期刊文献+

基于UPPAAL的RFID定位系统准确性验证 被引量:1

Accuracy Verification of RFID Positioning System Based on UPPAAL
下载PDF
导出
摘要 随着移动通信和移动定位技术的快速发展,极大地推动了移动目标定位系统的发展。对于移动目标实时定位需求的与日俱增,人们更加注重移动目标实时定位的准确性和可靠性。介绍了时间自动机理论,并分析了基于RFID技术的移动定位处理流程。采用时间自动机模型对移动定位系统进行形式化分析,分别对定位系统的四个核心模块—标签、阅读器、数据库和处理器进行建模。为了验证定位系统的可靠性,通过构建各个模块中的动作行为状态,判定不同行为状态之间的转换是否满足时间约束条件。采用模型检测工具UPPAAL对建模后的定位系统进行活性验证和安全性验证分析。实验结果表明:所设计的定位模型不存在死锁问题,满足系统的安全性并能确保移动目标的精确定位。 Mobile positioning systems are greatly promoted with the rapid development of mobile communication and positioning technol- ogy. Due to the increasing demands of real-time moving targets positioning ,the accuracy and reliability of real-time positioning for mov- ing target is paid more attention. The time automaton theory is introduced and the process of mobile positioning based on RFID technolo- gy is analyzed in this paper. The mobile positioning system is formally analyzed by time automaton model. Four core modules,including tag, reader, database and processor, are respectively modeled. In order to verify the reliability of positioning system, through the construc- tion of state action in each model,it makes sure whether the conversion between different decision behavior state can meet the time con- straints. Active authentication and security verification of positioning system are analyzed by checking tool UPPAAL. The experimental results show that the positioning model exists no deadlock problems, with enough safety and accuracy positioning of the moving target.
出处 《计算机技术与发展》 2016年第9期104-108,113,共6页 Computer Technology and Development
基金 国家自然科学基金资助项目(61373139)
关键词 RFID定位系统 时间自动机 UPPAAL 模型验证 RFID positioning system time automaton UPPAAL model validation
  • 相关文献

参考文献14

  • 1丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 2游战清,戴青云等.无线射频识别系统安全指南[M].北京:电子工业出版社,2007.
  • 3杜治国,杨波,欧阳国帧,等.安全的RFID认证协议研究设计[J].计算机工程和设计,2009,30(3):561-565.
  • 4Springintveld J, Vaandrager F, D' Argenio P R. Testing timed automata [ J ]. Theoretical Computer Science, 1997,254 ( 1 ) : 225 -257.
  • 5Bozga M, Maler O,Pnueli A,et al. Some progress in the sym- bolic verification of timed automata [ J ]. Lecture Notes in Computer Science, 1997,1254 : 179-190.
  • 6周清雷,王静,赵东明.UPPAAL环境下通讯协议的自动验证[J].河南师范大学学报(自然科学版),2006,34(4):40-42. 被引量:2
  • 7Alur R, Dill D L. A theory of timed automata [ J ]. Theoretical Computer Science, 1994,126 ( 2 ) : 183-235.
  • 8Behrmann G, David A, Larsen K G. A tutorial on UPPAAL 4.0 [ R ]. Denmark : Aalborg University,2006.
  • 9Havelund K, Larsen K G, Skou A. Formal verification of a power controller using the real-time model checker UPPAAL [J]. Lecture Notes in Computer Science, 1999, 1601:277- 298.
  • 10Lindahl M, Pettersson P, Yi W. Formal design and analysis of a gear controller[ J]. International Journal on Software Tools for Technology Transfer,2001,3 (3) :353-368.

二级参考文献40

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献95

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部