首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
在分析了几种现有的典型RFID安全协议的特点和缺陷的基础上,提出了一种轻量级的RFID安全协议,该协议将一次性密码本与询问一应答机制相结合,实现了安全高效的读取访问控制,最后建立该协议的理想化模型,利用BAN逻辑对该协议进行了形式化分析,在理论上证明其安全性.  相似文献   

2.
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach.  相似文献   

3.
Metadata for anomaly-based security protocol attack deduction   总被引:1,自引:0,他引:1  
Anomaly-based intrusion detection systems (IDS) have been widely recognized for their potential to prevent and reduce damage to information systems. In order to build their profiles and to generate their requisite behavior observations, these systems rely on access to payload data, either in the network or on the host system. With the growing reliance on encryption technology, less and less payload data is available for analysis. In order to accomplish intrusion detection in an encrypted environment, a new data representation must emerge. We present a knowledge engineering approach to allow intrusion detection in an encrypted environment. Our approach relies on gathering and analyzing several forms of metadata relating to session activity of the principals involved and the protocols that they employ. We then apply statistical and pattern recognition methods to the metadata to distinguish between normal and abnormal activity and then to distinguish between legitimate and malicious behavior.  相似文献   

4.
A novel CMOS transmitter with low TX noise and high linearity is implemented in a 0.18μm 1P6M standard CMOS process for Mobile UHF RFID reader.Adopting double-sideband amplitude-shift-keying(DSBASK)as the only modulation is supported,this transmitter has very low power consumption.A novel analog baseband circuit is proposed to reduce the transmitter noise.With a G′′m–cancellation technology,a highly linear up-conversion active mixer and a power amplifier driver are designed.The transmitter has a measured output1 dB compression point of 13.4 dBm.Occupying a silicon area of about 1 mm2and consuming 144 mW from a1.8 V voltage supply,the transmitter makes the Mobile UHF RFID reader communicate with a transponder in a distance of 1 m conveniently.  相似文献   

5.
A novel direct conversion receiver with low cost and low power is implemented in a 0.18 μm 1P6M standard CMOS process for a Mobile UHF RFID reader.A highly linear active mixer with low flicker noise and low noise active load is proposed.An efficient and low cost on-chip DC offset voltage canceling scheme is adopted with a high-input-impedance four-input OPAMP to buffer the output of the DC offset canceller(DCOC) block.The receiver has a measured input 1 dB compression point of 2 dBm and a sensitivity of 72 dBm in the presence of the large leakage signal from the transmitter.Only occupying a silicon area of 2.5 mm 2 and consuming 21 mA from a 1.8 V supply,the receiver makes the mobile UHF RFID reader to communicate with a transponder in a distance of 1 m conveniently.  相似文献   

6.
7.
The Journal of Supercomputing - Internet of Things (IoT) is a novel paradigm that connects several physical devices and the cyber world over the Internet. IoT technology is growing rapidly and soon...  相似文献   

8.
针对现有的RFID安全协议计算成本较高及无法抵御完全的主流RFID攻击,提出一种基于秘密身份与单向hash函数的轻量级安全协议。第一阶段,标签向数据库注册,数据库为标签分配一个一次性的秘密身份与一个唯一的秘钥;第二阶段,基于一次性秘密身份与单向hash函数进行标签-阅读器-数据库之间的双向认证,实现了对各种攻击的检测与抵御能力。最终,将本协议与近期性能较好的双向认证协议进行比较。结果表明,本协议与其他协议的计算成本、内存需求接近,且具有完全的攻击抵御能力。  相似文献   

9.
为了解决RFID系统的安全和成本问题,提出了一种基于超椭圆曲线密码体制的RFID安全协议.利用新的签密算法,在RFID阅读器和电子标签之间实现了信息的加密和认证.与现有的签密算法比较,该协议具有前向安全和可公开验证,能避免恶意信息的攻击.协议的安全性和性能分析结果表明,该协议达到了RFID系统高隐私安全和低标签成本的结合.  相似文献   

10.
11.
为了提高克隆标签检测的准确度和效率,提出了一个基于多叉树的RFID克隆攻击检测方法(MT-CAI).MT-CAI用一个多叉树防碰撞算法来发现不可调解的碰撞,可以高效地发现所有的克隆标签.从性能分析和仿真实验可以看到,MT-CAI不仅能够检测出所有克隆标签,而且其执行时间远小于GREAT的执行时间.MT-CAI方法在检测时间和检测的准确度方面都优于现有的克隆标签检测协议.  相似文献   

