期刊文献+

基于RFID的智能供应链系统应用研究

Application of Smart Suplly Chain System Based on RFID
原文传递
导出
摘要 目前,基于射频识别技术(RFID)的物联网的智能供应链管理在大型输配电企业中应用尚较少。对某大型输配电企业物资部门业务的调研分析后,对基于RFID的物联网技术在智能供应链领域的应用进行研究。按照SG-EA方法论,在分析业务现状以及业务需求的基础上,设计新一代智能供应链系统的业务架构、应用架构、数据架构、技术架构、安全架构,为智能物联网在大型输配电企业的应用打下坚实理论基础。 At present, the intelligent supply chain management of the Internet of things (IoT), based on radio fre-quency identification technology( RFID), has not been applied widely in large-scale power transmission and distribu- tion enterprises. Through the business survey of the supply department in a large power transmission and distribution company, the application of RFID-based technology of the Internet of things in the field of intelligent supply chain is studied. According to the SG-EA methodology, and on the basis of the current business analysis and business needs, this research designs a new generation of intelligent supply chain system, including its business architecture, applica-tion architecture, data architecture, technical architecture, and security architecture, which aims to lay a solid theo-retical basis for the application of intelligent IoT in the large power transmission and distribution enterprises.
出处 《华东电力》 北大核心 2013年第11期2378-2382,共5页 East China Electric Power
关键词 物联网 RFID 智能供应链 系统架构 安全架构 Internet of Things (IoT) RFID intelligent suplly chain system architecture security architecture
  • 相关文献

参考文献7

  • 1DANIEL GIUSTO, ANTONIO IERA, GIACOMO MORABI- TO, et al. The lntemet of Things 20th Tyrrhenian Workshop on Digital Communications, ISBN 978-1--4419-1673-0. Inter- national Telecommunication Union UIT ITU Internet Reports 2005 : The Intemet of Things, 2005.
  • 2彭朋,韩伟力,赵一鸣,周建锁,董浩然.基于RFID的物联网安全需求研究[J].计算机安全,2011(1):75-79. 被引量:26
  • 3孙知信,骆冰清,罗圣美,朱洪波.一种基于等级划分的物联网安全模型[J].计算机工程,2011,37(10):1-7. 被引量:18
  • 4GAO Kun-lun,ZHOA Ting,XU Zhi-bo,et al. A Cyber Secur- ity Solution for Internet of Things in Smart Grid.
  • 5YONG KI LEE, LEJLA BATINA, 1NGRID VERBAU- WHEDE. EC-RAC (ECD12 Based Randomized Access Con- trol): Provably Secure RFID authentication prntocol 2008 IEEE International Conference nn RFID,2008.4.
  • 6R1EBACK M R, CRISPO B, TANENBAUM A S. The Evolu- tion of RFID Security. IEEE Pervasive Computing, Vol..5, Issue 1, pp 62-69,2006.1.
  • 7J. LANDT B. CATLIN. Shrouds of time: the history of RFID. AIM White Paper,2001, 10.

二级参考文献37

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Telecommunication Union UIT ITU Internet R, eports 2005: The Internet of Things 2005.
  • 3A. Sarma, J. Girao. Identities in the Future Internet of Things. In: Wireless Personal Communications, Volume 49/2009, Springer Netherlands, 2009.
  • 4Juels Ari. RFID Security and Privacy: A Research Survey. Selected Areas in Communications, IEEE, 2006.
  • 5Pedro Peris-Lopez, dulio Cesar Hernandez-Oastro, Juan M. EstevezTa,niador, and Arturo Ribagorda. R, FID Systems: A Survey on Security Threats and Proposed Solutions, In: Personal Wireless Comnunications, Volume 4217/2006, Springer Berlin, Heideberg , 2006.
  • 6S. Weis. Security parallels between people and pervasive devices. In PERSEC'05. IEEE Computer Society Press, 2005, pages 105-109.
  • 7S. A. Weis, S Security and privacy identification systems. Sarma, R. P, ivest, and D. Engels. aspects of low cost radio frequency n First International Conference on Security in Pervasive Computing, ,2003.
  • 8OLESHCHUK V. Internet of things and privacy preserving technologies. In: Proc of 1st international Conference Communication, Vehicular Technology, Information on Wireless Theory and Aerospace a Electronic Systems Technology, 2009:336-340.
  • 9杨永志,高建华.试论物联网及其在我国的科学发展.http://d.g.wanfangdata.com.cn/Periodical_zgltjj201002013.aspx.
  • 10A. Mitrokotsa, M. R. Reback, and A. S. Tanenbaum Classfying RFID Attacks and Defenses, Information Systems Frontiers Special Issue on RFID, 2009.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部