首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
杨新爱  段富 《计算机应用研究》2020,37(3):876-879,883
在分析EPCglobal UHF class1 generation2和基于DFSA协议的高速标签识别算法的基础上,采用位隙FSA协议标签响应标志位隙的设置方法,通过在标签上设置一个组位隙响应标志字,提出了一种EPC Gen2 标准下的RFID标签分组多位隙并行识别协议GMBPIP,设计了一条新的分组查询命令和基于DFSA的多组标签并行识别协议流程,从理论上了分析GMBPIP协议的性能,并使用EPC Gen2 标准协议时间参数进行了仿真实验。结果表明,GMBPIP协议在不增加标签太多计算负担的情况下,能够在EPC Gen2标准下有效降低时隙空闲率和冲突率,提高了标签的识别率、时隙利用率;平均识别率不仅突破了帧时隙ALOHA协议最高36.8%的瓶颈,而且高于目前文献所述同类算法的性能指标,达到了70.95%~81.61%。GMBPIP可以作为低成本RFID系统高速识别大量被动标签的支撑协议。  相似文献   

2.
近几年,由于EPC C1G2 RFID标准的低安全级别,轻量级的RFID认证协议被广泛研究。提出了一种改进型的符合Gen2标准的认证方案MKAP。仅运用异域运算、标签的访问密码和杀死密码来提高现用RFID Gen2标签对许多威胁的安全性。通过全面的安全性分析,证实该改进方案比现有方案,有了显著的提升。  相似文献   

3.
In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We present two security schemes that are suitable for both fixed reader and mobile/wireless reader environments, the mutual authentication and the collaborative authentication schemes respectively. Both schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are used. Detailed security analysis of both our schemes show that they offer robust security properties in terms of tag anonymity, tag untraceability and reader privacy while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the schemes and its impact on authentication delay. In addition, Yeh et al. (2010) [20] proposed a security scheme for EPC Class-1 Gen-2 based mobile/wireless RFID systems. We show that this scheme has a security vulnerability and is not suitable for mobile/wireless RFID systems.  相似文献   

4.
基于PRNG的低成本RFID认证协议设计   总被引:1,自引:0,他引:1       下载免费PDF全文
低成本无线射频识别(RFID)的标签是被动式的,由于受成本和资源限制,系统不能提供公约加密、对称密钥加密、杂凑函数等。EPCglobal Class-1 Gen-2 RFID规范定义一种低成本的标签,仅提供PRNG和CRC操作。该文遵循EPCglobal Class-1 Gen-2 RFID规范,仅使用PRNG操作设计一个认证协议,实现双向认证、标签的匿名性和前向安全性。  相似文献   

5.
WSN集成EPCglobal:环境感知的供应链监管   总被引:1,自引:0,他引:1  
彭磊  袁海  吴磊  曾家智 《计算机应用》2008,28(6):1616-1619
随着目前全球供应链管理网络体系(EPCglobal)的日趋成熟,供应链的管理已经不再局限于一个企业内部,开放式、多角色参与的供应链管理模式正在形成。通过物品上的EPC标识和一个分布式的信息系统,EPCglobal为流通物品创建了一条信息链,可追溯至此物品的供应链源头。从供应链管理的本质与发展趋势看,与真实环境的交互能力越强,交互数据越实时,越能更好地对供应链的实施全程监管。提出一个将WSN与EPCglobal的集成方案,无缝地绑定物品EPC标识和环境感知信息,可大大增强EPCglobal对生产和仓储过程的信息获取和处理能力,并提供统一接口供用户访问。WSN与EPCglobal的集成不仅是技术意义上的异种网络集成,更是对供应链信息化管理层面的一种拓宽和深化。  相似文献   

6.
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader.  相似文献   

7.
读写器和标签组成的射频识别系统(RFID)可以用于湿度测量.本文通过理论分析,数值仿真以及实验测试给出了可用于湿度传感器的EPC Gen2电子标签的特性.分析结果表明,当湿度变化时,标签天线和标签之间的阻抗匹配系数单调变化的标签才可用做湿度传感器.在空气中,标签天线和标签芯片完全匹配的标签可以用于湿度测量.本文还在实验...  相似文献   

8.
为了减少射频识别系统多个标签防碰撞过程中所消耗的动态功耗,通过对RFID领域超高频频段EPCglobal Class-1Gen-2标准中的标签识别层所采用的防碰撞技术及相关指令的分析,在其基础上对Q算法提出改进方案。该方案使用稳定缓变的帧长度来适应现场标签数量,使帧长度保持在最优值,减小标签内部门电路翻转频率,从而降低了标签防碰撞过程中总动态功耗81.8%。仿真实验结果表明,改进后的Q算法帧长度调整频率低于改进前的Q算法帧长度调整频率。  相似文献   

