首页 | 本学科首页   官方微博 | 高级检索  
     

基于恶意读写器发现的RFID空口入侵检测技术
引用本文:黄伟庆,丁昶,崔越,王思叶,张艳芳,赵博白,诸邵忆,毛锐,陈超.基于恶意读写器发现的RFID空口入侵检测技术[J].软件学报,2018,29(7):1922-1936.
作者姓名:黄伟庆  丁昶  崔越  王思叶  张艳芳  赵博白  诸邵忆  毛锐  陈超
作者单位:北京交通大学计算机与信息技术学院, 北京 100093;中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,北京交通大学计算机与信息技术学院, 北京 100093;中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093,中国科学院信息工程研究所, 北京 100093;中国科学院大学网络空间安全学院, 北京 100093
基金项目:国家高技术研究发展计划(863)(2013AA014002)
摘    要:随着RFID技术的不断发展,其在物流管理,货物监控,会议安全保障等领域的应用越来越广泛,但随之而来的安全威胁是我们不得不考虑的隐患因素。在无线通信技术中,空中接口定义了终端设备与网络设备之间的电磁连接技术规范。目前大部分RFID设备采用公开的标准通信协议进行数据传输,使得RFID系统容易遭到恶意设备的空口入侵,从而导致RFID系统面临严重的安全威胁与数据隐私保护问题。本研究基于恶意读写器的实时发现,完成空口入侵的检测,避免空口数据遭到窃取,保证数据传输安全。本文主要利用无源感知技术对RFID信号无线信道状态信息进行分析与计算,综合运用接收信号强度、相位、吞吐量等信息,提取并建立可以描述无线信道状态信息的参数。利用提取的参数建立基于有限状态机的RFID信号感知数据推断模型,结合自适应算法得出稳态作为依据,分析判断RFID信号的具体变化,实现基于恶意读写器的RFID空口入侵检测。

关 键 词:物联网安全  无源RFID  空口入侵  隐私保护
收稿时间:2017/5/29 0:00:00
修稿时间:2017/7/13 0:00:00

RFID Air Interface Intrusion Detection Technology Based on Malicious Reader Discovery
HUANG Wei-Qing,DING Chang,CUI Yue,WANG Si-Ye,ZHANG Yan-Fang,ZHAO Bo-Bai,ZHU Shao-Yi,MAO Rui and CHEN Chao.RFID Air Interface Intrusion Detection Technology Based on Malicious Reader Discovery[J].Journal of Software,2018,29(7):1922-1936.
Authors:HUANG Wei-Qing  DING Chang  CUI Yue  WANG Si-Ye  ZHANG Yan-Fang  ZHAO Bo-Bai  ZHU Shao-Yi  MAO Rui and CHEN Chao
Affiliation:School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100093, China;Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100093, China;Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China,Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China and Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China
Abstract:With the continuous development of RFID technology, its applications in logistics management, cargo monitoring, conference security and other fields are becoming wider and wider. So we have to consider the ensuing security issues. In the wireless communication technology, the air interfacedefines the technical specification of the radio link between the terminal device and the network device. Most of the current RFID devices use commonstandardizedcommunication protocol for data transmission, which making the RFID systems suffer malicious devices air interface intrusion.And thenthe air interface intrusion causes the security threats and the data privacy protection problem in RFID systems.Wecomplete the detection of air interface intrusion based on the real-time discovery of malicious readers. It avoids theft of data and ensures the security of data transmission. This paper mainly uses passive sensing technology for analysis and calculation of the RFID signal, channel state and throughput information. Using received signal strength, phase and other state information, we extract and build the parameters which can describe the wireless channel state information. Using extracted parameters and finite-state machine theory, we build a perception data inference model of RFID signal andobtain ainitialsteady state according to the adaptive algorithm. In this way, we can analyze the specific change of RFID signal and complete the detection of RFID air interface intrusions.
Keywords:Security of IoT  passive RFID  Air interface invasion  Privacy Protection
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号