首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Radio frequency identification (RFID) technology system is quickly evolved many applications to manage personnel can be more efficient for automation systems. We combine the RSA encryption and decryption algorithms to raise the safety and the information security systems. The RFID environment has been communicated to exchange data for heterogeneous wireless networks. In this paper, it is implemented the RFID-based campus system solutions to security and privacy of RFID system for wireless mesh network applications. We propose to enhance the security algorithm combined RFID devices for the antenna arrays system. This paper is also presented the integrated framework for the application and integration systems based on service oriented architecture, and given a specific application of the framework combined with campus system.  相似文献   

2.
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.  相似文献   

3.
介绍了RFID技术的基本原理和在测量船装备管理上的应用前景,设计了一个基于RFID的测量船装备管理系统,并制定了该系统的安全机制。最后,对该系统在装备管理上的应用领域进行了描述。RFID装备管理系统可以有效提高测量船装备管理的效率。  相似文献   

4.
射频识别技术是一种无线自动识别技术,通过射频信号识别目标并进行数据交换,RFID可跟踪和识别物体,并可在商业活动进行中自动收集数据。RFID技术在物联网中具有广泛的应用,但在实际应用环境中,RFID面临着信息安全和隐私保护方面的问题和风险。文中主要针对射频识别系统的安全问题、安全需求、可能受到的攻击以及解决策略等方面展开讨论,旨在从技术层面分析射频识别系统的隐私和安全问题,并提出一些可行的解决策略,减少了对RFID系统带来的影响。  相似文献   

5.
RFID公共服务平台是RFID技术应用的重要领域,也是RFID产业链中的关键环节。本文根据目前在研的广东省关键领域重点突破项目“RFID物流通关公共服务平台关键技术”的阶段成果,从平台的应用模型、应用框架、系统架构和应用前景等方面对RFID公共服务平台框架进行了初步探索和研究。  相似文献   

6.
基于RFID技术的港口车辆管理系统设计与实现   总被引:1,自引:1,他引:0  
随着我国经济持续发展,港口业务增长迅猛,提高吞吐量的需要也越来越强烈。而目前依靠人工管理的方式显得捉襟见肘,所以采用高新技术改善港口管理模式势在必然。RFID港口车辆管理系统通过给港口车辆绑定电子身份芯片,把车辆的相关信息记录到系统中,由系统统一管理港口车辆的进出行为,从实际上解决人工管理车辆所带来的效率与效益的问题。系统利用高性能的超高频读写器,采用基于C/S模式分层结构,利用缓存,双数据库技术,使系统的可操作性强,稳定性高,数据交互便捷。从而很好地提高了港口码头的管理效率与服务水平。  相似文献   

7.
Radio Frequency Identification (RFID) technology; a convenient and flexible technology which is well suited for fully automated systems, is directing human lifestyle towards automation and reality. Integrating RFID into attendance management systems makes the tasks of both users and administrators easy, smart, convenient, and practical. Earlier implementations of RFID-based attendance systems involve different approaches and facilities. Different intertwined characteristics (i.e., scalability, and automation) are suggested in evaluating the performance of these systems. The coverage of these characteristics appears to be adequate in achieving a good systems implementation. Some of the existing systems present high performance; however, these systems still have gaps in some of the suggested characteristics. In order to mind these gaps, a scalable RFID-based attendance system with an intelligent scheduling technique; called Intelligent and fully Automated Attendance System (IAAS), has been designed and implemented. Finally, the performance of IAAS has been evaluated through a comparison with existing attendance systems.  相似文献   

8.
Radio frequency identification (RFID) technology will become more popular in various applications in the near future. But the security issues in RFID systems have hindered this technical promotion seriously. The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. We prove the security of the proposed protocol by data reduction method with the learning parity with noise and formally verify the functionality of the proposed scheme by using Colored Petri Nets.  相似文献   

