首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
RFID轻量型中间件的构成与实现   总被引:1,自引:0,他引:1       下载免费PDF全文
为满足国内中小企业的实际管理需求,设计一种射频识别(RFID)轻量型中间件,其架构介于以基础架构为中心与以应用程序为中心的中间件之间,简化了电子产品代码(EPC)系统的应用层事件结构。以应用程序接口为基础,借鉴数据库集成过滤思想实现的轻量型中间件,具有结构简单、开发周期短、易于后期维护和扩展的特点。  相似文献   

2.
介绍了基于数据融合的结构可扩展软件开发框架(xDFF)及其规范体系,在此框架下,主要研究并设计了包括RFID数据资源集成与融合应用平台的建模方法、工具及实现方法,旨在设计一种高效且可扩展的,支持海量RFID数据采集、过滤、聚合、事件管理以及存储、维护、查询和安全管理等功能的环境与工具,实现普遍适配,提供二次开发接口,与企业数据集成并进行统一管理的模块化框架化RFID数据融合中间件产品.  相似文献   

3.
程晨  罗红 《软件》2013,(10):86-89,92
我国“十二五”规划中把物联网技术作为重要的战略技术,而RFID技术为物联网技术的发展打下良好基础,目前该技术已经广泛用于交通运输、物流产业以及智慧城市等应用领域中,在日常生活、工业生产中发挥着重要的作用。GSl组织提出的EPCgtobal框架的主要目的是在全球范围内为各个行业建立和维护EPC网络,采用全球统一的标准保证供应链各环节信息的共享和实时识别。本文提出一种基于EPCgtobal框架的物流系统设计方案,设计出该方案物流系统的总体框架图,并详细描述其中事件周期管理模块等的设计方案,目的是实现物流自动化和科学化管理等功能。经过测试,该系统运行稳定,可扩展性强,达到预期的目标。  相似文献   

4.
王庆生  杜曼 《微机发展》2012,(1):29-31,35
为了适应物联网不同应用间的异构性,设计了一种普适的RFID网络模型,介绍了模型中的层次结构并着重研究了RFID网络中的事件处理层和信息服务层。在事件处理层上使用EPCglobal颁布的应用级别事件AI正(Application Level Event)规范,规范定义了RFID事件过滤和采集接口,使得从标签读取到应用接收过程中保持数据处理、接收的一致性;在信息服务层采用发布/订阅机制,设计不同的发布/订阅方法,使在企业应用和RFID网络间数据实现灵活交互,基本满足了企业应用的各种需求。  相似文献   

5.
阐述了智慧校园建设的支撑技术--RFID、EPC、无线传感器网络及云计算等,提出了智慧校园的建设目标和总体应用框架,并分析了智慧校园建设的主要内容。  相似文献   

6.
EPC网络是基于互联网和RFID技术发展起来的一种自动识别系统。本文介绍了EPC网络的组成、工作原理及其特点。阐述了EPC网络在制造业中的应用并且详尽地分析了EPC网络在制造业中应用的优点和前途景。  相似文献   

7.
一种灵活的RFID事件规则管理框架*   总被引:4,自引:0,他引:4  
射频识别(Radio Frequency Identification,RFID)技术的快速发展,使RFID中间件已经成为业界关注的焦点。初步探讨了RFID中间件中事件规则管理的内容,并提出一种灵活的RFID事件规则管理框架,全面介绍了RFID事件编码、模式过滤、目标事件识别以及业务规则定义四个环节的内容,重点阐述了一种基于XML语言的业务规则定义方法及其执行引擎的底层实现,从而为构建更加具有个性化和扩展能力的RFID应用奠定了基础。  相似文献   

8.
厉剑 《物联网技术》2013,(5):14-17,20
RFID是目前应用于物联网的一项新兴通信技术,可通过无线电信号识别产品电子标签内的EPC码来识别特定目标,而无需识别系统与特定目标之间建立机械或光学接触,它的应用给物联网行业带来了革命性的变化,极大地节省了管理成本,提高了管理效率。文章重点对RFID的工作原理、安全性、现状及发展趋势进行了阐述。  相似文献   

9.
射频识别(RFID)系统是物联网的重要组成部分,它的安全问题直接制约着物联网产业的发展.现有的RFID安全认证协议很少有考虑到RFID系统的计数攻击问题,也大都不符合EPC Class1 Generation2 (EPC C1G2)标准.通过对RFID系统的安全需求和现有协议的分析,提出一种抗计数攻击的RFID双向认证协议,该协议基于EPC C1G2标准,具有前向安全性及抗追踪性,除了能抵抗计数攻击之外,还能有效抵抗常见的安全问题,此外,它在阅读器中设有过滤功能,这些保证了协议的安全性及高效性.  相似文献   

10.
The emergence of radio frequency identification (RFID) technology brings significant social and economic benefits. As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked RFID system formed by a set of distributed and collaborating parties. A trail of such recorded movements is the foundation for enabling traceability applications. While traceability is a critical aspect of majority of RFID applications, realizing traceability for these applications brings many fundamental research and development issues. In this paper, we assess the requirements for developing traceability applications that use networked RFID technology at their core. We propose a set of criteria for analyzing and comparing the current existing techniques including system architectures and data models. We also outline some research opportunities in the design and development of traceability applications.  相似文献   

11.
In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We present two security schemes that are suitable for both fixed reader and mobile/wireless reader environments, the mutual authentication and the collaborative authentication schemes respectively. Both schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are used. Detailed security analysis of both our schemes show that they offer robust security properties in terms of tag anonymity, tag untraceability and reader privacy while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the schemes and its impact on authentication delay. In addition, Yeh et al. (2010) [20] proposed a security scheme for EPC Class-1 Gen-2 based mobile/wireless RFID systems. We show that this scheme has a security vulnerability and is not suitable for mobile/wireless RFID systems.  相似文献   

