The Security and Application of the RFID-Based Vehicle Security Monitoring and Administration System of the Internet of Things

Article Preview

Abstract:

With the development of the technology and industry of the Internet of Things, the application of the Internet of Things of government and industry has been one important subject for the further development of information construction in China. The paper presents the RFID-based vehicle security monitoring and administration system of the Internet of Things in order to assure the real-time monitoring and security administration in the process of the vehicles going and coming through the gates and the vehicle’s united administration, and designs the security implementation framework of the application of the Internet of Things, and discusses the key technology including super high frequency RFID and boundary security network gateway, and the system and the key technology can broadly apply to the united security monitoring and administration of many vehicles such as buses, cars, trains, and the system of the Internet of Things has been primary implemented and achieved good effects in actual applications.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 457-458)

Pages:

1243-1249

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Zhanqing and L. Sujian in: The theory and the application of wireless radio frequency identification technology (RFID). Publishing company of electronic industry (2004).

Google Scholar

[2] T. Philips, T. Karygiannis, R. Kuhn in: Security standards for the RFID market. Security & Privacy Magazine, vol. 3, no. 6, pp.85-89 (2005).

DOI: 10.1109/msp.2005.157

Google Scholar

[3] M.R. Rieback, B. Crispo, A.S. Tanenbaum in: The Evolution of RFID Security. Pervasive Computing, vol. 5, no. 1, pp.62-69 (2006).

DOI: 10.1109/mprv.2006.17

Google Scholar

[4] Zhanqing You in: The Program and Implementation of the RFID. Electronics Industry Press, Beijing (2005).

Google Scholar

[5] Hung-Yu. Chien, Che-Hao. Chen in: Mutual authentication protocol for RFID conforming to EPC Class1 Generation 2 standards. Computer Standards&Interfaces, vol. 29, no. 2, pp.254-259 (2007).

DOI: 10.1016/j.csi.2006.04.004

Google Scholar

[6] Zhongmin Wang in: The EPC and the Internet of Things. Chinese Standard Press, Beijing (2004).

Google Scholar

[7] Renwang Li, Hao Luo, ZhigangBao in: Based on the Internet of Things the Supermarket Chain Management Information System Development and Safety Stock Research. 2010 2nd International Conference on Education Technology and Computer (ICETC).

DOI: 10.1109/icetc.2010.5529363

Google Scholar

[8] Mathias Funk, Piet van der Putten, Henk Corporaal in: Analytics for the Internet of Things. CHI 2009 ~ Spotlight on Works in Progress ~ Session 2, April 4-9, 2009 ~ Boston, MA, USA.

DOI: 10.1145/1520340.1520639

Google Scholar