期刊文献+

基于RFID的局域网安全管理的研究 被引量:3

Research on Security Management of LAN Based on RFID
下载PDF
导出
摘要 为实现分布式局域网络系统中的信息处理与传递的安全,分析在局域网络中利用RFID技术,建立信息安全日志并进行管理的系统模型,实现信息安全交换及安全操作;定义了系统实现框架的五层表述,对人员认证、操作权限、信息传递、数据处理的合法性等检验依据建立了相应规范标准,具体研究了安全防护体系软硬件管理机制及管理规范,论述了在实现网络安全的软件开发中采用的安全认证、数据隔离、数据加密的原理;实际运行表明基于该网络安全管控机制下的安全管理系统可实现"事前预防、事中控制、事后审查"。 In order to realize information processing and transferring in security, a distributed local area network system model based on RFID is analysed, in which information is exchanged and operated in a security state, and the log file of operating information is set up and managed. In this model, five layers frame is expressed and the criterion is set up to verify the validity of personnel authentication, operation purview, information transferring and data processing. Security system mechanism and criterion in software and hardware management is researched, theory of security authentication and data isolation and encrypt in implementing LAN security by software development is discussed. By demonstration, the demand of defending before the let out the secret, processing information under control, censoring after the event is implemented in the security management system under this security control mechanism.
出处 《计算机测量与控制》 CSCD 北大核心 2012年第4期1067-1069,共3页 Computer Measurement &Control
关键词 RFID 局域网络 系统模型 安全 radio frequency identification (RFID) local area network (LAN) system model security
  • 相关文献

参考文献7

二级参考文献71

共引文献78

同被引文献30

  • 1LIU Yuhong, QIU Ya. An Indoor Location of UHF RFID U- sing Hybrid Approach[C]/2012 IEEE Consumer Electronics, Communications and Networks, Three Gorges, China, 2004,3 : 1653-1655.
  • 2R. Kronberqer, T. Knie, R. Leonardi, et al. UHF RFID lo- :alization system based on a phased array antenna[C]//IEEE Antennas Propag Soc AP S Int Symp. Spokane, WA, United states, 2011 : 525 528.
  • 3Jason Guan. REVOLUTION OF RFID IN RETAILING [C]//The Second China and U. S. Advanced Workshop in Electronic Commerce 2004,2004,11 : 1192-1193.
  • 4LIU Hailong, CHEN Qun. Optimization Techniques for RFID Complex Event Processing[J]. Journal of Computer Science and Technology, 2009,4 - 53-55.
  • 5QIAO Hong, ZU Haiyao. Research on Logistic Information System Based on RFID[C]//Proceedings of 2008 IEEE 9th International Conference on Computer-Aided Industrial De- sign - Conceptual Design Vol. 1,2008,11 : 958-960.
  • 6睢丹.基于Agent分布式机房管理系统的设计与实现[D].华东师范大学硕士学位论文,2008.
  • 7Klaus FinkenzeUer.RFID Handbook-Funda- mentals & Applications in Contactless Smart Cards & Identification 3e [M].Wiley-BlackweU, 2005.
  • 8Xuemin Shen,Mohsen Guizani,Rober Calming Qiu,Tho Le-Ngoc. Ultra-Wideband Wireless Communications and Network.Wiley.2006.
  • 9朱晓荣,齐丽娜,孙君,等.物联网与泛在通信技术[D].人民邮电出版社,2010.11.
  • 10MAHDIN H,ABAWAJY J.An approach for removing redundant data from RFID data streams[J].Sensors, 2011, 11 (10) : 9863 -9877.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部