Dissertation > Excellent graduate degree dissertation topics show

Research on Identification Authentication in the Internet of Things Environment

Author: ZhouLiJun
Tutor: ChangDan
School: Beijing Jiaotong University
Course: Information management
Keywords: Internet of Things RFID Sensor networks Authentication
CLC: TN915.08
Type: Master's thesis
Year: 2011
Downloads: 900
Quote: 1
Read: Download Dissertation

Abstract


Abstract: The Internet of Things is the expansion and extension of the functions of the Internet , is the deepening and development of social information . The development of the Internet of Things has deep IT and related professional technical basis , has a strong sense of social needs ; Internet of Things will be widely used in industry, agriculture , health care , environmental protection , disaster prevention and relief , security , aerospace , military fields. Internet of things more widely used in all aspects of its transmission data , the security of the information put forward higher requirements . Authentication is an important problem in the network security , it is the first barrier of the security system , and has a very important role in the Internet of Things . In this paper, a detailed analysis of the the logic layer security needs of Things Internet of Things perception layer two commonly perceived way , RFID systems and wireless sensor networks to conduct an in-depth study focusing consider two ways of Things environment authentication mode , consider the Internet of Things and the distinction of the Internet and its different security issues , for two different perception authentication scheme it based on meet security , to achieve efficient practical, low-cost , easy to implement and other standards. After application of the simulation software OPNET simulation to prove its safety and efficacy of these authentication scheme . The paper presents the authentication model simulation results show that , to achieve their own perception of the way identity authentication and RFID system authentication solutions and wireless sensor networks authentication scheme to achieve the security and functional requirements of the transmission needs our Internet of Things environment , effective authentication scheme .

Related Dissertations

  1. Research on Transparent Security of JPEG Image,TP391.41
  2. Study on RFID Techniques in the Manufacture of Used in Automobile Ignition Coils,TP391.44
  3. Animal products quality safety and security regulation of RFID systems,TS201.6
  4. The Internet of Things Applied Research in Clothing Industry,TN929.5
  5. The Design of Computer Forensics Model Based on Windows Log,D918.2
  6. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  7. Development of Intelligent Interpretation System Based on ARM9,TP391.44
  8. Short-Range Wireless Localization Algorithms for Internet of Things,TN929.5
  9. With the mobile node localization algorithm for wireless sensor networks,TP212.9
  10. F enterprises with RFID data capture products to improve i Research and Application,TP274.2
  11. Study on Legal Issues in Concluding Electronic Commerce Contract,D923
  12. Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
  13. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  14. Based on RFID Prison Intelligent Management System Research and Implementation,TP315
  15. The BW Internet of Things Development Strategy,F49
  16. Study on Framework of Standard System about Logistics Warehouse Based on RFID,F252
  17. The Investigation and Application of RFID Technology Based on Split Ring Resonator,TP391.44
  18. Research and Design of Wireless Localization System Based on ZigBee,TN929.5
  19. The Research of Single Patchand Compact Dual-Band Microstrip RFID Antenna,TN822
  20. Research and Implementation of IOT Service Model Description Language,TN929.5
  21. Design and Development of Accident Management Information System for Large-scale Hydropower Projects,TP311.52

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Communication network > General issues > Network Security
© 2012 www.DissertationTopic.Net  Mobile