9.
Radio frequency identification (RFID) provides a non-line-of-sight (NLOS) and contactless approach for object identification. But if there are multiple tags in the range of an RFID reader, tag collision can take place due to radio signal interference and therefore an anti-collision algorithm is required to resolve collisions. Recently, EPCglobal RFID generation-2 (Gen-2) protocol [EPCglobal Specification, EPCTM radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz, version 1.0.9, January 2005. Available from: <http://www.epcglobalinc.org>] is proposed for ultra-high frequency (UHF) passive tags and is being deployed. Gen-2 designs a slotted random anti-collision algorithm, especially, an adaptive slot-counter (Q) selection algorithm. The integer-valued parameter Q in Gen-2 plays a critical role in tag collision resolution. This adaptive algorithm dynamically adjusts the value of Q based on the type of replies from tags. In this paper, we propose an optimal Q algorithm that determines the optimal values of Q according to the number of remaining tags and in turn to optimize tag identification speed (TIS) and query success rate (QSR), respectively. It’s been demonstrated through extensive simulations that the proposed algorithm achieves higher TIS than Gen-2 adaptive Q algorithm.  相似文献   

10.
Recently, Chien et al. proposed an RFID authentication protocol, which consists of only the cyclic redundancy code (CRC) and the pseudo-random number generator (PRNG) [H. Chien, C. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces, vol. 29, Elsevier, 2007, pp. 254–259]. They claimed that the protocol conforms to current EPC tags, and would be secure against all attacks on RFID systems. However, in this paper, we show that the protocol is not secure; firstly an attacker can impersonate a valid tag temporarily by a single eavesdropping. Secondly the attacker can forge a tag permanently by eavesdropping two consecutive sessions. Finally he can make a valid tag useless (DoS attack) by modifying the second attack slightly. The computational complexities of the attacks are so practicable that Chien et al.'s protocol cannot enhance the RFID security any more than the original EPC standard.  相似文献   

11.
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by EPCglobal and ISO. This standard can be considered as a “universal” specification for low-cost RFID tags. Although it represents a great advance for the consolidation of RFID technology, it does not pay due attention to security and, as expected, its security level is very low. In 2007, Chien et al. published a mutual authentication protocol conforming to EPC-C1G2 which tried to correct all its security shortcomings. In this article, we point out various major security flaws in Chien et al.'s proposal. We show that none of the authentication protocol objectives are met. Unequivocal identification of tagged items is not guaranteed because of possible birthday attacks. Furthermore, an attacker can impersonate not only legitimate tags, but also the back-end database. The protocol does not provide forward security either. Location privacy is easily jeopardized by a straightforward tracking attack. Finally, we show how a successful auto-desynchronization (DoS attack) can be accomplished in the back-end database despite the security measures taken against it.  相似文献   

12.
跳跃式动态树形反碰撞算法及其分析   总被引:21,自引:4,他引:17  
射频识别(RFID)中阅读器识别大量标签时,常存在效率较低的情况.该算法根据碰撞时的特点,跳跃式前后搜寻,识别N个标签,共需要问询2N-1次.用数学归纳法进行了证明.另外,阅读器问询时,所传输的EPC参数采用不定长方式动态进行,信息吞吐量可进一步提高,算法模拟结果表明提高幅度为34.92%.  相似文献   

13.
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags transmit their IDs simultaneously, the tag-to-reader signals collide and this collision disturbs a reader's identification process. Therefore, tag collision arbitration for passive tags is a significant issue for fast identification. This paper presents two adaptive tag anticollision protocols: an Adaptive Query Splitting protocol (AQS), which is an improvement on the query tree protocol, and an Adaptive Binary Splitting protocol (ABS), which is based on the binary tree protocol and is a de facto standard for RFID anticollision protocols. To reduce collisions and identify tags efficiently, adaptive tag anticollision protocols use information obtained from the last process of tag identification. Our performance evaluation shows that AQS and ABS outperform other tree-based tag anticollision protocols.  相似文献   

14.
Cover4     
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags transmit their IDs simultaneously, the tag-to-reader signals collide and this collision disturbs a reader's identification process. Therefore, tag collision arbitration for passive tags is a significant issue for fast identification. This paper presents two adaptive tag anticollision protocols: an adaptive query splitting protocol (AQS), which is an improvement on the query tree protocol, and an adaptive binary splitting protocol (ABS), which is based on the binary tree protocol and is a de facto standard for RFID anticollision protocols. To reduce collisions and identify tags efficiently, adaptive tag anticollision protocols use information obtained from the last process of tag identification. Our performance evaluation shows that AQS and ABS outperform other tree-based tag anticollision protocols  相似文献   

