首页 | 本学科首页   官方微博 | 高级检索  
     

基于对数谱射频指纹识别的RFID系统信息监控方法
引用本文:袁红林,包志华. 基于对数谱射频指纹识别的RFID系统信息监控方法[J]. 通信学报, 2014, 35(7): 11-93. DOI: 10.3969/j.issn.1000-436x.2014.07.011
作者姓名:袁红林  包志华
作者单位:1. 南通大学 电子信息学院,江苏 南通 226019;2. 南通大学 计算机科学与技术学院,江苏 南通 226019
基金项目:国家自然科学基金资助项目(61371111);国家交通运输部科技基金资助项目(2012-319-813-270, 2010-353-332-110);江苏政府留学奖学金基金资助项目(2012)
摘    要:针对常规RFID系统对信息控制的不足,提出了一种基于辐射源识别的无源RFID系统的信息监控方法。采集无源RFID标签的辐射射频信号,变换为新的对数谱射频指纹,并进行特征提取与识别,获得标签身份真伪结果;把射频指纹等集成到读写器应用层协议,实现标签与读写器之间信息的控制。建模、仿真与实验表明,对数谱射频指纹仅由标签的频偏与冲击响应决定,具有稳健性等;给出了融合提出指纹的RFID系统挑战——应答认证协议实例。提出方法不仅能增强标签与读写器的认证安全强度,而且能实现通信中标签的身份监控,对于解决密钥泄漏检测公开问题也有一定贡献。

关 键 词:通信对抗;辐射源识别;RFID;身份识别;对数谱

Information monitor method of RFID system based onlogarithm spectrum RF fingerprint identification
Hong-lin YUAN,Zhi-hua BAO,Yan YAN. Information monitor method of RFID system based onlogarithm spectrum RF fingerprint identification[J]. Journal on Communications, 2014, 35(7): 11-93. DOI: 10.3969/j.issn.1000-436x.2014.07.011
Authors:Hong-lin YUAN  Zhi-hua BAO  Yan YAN
Affiliation:1. School of Electronics and Information,Nantong University, Nantong 226019,China;2. School of Computer Science and Technology,Nantong University,Nantong 226019,China
Abstract:To make up for the shortcomings of the information control in RFID systems, an information monitor method of passive RFID systems based on emitter identification was proposed. The emitted RF signal of the passive RFID tag was acquired and transformed into logarithm spectrum RF fingerprint, the features were extracted and classified, and the authenticity of the tag was obtained, the application layer protocol of the reader was integrated with the RF fingerprint etc., and the control of the information between the tag and reader was achieved. It was demonstrated with modeling, simulation and experiments that the novel fingerprint was solely determined by the frequency offset and impulse response of the tag, and had stability etc., a challenge-response authentication protocol instance of RFID systems integrated with the proposed fingerprint was given. The proposed method can not only enhance the authentication intensity, but also monitor the identity of the tag in the communication, and has certain contribution to solve the open question of the secret key leakage detection.
Keywords:communication countermeasures   emitter identification   RFID   identity recognition   logarithm spectrum
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号