Font Size: a A A

Research On SM2-based Underground Mobile Node Authentication Mechanism

Posted on:2017-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:G L LiFull Text:PDF
GTID:2351330485995623Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
China mines and consumes a lot of coals every year, and the output of coals mainly comes from underground mining. Once the coal mine accident, rescue is particularly important. However, most of the time, the rescue is blind. It neither knows trapped underground identity, nor knows the location of trapped people. It is difficult to promote the rescue work. At the same time, the trapped personnel death risk increases.The safety monitoring technology of underground mine has been a prominent technical problem in coal industry, which needs to be solved. With the development of modern science and technology, the level of coal mining industry always was improved. It greatly improved the workers' working environment. Workers' safety has got more and more attention. Therefore, it is necessary to introduce the management thinking of Internet into the traditional coal mining industry.In the complex environment of the mine, a lot of methods often become invalid such as face recognition, fingerprint recognition. Most biometric-based identification methods no longer have any effect in this particular situation. Therefore, this article uses radio frequency identification(RFID) technology to mark the identity of the underground mine person. The underground mine person carry the material, for exameple, uniforms, helmets and lamp, which are made into the electronic tags. The SM2 algorithm will encrypt its important information, which prevent criminals stealing or faking information.This paper is completed under the project named the mine personnel management system in the Institute of Computing Technology Research Institute.Underground mine authentication is divided into three certification process such ascertification before underground mine, certification in the mine and certification out of the well. Firstly, it says function modules and system components of the mine personnel management system, and mainly focused on the identification of their status under the mine. Secondly, the paper introduces mainly used authentication algorithms and hardware platforms in the system, namely SM2 algorithm and RFID. They together complete identity management and personnel identification. Finally, the paper tests and analysis the system's stability and reliability, then draw conclusions.
Keywords/Search Tags:SM2 algorithm, RFID, mine, personnel authentication system
PDF Full Text Request
Related items