首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Mobile RFID的安全和隐私问题研究   总被引:1,自引:1,他引:1  
射频识别技术被广泛应用于物体的自动识别,广泛地部署射频识别的标签会给用户的隐私带来新的安全威胁。目前,射频识别出现一种融合的趋势,阅读器被集成到移动电话中。移动射频识别主要应用于普通终端用户,用户的安全和隐私是最优考虑的问题。论文描述了移动RFID的应用场景和安全及隐私威胁,重点描述了移动环境下特殊的安全和隐私危险及解决移动RFID安全和隐私问题的安全体系构架方案。  相似文献   

2.
声表面波(SAW)射频识别(RFID)技术是当前信息识别系统向无源无线发展的关键技术,在工业、国防及商业等领域有重要作用和广泛应用前景。该文探讨了SAW RFID技术原理及信息编码方案;综述了典型的SAW RFID产品及应用;提出了SAW RFID技术发展趋势,对推动SAW RFID技术发展和应用有重要意义。  相似文献   

3.
Nowadays, many people perform their commercial activities, such as electronic payment and electronic banking, through their mobile phones. Mobile commerce (m‐commerce) refers to manipulating electronic commerce (e‐commerce) by using mobile devices and wireless networks. Radio‐frequency identification (RFID) is a technology which can be employed to complete payment functions on m‐commerce. As an RFID subsystem is applied in m‐commerce and supply chains, the related security concerns are very important. Recently, Fan et al. have proposed an ultra‐lightweight RFID authentication scheme for m‐commerce (ULRAS) and claimed that their protocol is efficient enough and provides a high level of security. In this paper, we show that their protocol is vulnerable to secret disclosure and reader impersonation attacks. Finally, we improve it to a protocol that is resistant to the attacks presented in this paper and the other known attacks in the context of RFID authentication. We further analyze the security of the improved protocol through the Burrows–Abadi–Needham logic (BAN‐logic). Moreover, our proposed improvement does not impose any additional workload on the RFID tag.  相似文献   

4.
基于RFID技术的小额支付系统的设计   总被引:2,自引:0,他引:2  
杨小妹  申敏 《世界电信》2006,19(4):54-57
作为一种移动数据业务,移动小额支付业务已经走进人们的生活,成为大家关注的焦点,也必将成为移动运营商竞争的一个领域.基于射频识别(RFID)的核心技术,针对当前小额支付系统的现状,提出了基于RFID技术的小额支付系统的优化设计方案,并对系统结构、业务流程和安全性等方面做了详细的阐述.  相似文献   

5.
基于RFID专用读写模块和IC卡的手机支付新方案的研究   总被引:2,自引:0,他引:2  
蔡逆水 《电信科学》2006,22(10):4-7
本文首先研究了移动支付业务需求、业务模式、技术背景与实现方式,然后描述了将RFID技术与移动通信技术相结合实现移动支付业务的技术方案,最后针对国内移动支付的发展现状,详细介绍了基于RFID专用读写模块和IC卡的手机移动支付新方案.  相似文献   

6.
The radio frequency identification (RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography (ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECC-based RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.  相似文献   

7.
手机非接触支付的技术标准比较分析   总被引:2,自引:2,他引:0  
基于RFID技术的手机非接触支付业务已经成为电信运营商重点关注的一项增值业务。本文介绍了RFID技术的基本情况,分析了电信运营商发展RFID移动支付的优势,并对目前主要的应用实例和几种技术进行了对比和分析,提出现阶段电信运营商RFID移动支付的主流发展方向。  相似文献   

8.
超高频RFID系统与其他无线网络的电磁兼容性研究   总被引:2,自引:0,他引:2  
无线射频识别(RFID)技术与互联网、移动通信网络等技术结合应用,可以实现全球范围内物品跟踪与信息共享。然而,RFID作为无线通信系统,其发射的射频信号可能对其它无线网络造成干扰,降低系统性能,影响系统正常工作。中国已经发布了840~845MHz和920~925MHz频段RFID的试用标准,其中920~925MHz的RFID应用和点对点立体声广播处在一个同一个频段,与无中心对讲机和GSM网络处在相邻频段,RFID系统与这些系统之间的电磁兼容性就成为系统能否稳定实现的最主要因素。  相似文献   

9.
崔珺  李庆利 《电子技术》2009,36(11):6-8
基于射频识别技术的新特点,提出了一套优化的城市智能公交业务管理系统模型,用来解决城市公交管理的一系列难题,该系统结合射频识别技术、计算机控制技术、无线通信技术,对公交车辆进行实时的监控和调度,并将采集的数据统计分析后作为决策依据。该系统能有效地对驾驶员进行管理,提高工作效率;并使各级管理人员方便地按车、按人进行查询统计,可以实现车辆的智能调控,提高公交公司管理效能和公司运行效益。从真正意义上实现公交运营的精细化管理。  相似文献   

10.
车辆自动识别系统移动站及其在城市交通监管中的应用   总被引:5,自引:2,他引:3  
车辆自动识别系统 (AVI)移动站具有机动、快速和自动识别车辆的特点 ,适合于在城市监管中广泛应用。它采用射频识别 (RFID)技术 ,通过车卡 (TAG)采集车辆数据信息 ,对车辆进行自动识别和处理 ,识别率超过 99%;采用视频识别 (VFID)技术 ,通过摄像机采集车辆图像信息 ,在光照较强的情况下 ,识别率可以达到 80 %以上。  相似文献   

