期刊文献+

一种基于B+树的RFID抗冲突算法 被引量:1

An Anti-collision Algorithm in RFID Based on B+ TREE
下载PDF
导出
摘要 针对二进制树形算法冲突集合分裂速度慢、标签分裂不均匀问题,提出一种基于B+树的RFID抗冲突算法.本算法将冲突集合分裂成一个3阶的B+树,即将每次发生冲突的集合分裂成3个子集,从而加快冲突集合的分裂速度,冲突集合相当于B+树的中间节点,每个子集分别对应于一个关键码,叶子节点或只包含一个标签或为一个空集合.为了防止集合分裂的不均匀,引入合适的hash函数,使集合均匀分裂.仿真实验表明,B+算法减少了标签冲突的发生,缩短了标签识别延时,提高了识别性能. An improved anti-collision algorithm based on B + tree was proposed. In this algorithm, the collision tags split into three smaller aggregations at each round so as to quicken the rate of splitting. Collision aggre-gation corresponds to the intermediate node of the B + tree. Each key corresponds to a splitted aggregation. Each leaf of the tree contains one tag or null. Meanwhile this algorithm made use of hash operation to average splitting . Simulating results show that the B + algorithm reduced collision, shortened the identify delay and improve the identify performance.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第6期72-75,共4页 Journal of Hunan University:Natural Sciences
基金 国家自然科学基金资助项目(60673061) 高等教育学校博士学科点基金资助项目(20060532024) 长沙市科技攻关资助项目(K069015-12) 高等学校博士学科点专项科研基金资助项目(新教师基金200805321056)
关键词 无线电 冲突避免 射频识别 抗冲突算法 B+树 HASH radio collision avoidance radio frequency identificationl (RFID) anti-collision algorithm B + tree hash
  • 相关文献

参考文献7

二级参考文献11

共引文献329

同被引文献14

  • 1CHIEN Hung-yu. SASI:a new ultra-lightweight RFID authen- tication protocol providing strong authentication and strong in- tegrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 2LIAO Yi-pin, HSIAO Chih-ming. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer pro- tocol[J]. Ad Hoc Networks, 2013, http://dx, doi. org/10. 1016/j. adhoc. 2013.02. 004.
  • 3MASOUD H D,YOUSOF F. Improvement of the Hash-hased RFID mutual authentication protoeol [J]. Wireless Personal Communieatios, 2013, http://dx, doi. org/10. 1007/s11277- 013-1358-7.
  • 4YEH Tzu-chang, WU Chien-hung, TSENG Yun-min. Im- provement of the RFID authentieation scheme based on quad- ratic residues[J], Computer Communications, 2011, 34 (3) : 337-341.
  • 5TIAN Yun, CHEN Gong-liang, LI Jian-hua. A new ultra- lightweight RFID authentication protoeol with permutation [J]. IEEE Communications Letters, 2012, 16(5): 702-705.
  • 6GILDAS A, XAVIER C, BENJAMIN M. Privacy-friendly synchronized ultralightweight authentication protocols in the storm[J]. Journal of Network and Computer Applications, 2012, 35(2): 826-843.
  • 7LEE Chin-feng, CHIEN Hung-yu, LAIH Chi-sung. Server- less RFID authentication and searching protocol with enhanced security [J]. International Journal of Communication Systems, 2012, 25: 376-385.
  • 8TAN C C,BO S, LI Qun. Secure and serverless RFID authen- tication and search protocols [J]. IEEE Transactions on Wire- less Communications, 2008,7 (3) : 1400- 1407.
  • 9MASOUMEH S, PEDRO P, NASOUR B, etal. On the secu- rity of Tan et al. serverless RFID authentication and search protocols[C]//RFIDSec'12, 2012 : 1 - 19.
  • 10AHAMED S I,RAHMAN F, HOQUE E,et al. S3PR: secure serverless search protocols for RFID[C]//International Con- ference on Information Security and Assurance (ISA 2008), Busan, Korea, 2008: 187-192.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部