Font Size: a A A

Design Of Ownership Transfer Protocol For IoT Tags Based On Supply Chains

Posted on:2017-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2349330488989193Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
In the supply chain production and distribution, the owner will often change, the owner of the product on the RFID label will change, and the conversion of this ownership is likely to cause the owner's security privacy threats. Therefore, it is an important aspect of the research on the RFID tag ownership transfer mechanism to ensure the security of the tag information and protect the security of the label owner.At different stages of the supply chain, the security requirement is different, which requires that the security authentication scheme corresponding to the supply chain environment should be adopted at all stages. In the production stage, the scheme pays great attention to the protection of information security, and in the sales phase, not only to ensure this, but also to pay attention to the sharing of information.According to the characteristics of the products in the production and distribution of the supply chain environment, according to a new authentication protocol based on pseudo ID and a new mutual authentication protocol based on asymmetric keys and Hash function, this paper proposes a kind of ownership transfer scheme which can be applied to different stages of supply chain.In the production stage, the product was in a closed system. In order to guarantee the label and the product was not being tracked,a new authentication protocol based on pseudo ID was adopted; In the sale stage, in order to share products and related information of the Internet environment, a new mutual authentication protocol based on asymmetric keys and Hash function was adopted. The scheme proposed in this paper consists of the property transfer scheme based on pseudo ID security authentication scheme; the property rights transfer scheme based on the pseudo ID security authentication method and the RFID bidirectional authentication protocol based on asymmetric keys and Hash function;the transfer scheme based on the asymmetric keys and the Hash function of RFID.According to the requirements of the business, the former owner of one party put forward and completed the transformation of ownership.In addition, this paper also designs the ownership transfer interface information.In the end, the paper proves the security of ownership transfer scheme by using BAN logic.
Keywords/Search Tags:ownership transfer, Radio Frequency Identification(RFID), supply chains, Internet of Things(IoT), BAN logic
PDF Full Text Request
Related items