期刊文献+

农产品电子标签防伪系统逆向攻击模型 被引量:2

Reverse attacking model of RFID tag anti-counterfeit system for agricultural product
下载PDF
导出
摘要 目前制售假劣农产品严重困扰着农业的正常生产,研究一种高效的防伪系统从源头上制止农产假冒伪造具有重要的意义。本文在研究国内外先进防伪技术的基础上,提出了一种基于无线射频识别(RFID)技术的农产品防伪系统,并且在此基础上提出了层次化防伪策略,并且建立了防伪逆向攻击模型这种形式化的分析方法来智能化的配置防伪系统。结果表明该模型能够定位农产品防伪系统中的脆弱节点,提升防伪系统的安全强度。 Nowadays producing and selling the counterfeited agricultural products are becoming more and more serious impact on the normal agricultural production.Study an efficient anti-counterfeiting method to protect agricultural products thoroughly from counterfeiting is of a great significance.In this paper,based on the domestic and foreign anti-counterfeiting technologies,authors proposed an anti-counterfeiting system for agricultural products using RFID technology.Furthermore authors put forward a hierarchical anti-counterfeiting strategy and established a anti-counterfeiting reverses attacking model which adopted formal analysis approach of intelligent deployment.The results showed that the proposed model was capable to locate the weakest nodes in the agricultural products anti-counterfeiting system to enhance the security strength.
出处 《农业工程学报》 EI CAS CSCD 北大核心 2009年第S2期97-103,共7页 Transactions of the Chinese Society of Agricultural Engineering
基金 国家科技支撑计划项目(2006BAD10A04 2008BADA0B05) 国家自然科学基金(60871042) 国家农业部"948"项目(2006-G63)
关键词 农产品 安全测试 模型 RFID 代价树 agricultural product,safe test,models,RFID,cost-tree
  • 相关文献

参考文献17

  • 1高庆吉,于咏生,胡丹丹.基于改进A*算法的可行性路径搜索及优化[J].中国民航学院学报,2005,23(4):42-45. 被引量:15
  • 2武虎,李少远.基于局部信息的滚动优化与机器人路径规划[J].系统仿真学报,2004,16(8):1680-1682. 被引量:6
  • 3Jeremy L.The history of RFID. IEEE Transactions on Potentials . 2005
  • 4Roy W.An introduction to RFID technology. IEEE Transactions on Pervasive Computing . 2006
  • 5Law C,Lee K,Siu K Y.Efficient memoryless protocol for tag identification. Proceedings of the4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications . 2000
  • 6EPCglobal Inc.EPC Radio-Frequency Identity Protocols Class1Generation-2UHF RFID Protocol for Communications at860MHz-960MHz. . 2005
  • 7Thompson DR,Chaudhry N,Thompson CW.RFID security threat model. Conference on Applied Research in Information echnology . 2006
  • 8Kim J,Kim H.Anti-counterfeiting solution employing mobile RFID environment. Transactions on Engineering,Computing and Technology . 2005
  • 9Lehtonen,M,Staake T,Michahelles F.From identification to authentication-a Review of RFID Product authentication techniques. workshop on RFID security . 2006
  • 10Bjonsson Y,Enzenberger M,Robert C H et al.Fringe Search:beating A*at Path finding on Game Maps. IEEE Symposium on Computational Intelligence Games . 2005

二级参考文献11

  • 1张颖,吴成东,原宝龙.机器人路径规划方法综述[J].控制工程,2003,10(z1):152-155. 被引量:66
  • 2Nils J Nilsson. Problem-Solving Methods in Artificial Intelligence,Artificial Intelligence:A new Synthesis[Z]. San Francisco,CA,USA:Morgan Kaufmann Publishers Inc,2000.
  • 3Anthony Stentz. The Focused D* Algorithm for Real-Time Replanning[A]. In:Procedings of the Interruttional Joint Conference on Artificial Intelligence[C]. 1995.
  • 4Tsai-'Yen Li,Chih-Ching Chang. Path Planning with Incremental Roadmap Update for Large Environments[A]. In:Proceedings of the 2001 IEEE lnternatioru:d Conference on Robotics & Automation[C]. Seoul, Korea,2001.
  • 5Dorigo M, Maniezzo V,Colorni A. Ant system:optimization by a colony of cooperating agent[J]. IEEE Tran.sactiorts on Systems Man and Cybernetics, 1996,26(1 ):29-41.
  • 6Joao Miguel da Costa Sousa,Uzay Kaymak.Model Predictive Control Using Fuzzy Decision Functions [J].IEEE Trans on Systems,Man and Cybernetics-Part B,2001,31(1):54-65.
  • 7LI Shaoyuan,Yang Yipeng.On-Line Constrained Predictive Control Algorithm using Multi-Objective Fuzzy-Optimization and a Case Study [J].Fuzzy Optimization and Decision Making,2003,2(2):123-142.
  • 8张纯刚,席裕庚.全局环境未知时基于滚动窗口的机器人路径规划[J].中国科学(E辑),2001,31(1):51-58. 被引量:77
  • 9杨翊鹏,李少远.模糊优化算法及其在视觉机器人路径规划中的应用[J].控制与决策,2002,17(B11):723-726. 被引量:7
  • 10叶涛,陈尔奎,杨国胜,侯增广,谭民.全局环境未知时机器人导航和避障的一种新方法[J].机器人,2003,25(6):516-520. 被引量:16

共引文献17

同被引文献93

引证文献2

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部