12.
Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered to be a possible successor to bar-code with added functionalities. In RFID-based applications where RFID tags are used to identify and track tagged objects, an RFID tag emits its EPC in plaintext. This makes the tag inevitably vulnerable to cloning attacks as well as information leakage and password disclosure. In this paper, we propose a novel anti-cloning method in accordance with the EPCglobal Class-1 Generation-2 (C1G2) standard. Our method only uses functions that can be supported by the standard and abides by the communication flow of the standard. The method is also secure against threats such as information leakage and password disclosure.  相似文献   

13.
由于现在很多射频识别(RFID)认证协议不符合EPC Class 1 Gen 2(EPC Gen2)标准的要求,同时对RFID系统的计算能力要求很高,因此很难在低端标签中实现。针对上述问题,通过分析已有协议的安全性,总结出不安全协议的缺陷,提出了一种新的基于EPC Gen2 标准的RFID认证协议,并采用BAN逻辑对协议进行了安全性证明。通过安全性分析,新协议满足了信息机密性、数据完整性和身份真实性的RFID系统认证协议的安全需求。  相似文献   

14.
在深入理解物联网核心技术RFID之后,提出将ZigBee和GPS技术融进射频识别RFID读卡器中,形成一个多点自动识别、智能无线组网和实时定位的RFID识别系统的物联网开发平台。详细介绍了该平台中系统硬件部分和软件部分,同时运用ALOHA算法解决了阅读器在读取EPC电子标签数据时易出现"冲突"现象的问题。通过实验验证,该系统定位效果好,实用性强。  相似文献   

15.
在深入理解物联网关键技术RFID原理后,提出将ZigBee技术、GPS技术融进RFID技术中,形成一个基于ZigBee、GPS的多点自动识别、智能无线组网和实时定位的RFID识别系统的物联网开发平台.在该平台中详细介绍了RFID和ZigBee等各个模块原理及其应用,同时解决了阅读器在读取EPC电子标签数据时易出现的碰撞...  相似文献   

16.
Radio frequency identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency. Through RFID become popular worldwide, it is susceptible to various attacks and security problems. Since RFID systems use wireless transmission, user privacy may be compromised by malicious people intercepting the information contained in the RFID tags. Many of the methods previously proposed to prevent such attacks do not adequately protect privacy or reduce database loading. In this paper, we propose a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers. Our scheme not only reduces database loading, but also ensures user privacy. Finally, we survey our scheme from several security viewpoints, and prove its feasibility for use in several applications.  相似文献   

17.
杨新爱  段富 《计算机应用研究》2020,37(3):876-879,883
在分析EPCglobal UHF class1 generation2和基于DFSA协议的高速标签识别算法的基础上,采用位隙FSA协议标签响应标志位隙的设置方法,通过在标签上设置一个组位隙响应标志字,提出了一种EPC Gen2 标准下的RFID标签分组多位隙并行识别协议GMBPIP,设计了一条新的分组查询命令和基于DFSA的多组标签并行识别协议流程,从理论上了分析GMBPIP协议的性能,并使用EPC Gen2 标准协议时间参数进行了仿真实验。结果表明,GMBPIP协议在不增加标签太多计算负担的情况下,能够在EPC Gen2标准下有效降低时隙空闲率和冲突率,提高了标签的识别率、时隙利用率;平均识别率不仅突破了帧时隙ALOHA协议最高36.8%的瓶颈,而且高于目前文献所述同类算法的性能指标,达到了70.95%~81.61%。GMBPIP可以作为低成本RFID系统高速识别大量被动标签的支撑协议。  相似文献   

18.
The use of RFID middleware to support application development for and integration of RFID hardware into information systems has become quite common in RFID applications where reader devices remain stationary, which currently represents the largest part of all RFID applications in use. Another field for applying RFID technology which is offering a huge set of novel possibilities and applications are mobile applications, where readers are no longer fixed. In order to address the specific issues of mobile RFID-enabled applications and to support developers in rapid application development, we present ID-Services, an architecture for an RFID middleware that is designed to support mobile applications. The ID-Services approach has been used to implement MoVIS (Mobile Visitor Information System), a mobile application which allows museum visitors to request individually adapted multimedia information about exhibits in an intuitive way.  相似文献   

19.
Recently, Chien et al. proposed an RFID authentication protocol, which consists of only the cyclic redundancy code (CRC) and the pseudo-random number generator (PRNG) [H. Chien, C. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces, vol. 29, Elsevier, 2007, pp. 254–259]. They claimed that the protocol conforms to current EPC tags, and would be secure against all attacks on RFID systems. However, in this paper, we show that the protocol is not secure; firstly an attacker can impersonate a valid tag temporarily by a single eavesdropping. Secondly the attacker can forge a tag permanently by eavesdropping two consecutive sessions. Finally he can make a valid tag useless (DoS attack) by modifying the second attack slightly. The computational complexities of the attacks are so practicable that Chien et al.'s protocol cannot enhance the RFID security any more than the original EPC standard.  相似文献   

20.
介绍了RFID(射频识别)技术的原理和发展趋势,并依据中间件思想构建了基于RFID的数据采集模块,具体包括安全控制、数据缓存和过滤、生成数据源等几个单元。利用RFID数据采集中间件,一方面可以实现数据的收集、过滤、整合与传递,另一方面通过和Web Services技术相结合,可以很容易地将RFID服务平台与企业管理系统结合在一起,并能以服务的方式将数据提供给其他服务器,从而实现企业内部及企业间业务的松散集成。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号