15.
针对目前RFID系统的认证协议都是在事先设置好的共享密钥值基础上的,敌手可以通过一些手段获取密钥而对后续的认证造成安全威胁,提出了一种基于EPC编码标签的RFID系统密钥无线生成协议。将部分EPC加密进行通信,防止秘密信息泄露;引入标签与阅读器的安全模型,提高通信的安全性;阅读器随机数保持通信过程的新鲜性;仅采用异或运算降低标签成本与计算量。通过GNY逻辑对协议进行形式化证明,安全分析和性能分析表明,该协议符合安全模型并能够抵抗主动攻击和被动攻击,具有安全性高、低成本的特点。  相似文献   

16.
Recently, there have been a considerable amount of works for privacy-preserving RFID tags. However, most existing schemes have a common, inherent problem in the fact that in order to identify only one single tag they require a linear computational complexity on the system side. This problem makes use of the schemes impractical in large-scale RFID deployments. We propose a new scheme for privacy-preserving RFID tags which combines the classical challenge-response mechanism with the idea of one-time pads in a simple but practical way. Our technique has a number of crucial advantages. It supports mutual authentication between reader and tag. It also supports untraceability with no information leakage. Furthermore, the scheme we present requires only one cryptographic operation to identify one device among N, which is an important benefit in large-scale RFID systems.  相似文献   

17.
由于现在很多射频识别(RFID)认证协议不符合EPC Class 1 Gen 2(EPC Gen2)标准的要求,同时对RFID系统的计算能力要求很高,因此很难在低端标签中实现。针对上述问题,通过分析已有协议的安全性,总结出不安全协议的缺陷,提出了一种新的基于EPC Gen2 标准的RFID认证协议,并采用BAN逻辑对协议进行了安全性证明。通过安全性分析,新协议满足了信息机密性、数据完整性和身份真实性的RFID系统认证协议的安全需求。  相似文献   

18.
An Adaptive Memoryless Protocol for RFID Tag Collision Arbitration   总被引:2,自引:0,他引:2  
A radio frequency identification (RFID) reader recognizes objects through wireless communications with RFID tags. Tag collision arbitration for passive tags is a significant issue for fast tag identification due to communication over a shared wireless channel. This paper presents an adaptive memoryless protocol, which is an improvement on the query tree protocol. Memoryless means that tags need not have additional memory except ID for identification. To reduce collisions and identify tags promptly, we use information obtained from the last process of tag identification at a reader. Our performance evaluation shows that the adaptive memoryless protocol causes fewer collisions and takes shorter delay for recognizing all tags while preserving lower communication overhead than other tree based tag anticollision protocols.  相似文献   

19.
传统电力工器具RFID电力标签在强电磁干扰环境下无法正常工作,容易导致标签损坏和信息泄露。针对上述问题,本文设计一种抗电磁干扰的RFID电力标签。该RFID电力标签外壳使用抗干扰材料和高绝缘耐压的封装,标签内部使用STM32L4微控制器,并且提出基于卡尔曼滤波的双阶段滤波算法,数据传输使用超高频,从而达到良好的抗电磁干扰和抗噪效果。另外,标签与读写器之间的通信采用基于器件物理特性指纹的物理不可克隆函数进行加密。最后通过实验验证本文设计的RFID标签不仅能够抵抗强电磁干扰,而且能够防止信息泄露,可以很好地应用于复杂电力环境中。  相似文献   

20.
Passive RFID systems with several reader stations densely allocated close to each other are susceptible to reader collision problems. They are characterized by reader-to-tag and reader-to-reader interferences. Both degrade the system performance, decreasing the number of tags identified per time unit. Although some proposals have been suggested to avoid/handle these collisions, most of them require extra hardware, do not make an efficient use of the network resources and are not compatible with the current standards and regulations. This paper proposes a centralized and aligned scheduler that optimizes the distribution of network resources (frequencies and time slots) among the readers in the network. Those readers with unidentified tags in their target region will have higher priority for receiving resources. The optimization problem is formulated as a Mixture Integer Programming problem. Results show that the method proposed provides higher network throughput and fairness than the EPCglobal Class-1 Gen-2 standard for dense reader environments. In addition, unlike previous works, the scheduling algorithm presented is compatible with EPCglobal standard and the European regulation, and can be implemented in real RFID systems with fixed and mobile readers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号