共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
3.
我国“十二五”规划中把物联网技术作为重要的战略技术,而RFID技术为物联网技术的发展打下良好基础,目前该技术已经广泛用于交通运输、物流产业以及智慧城市等应用领域中,在日常生活、工业生产中发挥着重要的作用。GSl组织提出的EPCgtobal框架的主要目的是在全球范围内为各个行业建立和维护EPC网络,采用全球统一的标准保证供应链各环节信息的共享和实时识别。本文提出一种基于EPCgtobal框架的物流系统设计方案,设计出该方案物流系统的总体框架图,并详细描述其中事件周期管理模块等的设计方案,目的是实现物流自动化和科学化管理等功能。经过测试,该系统运行稳定,可扩展性强,达到预期的目标。 相似文献
4.
为了适应物联网不同应用间的异构性,设计了一种普适的RFID网络模型,介绍了模型中的层次结构并着重研究了RFID网络中的事件处理层和信息服务层。在事件处理层上使用EPCglobal颁布的应用级别事件AI正(Application Level Event)规范,规范定义了RFID事件过滤和采集接口,使得从标签读取到应用接收过程中保持数据处理、接收的一致性;在信息服务层采用发布/订阅机制,设计不同的发布/订阅方法,使在企业应用和RFID网络间数据实现灵活交互,基本满足了企业应用的各种需求。 相似文献
5.
倪彬彬 《数字社区&智能家居》2013,(11):7114-7116
阐述了智慧校园建设的支撑技术--RFID、EPC、无线传感器网络及云计算等,提出了智慧校园的建设目标和总体应用框架,并分析了智慧校园建设的主要内容。 相似文献
6.
7.
8.
RFID是目前应用于物联网的一项新兴通信技术,可通过无线电信号识别产品电子标签内的EPC码来识别特定目标,而无需识别系统与特定目标之间建立机械或光学接触,它的应用给物联网行业带来了革命性的变化,极大地节省了管理成本,提高了管理效率。文章重点对RFID的工作原理、安全性、现状及发展趋势进行了阐述。 相似文献
9.
射频识别(RFID)系统是物联网的重要组成部分,它的安全问题直接制约着物联网产业的发展.现有的RFID安全认证协议很少有考虑到RFID系统的计数攻击问题,也大都不符合EPC Class1 Generation2 (EPC C1G2)标准.通过对RFID系统的安全需求和现有协议的分析,提出一种抗计数攻击的RFID双向认证协议,该协议基于EPC C1G2标准,具有前向安全性及抗追踪性,除了能抵抗计数攻击之外,还能有效抵抗常见的安全问题,此外,它在阅读器中设有过滤功能,这些保证了协议的安全性及高效性. 相似文献
10.
Yanbo Wu Damith C. Ranasinghe Quan Z. Sheng Sherali Zeadally Jian Yu 《Distributed and Parallel Databases》2011,29(5-6):397-443
The emergence of radio frequency identification (RFID) technology brings significant social and economic benefits. As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked RFID system formed by a set of distributed and collaborating parties. A trail of such recorded movements is the foundation for enabling traceability applications. While traceability is a critical aspect of majority of RFID applications, realizing traceability for these applications brings many fundamental research and development issues. In this paper, we assess the requirements for developing traceability applications that use networked RFID technology at their core. We propose a set of criteria for analyzing and comparing the current existing techniques including system architectures and data models. We also outline some research opportunities in the design and development of traceability applications. 相似文献
11.
Robin Doss Wanlei Zhou Saravanan Sundaresan Shui Yu Longxiang Gao 《Computer Networks》2012,56(15):3401-3416
In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We present two security schemes that are suitable for both fixed reader and mobile/wireless reader environments, the mutual authentication and the collaborative authentication schemes respectively. Both schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are used. Detailed security analysis of both our schemes show that they offer robust security properties in terms of tag anonymity, tag untraceability and reader privacy while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the schemes and its impact on authentication delay. In addition, Yeh et al. (2010) [20] proposed a security scheme for EPC Class-1 Gen-2 based mobile/wireless RFID systems. We show that this scheme has a security vulnerability and is not suitable for mobile/wireless RFID systems. 相似文献
12.
Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered to be a possible successor to bar-code with added functionalities. In RFID-based applications where RFID tags are used to identify and track tagged objects, an RFID tag emits its EPC in plaintext. This makes the tag inevitably vulnerable to cloning attacks as well as information leakage and password disclosure. In this paper, we propose a novel anti-cloning method in accordance with the EPCglobal Class-1 Generation-2 (C1G2) standard. Our method only uses functions that can be supported by the standard and abides by the communication flow of the standard. The method is also secure against threats such as information leakage and password disclosure. 相似文献
13.
