating the need for human intervention. This communication is established by the use of RFID tags, sensors etc., which are provided with addresses to be uniquely identified and to communicate with each other. The main problem with IoT is providing security and privacy. Among many wireless technologies used for communication among devices, RFID technology is the most popular and widely used. Various factors like reduction in terms of size, weight, energy consumption lead to its popularity. So, in this thesis we mainly concentrate on RFID and its security problems. Since, RFID is a wireless communication technology; it is very easily prone to attacks and intrusions from the adversaries. So, we have to develop strong authentication algorithms which provide maximum security so that this technology can be used for the implementation of Internet of Things. But, the problem is that, RFID tags consist of very low tag resources in terms of memory and computational capabilities. It is very difficult to develop authentication protocols that consume minimum tag resources and provide maximum security. So, our goal is to develop lightweight authentication protocols which use simpler operations like XOR, Rot etc. which consumes very few tag resources and aims to provide maximum security.

1 引言

2 文献综述

3 本文进行的研究工作

4 仿真与结果验证

5 结论

下载英文原文地址:

http://page2.dfpan.com/fs/fl8c2j726231e269169/

更多精彩文章请关注微信号:在这里插入图片描述

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值