9.
徐江  黄银龙  徐旭  朱彤  邱瑾 《通信技术》2010,43(12):121-122,125
"汽车数字化标准信源"(即电子车牌)系统依靠UHF频段的射频识别(RFID)标签记录车辆的基本信息,同时凭借架设在道路上的专用读写设备采集车辆、道路等相关信息,以实现对车辆的跟踪定位、实时管理、交通管理、环保、保险状态监察等功能。介绍了"汽车数字化标准信源"系统车辆专用UHF频段标签内存数据的不同类型和如何通过ISO18000-6B标签的特性及有效加密手段满足系统对信息安全及隐私保护的需求,提出了一套有效的标签信息安全加密设计方案。  相似文献   

10.
物联网的发展对射频识别(RFID)系统的安全性能提出了越来越高的要求。虽然基于密钥阵列的RFID认证协议解决了传统RFID认证协议在多实体环境中存在的内部攻击问题,但基于交换实体身份信息的认证方式存在信息泄露的安全隐患。针对这一问题,设计了基于零知识证明的多实体RFID认证协议(MERAP)。该协议采用分布式密钥阵列抵御内部攻击,利用零知识证明方案实现双向认证时敏感身份信息零泄露。性能分析结果显示,MERAP协议在维持一定复杂度和标签成本的基础上,可抵抗包括重传、跟踪、拒绝服务和篡改等多种外部攻击和内部攻击。  相似文献   

11.
Nowadays, traceability represents a key activity in many sectors. Many modern traceability systems are based on radio‐frequency identification (RFID) technology. However, the distributed information stored on RFID tags involves new security problems. This paper presents the traceability multi‐entity cryptography, a high‐level data protection scheme based on public key cryptography that is able to protect RFID data for traceability and chain activities. This scheme is able to manage entities with different permissions, and it is especially suitable for applications that require complex Information Systems. Traceability multi‐entity cryptography avoids industrial espionage, guarantees the information authenticity, protects the customer privacy, and detects malicious alterations of the information. In contrast to the state‐of‐the‐art RFID security schemes, the proposed protocol is applicable to standard RFID tags without any cryptographic capability, and it does not require a central database. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

12.
Consumer Acceptance of RFID Technology: An Exploratory Study   总被引:1,自引:0,他引:1  
Radio frequency identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigates the factors that affect consumer acceptance of RFID technology. The purpose of this effort is to develop and test a theoretical model that contextualizes the technology acceptance model (TAM) within the context of RFID technology. The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumerspsila acceptance of RFID. However, the results show that convenience, culture, and security are significant predictors. This study is the first in the RFID literature to use the TAM for explaining consumer acceptance of RFID technology. The findings suggest that: (1) higher perceived convenience of RFID technology leads to greater acceptance of this technology; (2) societal beliefs, value systems, norms, and/or behaviors influence the extent of consumer acceptance of RFID technology; and (3) higher perceived importance of and less willingness to sacrifice personal information security lead to lower intention to use RFID technology. Contextualization of TAM to RFID technology makes this study relevant to practitioners because the results can provide insight to organizations using or exploring the use of RFID technology.  相似文献   

13.
为了使目前轨道车辆运行效率提高,采用射频识别RFID技术对轨道车辆的物理位置进行实时监测的方法,提出一种利用RFID技术对轨道车辆进行实时定位的系统,并介绍该实时定位系统的设计方案、组成及工作原理,主要包括RFID标签安置、RFID读写及与后台服务器通信等技术。系统运行性能结果表明利用RFID技术对轨道车辆进行实时定位具有精度高、环境适用性强等优点,在地铁和企业厂段的轨道车辆实时定位中具有良好的应用前景。  相似文献   

14.
基于数据缓存机制的RFID安全协议   总被引:1,自引:1,他引:0  
随着射频识别技术更为广泛地应用于人们的日常生活,安全和隐私问题越来越受到人们的关注。为了寻求一种更好的安全机制,本文首先对现有的安全机制进行了分析,指出了其不足,并将数据缓存机制应用于解决现有的几种安全隐患,讨论了机制的有效性和灵活性。应用分析表明,基于数据缓存机制在射频识别技术系统安全防护应用中适用性强,具有很好的应用前景。  相似文献   

15.