14.
在深入理解物联网核心技术RFID之后,提出将ZigBee和GPS技术融进射频识别RFID读卡器中,形成一个多点自动识别、智能无线组网和实时定位的RFID识别系统的物联网开发平台。详细介绍了该平台中系统硬件部分和软件部分,同时运用ALOHA算法解决了阅读器在读取EPC电子标签数据时易出现"冲突"现象的问题。通过实验验证,该系统定位效果好,实用性强。 相似文献
15.
在深入理解物联网关键技术RFID原理后,提出将ZigBee技术、GPS技术融进RFID技术中,形成一个基于ZigBee、GPS的多点自动识别、智能无线组网和实时定位的RFID识别系统的物联网开发平台.在该平台中详细介绍了RFID和ZigBee等各个模块原理及其应用,同时解决了阅读器在读取EPC电子标签数据时易出现的碰撞... 相似文献
16.
Chin-Ling Chen Yong-Yuan Deng 《Engineering Applications of Artificial Intelligence》2009,22(8):1284-1291
Radio frequency identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency. Through RFID become popular worldwide, it is susceptible to various attacks and security problems. Since RFID systems use wireless transmission, user privacy may be compromised by malicious people intercepting the information contained in the RFID tags. Many of the methods previously proposed to prevent such attacks do not adequately protect privacy or reduce database loading. In this paper, we propose a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers. Our scheme not only reduces database loading, but also ensures user privacy. Finally, we survey our scheme from several security viewpoints, and prove its feasibility for use in several applications. 相似文献
17.
在分析EPCglobal UHF class1 generation2和基于DFSA协议的高速标签识别算法的基础上,采用位隙FSA协议标签响应标志位隙的设置方法,通过在标签上设置一个组位隙响应标志字,提出了一种EPC Gen2 标准下的RFID标签分组多位隙并行识别协议GMBPIP,设计了一条新的分组查询命令和基于DFSA的多组标签并行识别协议流程,从理论上了分析GMBPIP协议的性能,并使用EPC Gen2 标准协议时间参数进行了仿真实验。结果表明,GMBPIP协议在不增加标签太多计算负担的情况下,能够在EPC Gen2标准下有效降低时隙空闲率和冲突率,提高了标签的识别率、时隙利用率;平均识别率不仅突破了帧时隙ALOHA协议最高36.8%的瓶颈,而且高于目前文献所述同类算法的性能指标,达到了70.95%~81.61%。GMBPIP可以作为低成本RFID系统高速识别大量被动标签的支撑协议。 相似文献
18.
The use of RFID middleware to support application development for and integration of RFID hardware into information systems
has become quite common in RFID applications where reader devices remain stationary, which currently represents the largest
part of all RFID applications in use. Another field for applying RFID technology which is offering a huge set of novel possibilities
and applications are mobile applications, where readers are no longer fixed. In order to address the specific issues of mobile RFID-enabled applications
and to support developers in rapid application development, we present ID-Services, an architecture for an RFID middleware that is designed to support mobile applications. The ID-Services approach has been used to implement MoVIS (Mobile Visitor Information System), a mobile application which allows museum visitors to request individually adapted multimedia
information about exhibits in an intuitive way. 相似文献
19.
Recently, Chien et al. proposed an RFID authentication protocol, which consists of only the cyclic redundancy code (CRC) and the pseudo-random number generator (PRNG) [H. Chien, C. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces, vol. 29, Elsevier, 2007, pp. 254–259]. They claimed that the protocol conforms to current EPC tags, and would be secure against all attacks on RFID systems. However, in this paper, we show that the protocol is not secure; firstly an attacker can impersonate a valid tag temporarily by a single eavesdropping. Secondly the attacker can forge a tag permanently by eavesdropping two consecutive sessions. Finally he can make a valid tag useless (DoS attack) by modifying the second attack slightly. The computational complexities of the attacks are so practicable that Chien et al.'s protocol cannot enhance the RFID security any more than the original EPC standard. 相似文献
20.
介绍了RFID(射频识别)技术的原理和发展趋势,并依据中间件思想构建了基于RFID的数据采集模块,具体包括安全控制、数据缓存和过滤、生成数据源等几个单元。利用RFID数据采集中间件,一方面可以实现数据的收集、过滤、整合与传递,另一方面通过和Web Services技术相结合,可以很容易地将RFID服务平台与企业管理系统结合在一起,并能以服务的方式将数据提供给其他服务器,从而实现企业内部及企业间业务的松散集成。 相似文献