11.
In resource‐constrained, low‐cost, radio‐frequency identification (RFID) sensor–based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor–based MANETs using error‐correcting codes (ECCs). The proposed scheme chooses a quasi‐cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code‐based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de‐synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.  相似文献   

12.
针对移动无线射频识别认证协议面临的身份认证和隐私保护、动态密钥安全更新和去同步化攻击问题,提出一种可动态更新共享密钥的移动RFID双向认证协议.协议基于Hash密码机制,利用随机数同时进行密钥安全更新和身份认证,并采用对分表存储的当前和历史共享密钥进行动态添加和删除的方法,保留最后一次合法认证后的一致共享密钥.安全性能分析与效率分析表明,该协议能够实现动态密钥安全更新和身份认证、能够在遭受去同步化攻击后保证密钥同步,且具有较强的计算和存储性能.通过和同类RFID认证协议比较,协议弥补了同类RFID协议存在的不足,适用于被动式标签数量庞大的RFID系统.  相似文献   

13.
A radio frequency identification (RFID) system is a special kind of sensor network to identify an object or a person using radio frequency transmission. A typical RFID system includes transponders (tags) and interrogators (readers): tags are attached to objects/persons, and readers communicate with the tags in their transmission ranges via radio signals. RFID systems have been gaining more and more popularity in areas such as supply chain management, automated identification systems, and any place requiring identifications of products or people. RFID technology is better than barcode in many ways, and may totally replace barcode in the future if certain technologies can be achieved such as low cost and protection of personal privacy. This paper provides a technology survey of RFID systems and various RFID applications. We also discuss five critical research issues: cost control, energy efficiency, privacy issue, multiple readers' interference, and security issue. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

14.
In order to improve the service quality of radio frequency identification (RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporated adaptive learning operator and golden sine operator into the original brain storm optimization (BSO) algorithm, was proposed to solve the problem of RFID network planning (RNP). GABSO algorithm introduces learning operator and golden sine operator to achieve a balance between exploration and development. Based on GABSO algorithm, an optimization model is established to optimize the position of the reader. The GABSO algorithm was tested on the RFID model and dataset, and was compared with other methods. The GABSO algorithm's tag coverage was increased by 9.62% over the Cuckoo search (CS) algorithm, and 7.70% over BSO. The results show that the GABSO algorithm could be successfully applied to solve the problem of RNP.  相似文献   

15.
射频识别技术是一种无线自动识别技术,通过射频信号识别目标并进行数据交换,RFID可跟踪和识别物体,并可在商业活动进行中自动收集数据。RFID技术在物联网中具有广泛的应用,但在实际应用环境中,RFID面临着信息安全和隐私保护方面的问题和风险。文中主要针对射频识别系统的安全问题、安全需求、可能受到的攻击以及解决策略等方面展开讨论,旨在从技术层面分析射频识别系统的隐私和安全问题,并提出一些可行的解决策略,减少了对RFID系统带来的影响。  相似文献   

16.
韩晶 《电子科技》2011,24(7):64-67
识别和定位是用于室内服务的关键信息,常见方法是估计RFID标签的位置。而在室内环境下,信号遭受严重的损耗,标签的性能也会受到一定的限制。针对这些问题,文中对现存的RFID定位技术和定位原理加以总结,在对RFID定位技术进行阐释和分类分析的基础上,讨论了在此领域的未来发展趋势。  相似文献   

17.
This paper focuses on two interesting radio‐frequency identification (RFID) cryptographic protocols: the server‐less RFID authentication protocol that allows readers to authenticate tags without the help of any online backend servers, and the RFID searching protocol in which the verifier explicitly specifies the target tag to be searched and authenticated. These two kinds of RFID protocols play important roles in many RFID applications; however, the existing protocols either had security weaknesses or exhibited poor efficiency. This paper shows the weaknesses, and then proposes our server‐less RFID authentication protocol and RFID searching protocol. The proposed protocols greatly enhance the security using one more hashing. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

18.
RFID技术作为一种重要的非接触式识别技术,近来发展迅猛。在RFID测试中使用的传统测试仪器通常没有提供专用测试功能,泰克频谱分析仪追加了特殊测试功能。为了说明泰克频谱分析仪在RFID测试中的应用方法,本文介绍了RFID的相关知识以及在各频段中的不同应用,RFID相关设备和系统遵循的标准和法规,RFID的具体测试要求以及使用该仪器对RFID设备进行测试的有关内容。  相似文献   

19.
通过自由空间传播模型和雷达散射横截面(RCS)模型,研究了反向散射射频识别(RFID)装置的最大识别距离。用高频电磁场仿真软件FEKO对折叠偶极子标签天线进行了建模仿真,得到天线的远场辐射方向图、输入阻抗以及在不同负载情况下天线的单站RCS值。经过理论分析和仿真计算,由两个电波传播模型分别得出RFID装置可能的最大识别距离。最后比较了两种模型的计算结果,较小的距离即为该反向散射RFID装置的最大识别距离。  相似文献   

20.
针对国内外射频识别技术的迅猛发展,结合射频识别技术的应用背景,阐述了读写器中最大的耗能器件—功率放大器的研究现状;指出CMOS工艺应用于功率放大器设计的局限性和可行性;最后,探讨了将CMOS功率放大器应用于射频识别技术的主要研究方向。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号