期刊文献+

改进型MBI防碰撞算法研究

An Improved MBI Anti-Collision Algorithm for Identification of RFID Tag
下载PDF
导出
摘要 在深入研究多比特识别算法MBI(Multi-Bit Identification Protocol)的基础上,从概率的角度对MBI机制进行分析建模,完善了MBI的理论基础。并且针对MBI算法通信开销较大问题,提出一种改进型多比特识别算法IMBI(Improved Multi-BitIdentification Protocol)。该算法在不增加原算法时间复杂度的前提下,通过引入滑动窗及部分碰撞比特恢复机制,解决了MBI算法中常规时隙标签冗余响应以及反演时隙下空闲分组造成的时延浪费问题,提升了系统识别性能。仿真结果表明,文章建立的模型对MBI算法有良好的逼近性能。此外,所提出的IMBI算法在标签平均消耗和系统时延上性能有大幅提升,进而提升了系统处理海量标签信息的能力。 Based on the in-depth study of MBI,a model for perfecting the theory of MBI is established from the view-point of probability in this paper. Furthermore,a improved Multi-Bit Identification Protoco(lIMBI)is proposed to re-duce the communication overhead of the conventional MBI algorithm. By means of introducing sliding window andpartial bits recovery mechanism,the proposed algorithm can solve the problems of tag response redundancy in regu-lar slot and idle groups in inversion slot simultaneously. In addition,it improves the efficiency of recognition inRFID system without increasing any time complexity. The simulations reveal that the model established has good ap-proximation performance. And the proposed algorithm has a better performance on tag average consumption and sys-tem delay,thus it improves the ability to deal with massive tag data.
出处 《传感技术学报》 CAS CSCD 北大核心 2016年第11期1711-1717,共7页 Chinese Journal of Sensors and Actuators
基金 面向动态本地无线环境的电波传播特征认知方法研究项目(61261010) 宽带无线通信与雷达感知融合系统关键技术研究项目(20142BCB23001)
关键词 射频识别 多比特识别 理论分析 滑动窗 部分比特碰撞机制 RFID MBI Theoretical Analysis sliding window partial bits recovery mechanism
  • 相关文献

参考文献3

二级参考文献42

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:99
  • 2Sarma S E,Weis S A,Engels D W. RFID Systems and Security and Privacy Implications [ C ]//Proc. of the 4 th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin, Germany : Springer-Verlag, 2003 : 454 -469.
  • 3Sarma S E, Weis S A, Engels D W. Radio Frequency Identification: Secure Risks and Challenges [ J ]. RSA Laboratories Crypto bytes, 2003,6( 1 ) :2-9.
  • 4Weis S A, Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems [ C ]// Proc. of the 1st International Conference on Security in Pervasive Computing. Berlin, Germany : Springer-Verlag ,2004:201-212.
  • 5Ohkubo M, Suzuki K, Kingships S. Hash-Chain Based Forward- Secure Privacy Protection Scheme for Low-Cost RFID[ C ]//Proc. of Symposium on Cryptography and Information Security. Sendai, Japan: [ s. n. ] ,2004:719-724.
  • 6Chen Y C, Wang Weilin, Huang M S. RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection [ C ]//Proc. of the 9th International Conference on Advanced Communication Technology. Phoenix Park, Korea: [ s. n. ] ,2007.
  • 7Osaka K,Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer [ C ]//Proc. of Computational Intelligence and Security. Guangzhou, China : [ s. n. ] ,2006 : 1090-1095.
  • 8Burrows M A, Needham R. Logic of Authentication [ J ]. ACM Transaction on Computer Systems, 1990,8 ~ 1 ) :18-36.
  • 9Landt J.The History of RFID[J].IEEE Potentials,2005,24(4):8-11.
  • 10Lin Y,Sylvester D,Blaauw D.An Ultra Low Power 1 V,220 nWTemperature Sensor for Passive Wireless Applications[C]/ / ProcIEEE Custom Integrated Circuits Conf(CICC),2008:507-510.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部