Utilization and evaluation of an IoT application service using mobile RFID technology

سال انتشار: 1403
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 98

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICRSIE09_323

تاریخ نمایه سازی: 12 اسفند 1403

چکیده مقاله:

RFID is a wireless communication technology using an electromagnetic field and is one of the main technologies in the application of the Internet of Things as a technology to obtain information without physical contact with the desired device. To provide an IoT service, location information and object identification information must be automatically exchanged over the Internet. RFID is one of the technologies that can effectively transmit information to identify and manage objects using the electromagnetic properties of radio frequency. Most mobile RFID systems consist of transmitters or tags, readers or interrogators, and supporting host systems. Many studies have been done to secure the security of the wireless channel between the reader and the tag. However, the RFID tag uses a hash-based XOR function in communication to enable simple and cost-effective security control. This is because most RFID tags are passive and resources for processing are limited. Also, in providing mobile RFID service, a mobile device with RFID reader function can access the tags and retrieve information, so that the security of a wireless signal channel in the RFID part cannot guarantee the stability of the service. This research aims to provide an optimal model to improve the security of RFID-based Internet of Things authentication protocols in important applications such as medicine, and a plan was also presented in the third chapter. In applications such as medicine, it is necessary for the desired design to have high security. On the other hand, according to different conditions in treatment such as emergency, it is necessary to be able to find the equipment and the place where they are at a high speed, so that these devices can be quickly used for the treatment of patients. The equipment is necessary and also the way to connect to them is one of the next requirements and as a result the security of such systems as well as their high performance are among the main parameters in presenting any plan and method which in this article is also a plan based on RFID for applications The Internet of Things was presented. According to the results of the simulations and analysis, the presented method has less computational load than the previous methods, the security of the proposed method was investigated and the results showed that the proposed algorithm is resistant to single anonymity and its identification. It has acceptable security against tag tracking attacks, mutual authentication, resistance to replay attacks, and resistance to synchronization. The proposed method showed that it is possible to reduce the computational load and increase the performance of the system by providing solutions in reading, tags, etc.

نویسندگان

Farshad Khalafian

Department of Electrical Engineering, Ahvaz Branch, Islamic Azad University, Ahvaz, Iran