12.
In this paper, we consider the group consensus problem of heterogeneous multi-agent systems. Based on the feature of heterogeneous agents, a novel protocol is proposed for heterogeneous multi-agent systems. First, the state transformation method is used and an equivalent system is obtained. Then, the group consensus problem is analysed and some sufficient and/or necessary conditions are given for heterogenous multi-agent systems under undirected and directed networks, respectively. Finally, simulation examples are presented to demonstrate the effectiveness of the theoretical results.  相似文献   

13.
《电子技术应用》2017,(11):82-85
电力设备在长期运行中,受环境影响,可能会发生失压、形变现象。针对这种现象,设计了一种基于UHF RFID的无线无源压力传感器,能够在不接触电力设备的情况下获得设备的表面压力信息。基于UHF RFID的压力传感器标签主要由阻抗自适应RFID芯片、UHF频段RFID偶极子天线、金属极板和支撑弹簧构成。电力设备的形变会导致安装在设备上的金属极板与偶极子天线的相对位置变化,导致RFID天线的阻抗变化,RFID芯片内部会通过自动调节输入阻抗电容以匹配RFID天线阻抗的变换。通过检测RFID芯片内部匹配阻抗的电容值,可以推出电力设备的形变情况,形成一一对应的关系,从而实现无线无源压力传感功能。  相似文献   

14.
针对传统集中式数据库设计的射频识别(RFID)供应链系统安全认证协议中存在产品溯源困难、数据透明度低、数据易丢失和易被篡改的问题,结合分布式数据库的区块链优秀技术,提出一种健壮的超轻量双向认证R F ID安全协议U PBBC.将RFID系统和区块链技术有机融合在一起,结合去中心化数据库优势创建一个安全的、基于区块链的供...  相似文献   

15.
提出了一种基于EPC Gen2协议的UHF RFID(Radio Frequency Identification)有源电子标签设计方法。标签硬件电路分为三个部分——反射电路、接收电路和基带控制电路。通过理论分析提出一种低误码率的反射电路设计方案,接收电路采用双通道正交解调方案,采用FPGA芯片EP1C3T100C6完成基带控制电路设计。利用读写器对标签进行测试,示波器、频谱仪和上位机程序所得结果均表明标签工作正常。  相似文献   

16.
为解决RFID技术在用户隐私方面存在的安全隐患,提出了一种基于Niederreiter密码体制的新型RFID双向安全认证协议。协议建立在大矩阵分解困难性的基础上,与使用对称密码和RSA公钥密码的协议相比安全性能更高、计算复杂度更小、实现效率更高。该协议利用基于嵌入Hash函数的Niederreiter公钥加密方案,通过对比原Hash值与解密后的Hash值是否相等,来实现RFID标签与阅读器之间的安全数据交换。研究结果表明,该协议不仅能有效地保护内容隐私、位置隐私,而且还能防范重放攻击,能够很好地满足RFID系统的安全性要求。  相似文献   

17.
Radio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of the medicine, clothes, and belongings after the point of sales. At the same time, with the development of semiconductor industry, handheld terminals and mobile phones are becoming RFID-enabled. Unauthorized mobile RFID readers could be abused by the malicious hackers or curious common people. Even for authorized RFID readers, the ownership of the reader can be transferred and the owners of the authorized mobile reader may not be always reliable. The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications. In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. The output of the tags is randomized to prevent unauthorized tracking of the RFID tags. An instance of the protocol A is implemented in 0.13-μm CMOS technology, and the functions are verified by field programmable gate array. The baseband consumes 44.0 μW under 1.08 V voltage and 1.92 MHz frequency, and it has 25,067 gate equivalents. The proposed protocols can successfully resist most security threats toward open-loop RFID systems except physical attacks. The timing and scalability of the two protocols are discussed in detail.  相似文献   

18.
功率放大器是UHF RFID系统的重要模块,也是RFID系统中功耗最大的器件。本文采用TSMC0.18rf CMOS工艺,设计了一款用于RFID的线性功率放大器。在915 MHz频段,最大输出功率为17.8 dBm,饱和效率达到了40%,输出1 dB压缩点(P1dB)为15.4 dBm,其小信号增益达到了28.7 dB。  相似文献   

19.
在分析RFID系统接收数据的特征的基础上,提出一种基于相关操作的数字解调器设计.该解调器可对低信噪比且具有较大频偏的接收数据完成频偏估计并进行解码.仿真结果显示,该解调器可对信噪比≥6dB、频偏+/-22%之内的数据进行正确解调,FPGA测试结果表明,应用该解调电路后阅读器和标签的通讯距离可达4米以上.本文采用的设计思想亦可拓展到除RFID系统外其他低接收信噪比、大频偏信号的接收机设计中.  相似文献   

20.
The Journal of Supercomputing - Internet of things (IoT) is renowned for being a massive revolution led by business leaders and researchers. Routing protocol for low-power and lossy network (RPL)...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号