RFID technology, which is concerned as one of the core technologies of Internet of Things, has been widely deployed in healthcare environment and brings a lot of convenience for people’s daily life. However, the security and privacy challenges of RFID authentication protocols are receiving more and more attention. One of the problems is that the current RFID protocols usually use a backend server to store the detailed information of tagged objects, which may lead to the issue of information leakage if the server is hacked or attacked by the adversary. To address this challenge, in this paper, we propose a security enhanced RFID authentication protocol for healthcare environment using the technique of indistinguishability obfuscation, which prevents the leakage of sensitive data from the backend server. Meanwhile, we extend the protocol to fit for the scenario of cloud environment where the tags’ information is stored in the cloud server. To our knowledge, our protocols are the first applications of indistinguishability obfuscation in the field of RFID authentication system. Moreover, our protocols are scalable and practical, and they are analyzed to achieve most of the security properties of the RFID system.

  相似文献   

16.
Modern FPGAs have a great market share in hardware prototyping, massive parallel systems and reconfigurable architectures. Although the field-programmability of FPGAs is an effective feature in the growth and diversity of their applications; it has caused security concerns for IPs/Designs on FPGAs. Recent researches show that a reliable mechanism is required to protect the IPs/applications on FPGAs against malicious manipulations during all stages of design lifecycle, especially when they are operating in the field. In this paper, we propose a new tamper-resistant design methodology (Security Path methodology) and a revised security-aware FPGA architecture. This methodology protects the configured design against tampering attacks in parallel with the normal operation of the circuit. When the attack is discovered, the normal data flow is obfuscated and the circuit is blocked. Experimental results show that this methodology provides near full coverage in tampering detection with overhead of 12.32 % in power, 12 % in delay and 38 % in area.  相似文献   

17.
RFID系统中信息保密机制研究与设计   总被引:1,自引:0,他引:1  
随着RFID技术应用的不断扩展和深入,RFID系统面临的安全问题也越来越引人关注,而且RFID要广泛应用于商业就必须要解决其在信息保密和信息隐私泄露等方面面临的安全挑战。在总结分析现有RFID系统所面临的信息保密和信息隐私保护等安全问题的基础上,提出了一种增强信息隐私保护和防泄密的RFID系统安全机制,并讨论了有关具体实现。文中所提出的方法可有效抵抗信息传输中的内容窃听、重放攻击,以及对目标的隐私跟踪等问题。  相似文献   

18.
Radio frequency identification (RFID) is a wireless technology used in various applications to minimize the complexity of everyday life. However, it opens a large number of security and privacy issues that require to be addressed before its successful deployment. Many RFID authentication protocols are proposed in recent years to address security and privacy issues, and most of them are based on lightweight cryptographic techniques such as pseudo-random number generators (PRNGs), or bitwise logical operations. However, the existing RFID authentication protocols suffer from security weaknesses, and cannot solve most of the security and privacy problems. A new solution is necessary to address security and privacy issues. In this paper, an improved three-pass mutual authentication protocol (ITPMAP) for low-cost RFID tags is proposed to offer an adequate security level for RFID systems. The proposed ITPMAP protocol uses one PRNG on the tag side and heavy-weighted cryptographic techniques (i.e., digital signature and password-based encryption schemes) on the back-end server side instead of lightweight cryptographic techniques to address the security and privacy issues. The ITPMAP protocol is secure against various attacks such as cloning, spoofing, replay, and desynchronization attacks. Furthermore, as a proof of concept, the ITPMAP protocol is adopted to propose the design of three real-life RFID systems; namely: Signing and Verification of Graduation Certificate System, issuing and verification of e-ticketing system, and charging and discharging of prepaid card system. The Unified Modeling Language is used to demonstrate the design of the proposed ITPMAP protocol and systems. Java language is used for the implementation of the proposed systems. In addition, the “Mifare Classic” tags and readers are used as RFID apparatuses for the proposed systems.  相似文献   

19.
基于RFID的物联网技术日趋成熟,应用领域和范围也逐步扩展。本文将RFID技术与节目磁带管理相结合,分析了基于RFID物联网的磁带管理需求、流程、网络架构和编码标准,提出了一种模式,使得节目磁带成为物联网中的"物",能遵循物联网中的协议实现信息交换,达到磁带识别和管理的目的。  相似文献   

20.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号