Advertisement

Analysis and Solution of RFID Tag Information Based on Security Technology

  • Hui MaEmail author
  • Jinglong Mu
  • Yujie Pei
  • Yaqing Hu
  • Chunming Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1075)

Abstract

Along with modern society increasingly intelligent, RFID radio frequency identification (RFID) technology has been widely used in every aspect of life, as the pioneer of the Internet of things technology, from the original military applications to existing commercial applications, its significance will continue to expand with the development of the Internet of things. Its security becomes the another significant challenge. RFID as the core technology of the technology, not only should have the receiver storage target information and label data control function, at the same time, the label data information security protection scheme should be considered . In this paper, wireless intelligent recognition technology of RFID and its information security problem carries on the discussion and analysis, and put forward the corresponding security design scheme, aimed at strengthening the RFID chip most often face problems such as the “bypass attack” a comprehensive understanding, improve transport security of RFID system information consciousness, thus greatly improve the safety.

Keywords

RFID system Security Evidence-based function 

References

  1. 1.
    Zheng, K.J.: Explore the internet’s influence on the life. Wirel. Technol. (2016)Google Scholar
  2. 2.
    Wu, Y.X.: Radio Frequency Identification (RFID) Technology Research Status and Development Prospect of Microcomputer Information (2006)Google Scholar
  3. 3.
    Huang, Y.L.: Based on the RFID electronic tag research progress of the Internet of things. J. Telecommun. Technol. (2013)Google Scholar
  4. 4.
    Song, G.L.: RFID electronic tag chip design. Comput. Knowl. Technol. (2009)Google Scholar
  5. 5.
    Li, B., Jiang, W.Y., Ling, L.: A key value update based RFID security protocol design. Micro Comput. Appl. (2011)Google Scholar
  6. 6.
    Huang, T.: The front end of the non-contact RFID chip design. Huazhong University of Science and Technology (2005)Google Scholar
  7. 7.
    Zheng, D.D.: RFID core technology control to strengthen domestic chip innovation. Semicond. Inf. (2013)Google Scholar
  8. 8.
    Wang, X.M., Zhang, C.H.: Smart tag technology and its application. J. Gold Card Proj. (2004)Google Scholar
  9. 9.
    Li, Q.: A RFID product ESD, EEPROM problem analysis and solving. Fudan University (2011)Google Scholar
  10. 10.
    Zhang, H.Y.: Perception layer of information security research. Comput. Knowl. Technol. (2011)Google Scholar
  11. 11.
    Wan, C.Y., Ouyang, L.: Information confidentiality system research and design in the RFID system. Inf. Secur. Commun. Secur. (2011)Google Scholar
  12. 12.
    Hu, W.: Security technology research and application based on RFID system. Jiangsu University of Science and Technology (2012)Google Scholar
  13. 13.
    Yang, H.D., Klosterman, D.A.: RFID security research. Microcomput. Inf. (2008)Google Scholar
  14. 14.
    Yang, J.: Secure communication and security communication standard EN50159. J. Railway Signal Eng. (2014)Google Scholar
  15. 15.
    Huo, C.S.: Active RFID tags subsystem design and implementation of safety. J. Univ. Electron. Sci. Technol. (2015)Google Scholar
  16. 16.
    Qi, Y., Yao, Q.S., Chen, Y., Zhong, K.: RFID authentication protocol (English). China Commun. (2011)Google Scholar
  17. 17.
    Ding, Z.H., Li, J.T., Feng, B.: Rush to the hash function of RFID security authentication protocol research. J. Comput. Res. Dev. (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hui Ma
    • 1
    Email author
  • Jinglong Mu
    • 1
  • Yujie Pei
    • 1
  • Yaqing Hu
    • 1
  • Chunming Wang
    • 1
  1. 1.Fushun Power Supply BranchState Grid Liaoning Electric Power Supply Co., Ltd.FushunChina

Personalised recommendations