期刊文献+

基于免疫和多Agent的RFID入侵检测模型研究 被引量:2

Study on intrusion detection model for RFID system based on immune and multi-Agent
下载PDF
导出
摘要 针对无线射频识别技术(RFID)的加密认证等安全策略在廉价标签上的局限性,引入了入侵检测的RFID新型安全策略。通过分析RFID系统的典型安全攻击,提出了基于信道日志和应用日志融合统计的入侵特征提取方法。参考生物免疫机理建立了RFID入侵检测模型多Agent体系结构,参考免疫耐受原理设计了检测器生成Agent BDI模型,参考层次防御和免疫记忆设计了检测Agent BDI模型。最后分析了模型的多层次性、自适应性和健壮性。 It is very hard to develop encryption technology used in cheap RFID(Radio Frequency Identification) tags.In this paper,intrusion detection,as a new methodology,is adopted to create security model for RFID system.By analyzing typically security attacks on RFID systems,a solution to get characters of intrusion by integration and statistics of channel log and application log is proposed.A multi-agent structure of RFID intrusion detection is designed based on biological immune mechanism.A BDI model of detector produce agent is designed based on immune tolerance.A BDI model of ddtecting agent is designed based on multilevel defense and immune memory.At last,multilevel,adaptability and robustness of the model are analyzed.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第35期94-98,共5页 Computer Engineering and Applications
基金 广东省工业科技攻关计划项目(No.2007B010200046) 教育部高校博士点基金项目(No.20070561081)
关键词 射频识别 入侵检测 免疫 AGENT Radio Frequency Identification(RFID) intrusion detection immune Agent
  • 相关文献

参考文献8

  • 1Juels A.RFID Security and privacy:A research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-392.
  • 2于宇,杨玉庆,闵昊.RFID标签的安全建模及对EPCC1G2协议的改进[J].小型微型计算机系统,2007,28(7):1339-1344. 被引量:8
  • 3Steven A H.An Interpretative Introduction to the Immune System. [EB/OL].(2007 ).http://www.cs.unm.edu/-steveah/imm-overview-new.pdf.
  • 4Timmis J.Artificial immune systems:a novel data analysis technique inspired by the immune network theory[D].Wales:University of Wales ,2000.
  • 5Kinny D,Georgeff M,Rao A.A methodology and modeling technique for systems of BDI agents[C]//Van de Velde W,Perram J W. LNAI 1038:Proceedings of the Seventh European Workshop on Modeling Autonomous Agents in a Multi-Agent World.Berlin, Germany: Springer-Verlag : 1996 : 56-71.
  • 6Wooldridge M.Intelligence agent[M]//Weiss G.Multi-agent system:A modem approach to Distributed Artificial Intelligence.[S.l.]:MIT Press, 1999 : 27-78.
  • 7de Castro L N,Von Zuben F J.An evolutionary network for data clustering[C]//Proceedings 6th Brazilian Symposium on Neural Networks, 2000: 84-89.
  • 8Forrest S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[C]//Proceeding IEEE Symposium on Research in Security and Privacy,1994:202-212.

二级参考文献11

  • 1EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9.[Z]Jan.30,2005.
  • 2Juels A,Pappu R.Squealing euros:privacy-protection in RFID-enabled banknotes,financial cryptography[M].Springer-Verlag,2003,103-121.
  • 3Engberg S,Harning M,Damsgaard Jensen C.Zero-knowledge device authentication:Privacy and security enhanced RFID preserving business value and consumer convenience[C].The Second Annual Conference on Privacy,Security and Trust-PST,New Bruswick,Canada,2004.
  • 4Zhang Xiao-lan,Brian King.Modeling RFID security[M].Lecture Notes in Computer Science,Volume 38822/2005,75-90,Springer Berlin/Heidelberg.
  • 5Sarma S E.Towards the five-cent tag.Technical Report MIT-AUTOID-WH-006,Auto-ID Labs,2001[EB/OL].Referenced at http://www.autoidlabs.org/.
  • 6SMIC 0.18 Logic 18 Process 1.8-Volt SAGE-XTM Standard Cell Library Databook[Z].Release 1.0,March 2004.
  • 7Marc Joye,Jean-Jacques Quisquater.Strong authentication for RFID systems using the AES algorithm[C].CHES 2004,LNCS 3156,2004,357-370.
  • 8Menezes A J,van Oorschot P C,Vanstone S A.Handbook of applied cryptography[M].CRC Press,1996.
  • 9David J.Wheeler,Roger M.Needham,TEA,a tiny encryption algorithm Proc.Fast software encryption[C].Second International Workshop,Lecture Notes in Computer Science,vol.1008,December 1994,363-366.
  • 10Israsena P.Securing ubiquitous and low-cost RFID using tiny encryption algorithm[C].Wireless Pervasive Computing,2006 1st International Symposium,16-18 Jan.2006,1-4.

共引文献7

同被引文献43

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2刘勇,蒲树祯,程代杰,曹泽翰.BDI模型信念特性研究[J].计算机研究与发展,2005,42(1):54-59. 被引量:7
  • 3Alchourron C E.On the logic of theory change: partial meet contraction and revision funetions[J].The Journal of Symbolic Logic, 1985,50(2) : 510-530.
  • 4Gardenfors P, Makinson D.Revisions of knowledge systems us- ing epistemic entrenchment[C]//Proc of the Second Conf on Theoretical Aspects of Reasoning About Knowledge, 1988: 83-95.
  • 5Nebel B.A knowledge level analysis of belief revision[C]// Proc of the First Interl Conf on Principles of Knowledge Representation and Reasoning,Morgan Kaufman, 1989: 301-311.
  • 6Dalai M.Investigations into a theory of knowledge base revi- sion: preliminary report[C]//Proc of the Seventh National Conf on A1,1988:475-479.
  • 7Galam S.Modeling rumors: The no plane pentagon french hoax case[J].Physica A: Statistical Mechanics and its Applications, 2003,320: 571-580.
  • 8Moreno Y, Nekovee M, Pacheco A F.Dynamics of rumor spread- ing in complex networks[J].Physical Review E-Statistical,Nonlin- ear,and Soft Matter Physics,2004,69(62):1301-1307.
  • 9王智斌 许俭 周皓峰 等.基于作者权威度分析的网络社区信息检索方法.计算机科学,2007,:65-67.
  • 10Barmerjee A V.A simple model of herd behavior[J].Quarterly Journal of Economics, 1992,107:797-817.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部