期刊文献+

一种有效提高RFID系统物理层安全性能的方法 被引量:3

An Effective Method of Improving Security Performance of RFID System Physical Layer
下载PDF
导出
摘要 传统的射频识别(RFID)系统在通信过程中的信息有可能被恶意用户窃听,造成保密信息外泄。为此,提出一种提高RFID系统物理层安全性能的方法。以安全容量为评价指标,分析2种不同情景:当窃听者信息可获知时,通过中继选择的方式保证通信安全,使得安全容量最大化,当窃听者信息无法获知时,采用人工干扰的方式降低窃听者能力,得到最佳的功率分配方案。仿真结果表明,该方法用极小的干扰功率能够大幅提高系统的安全容量。 The information in the traditional Radio Frequency Identification( RFID) system during the communication process may be intercepted by malicious users, resulting in the leakage of confidential information. Therefore,a method of improving the security performance of the physical layer of RFID system is proposed. Using security capacity as an evaluation index,two different scenarios are analyzed: When eavesdropper information is known,the security of the communication is ensured through relay selection,which maximizes the security capacity,when the eavesdropper information cannot be known,manual interference is used to reduce the eavesdropper's ability geting the best power distribution scheme. Simulation results show that this method can greatly improve the system security capacity with minimal interference power.
作者 宋慧颖 高媛媛 沙楠 SONG Huiying;GAO Yuanyuan;SHA Nan(College of Communication Engineering, PLA University of Science and Technology, Nanjing 210000, China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第5期119-123,共5页 Computer Engineering
基金 国家自然科学基金"无线双向中继信道中基于CPM的物理层网络编码技术研究"(61501511)
关键词 射频识别 物理层安全 中继选择 人工噪声 功率分配 Radio Frequency Identification (RFID) physical layer security relay selection artificial noise power allocation
  • 相关文献

参考文献5

二级参考文献84

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381- 394.
  • 3Sarma S, Weis S, Engels D. RFID Systems and Security and Privacy Implications[C]//Proc. of the 4th Int’l Workshop on Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer, 2002: 454-469.
  • 4Weis S A, Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C]// Proc. of the 1st Security in Pervasive Computing. Berlin, Germany: Springer, 2003: 201-212.
  • 5Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forward- secure Privacy Protection Scheme for Low-cost RFID[C]//Proc. of 2004 Symposium on Cryptography and Information Security. Berlin, Germany: Springer, 2004: 719-724.
  • 6Rhee K, Kwak J, Kim S, et al. Challenge-response Based RFID Authentication Protocol for Distributed Database Environment[C]// Proc. of the 2nd Int’l Conference on Security in Pervasive Computing. Berlin, Germany: Springer, 2005: 70-84.
  • 7Henrici D, Mauller P. Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying Identifiers[C]//Proc. of the 2nd IEEE Annual Conference on Pervasive Computing and Communications. Los Alamitos, USA: IEEE Computer Society, 2004.
  • 8Lee S M, Hwang Y J, Lee D H, et al. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of the International Conference on Computational Science and Its Applications. Berlin, Germany: Springer, 2005: 619-627.
  • 9Canniere C D, Preneel B. Trivium Specifications[EB/OL]. [2011-05-20]. http: //www.ecrypt.eu.org/stream.
  • 10Feldhofer M, Wolkerstorfer J. Hardware Implementation of Symmetric Algorithms for RFID Security[M]//Kitsos P, Zhang Y. RFID Security: Techniques, Protocols and System-on-Chip Design. [S. l.]: Springer, 2008: 373-415.

共引文献49

同被引文献15

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部