期刊文献+

快速检测RFID复制标签的算法研究

Fast cloned tags detection algorithm in large-scale RFID systems
下载PDF
导出
摘要 针对大型的RFID系统中使用标签ID无法识别具体复制标签的问题,提出了一种快速检测复制标签的CTDA算法。首先,标签内存储k个哈希函数,标签在接收到阅读器的查询帧后多次回复阅读器构造虚拟克鲁姆过滤器,找到阅读器通信区域内的标签集合M;然后,M中标签通过多轮哈希运算使得阅读器构建时隙状态向量,目的是给每个标签分配单一时隙;最后,标签向阅读器回复10 bit信息,阅读器通过检测各个时隙是否由单一时隙变成冲突时隙来判断标签是否受到复制。经过仿真分析,证明该算法在执行时间上优于Bu K提出的GREAT算法和Qiao Yan提出的轮询协议RIP算法。 Since specific cloned tags can’t be detected using only ID in large-scale RFID systems,a fast cloned tags detection algorithm,CTDA algorithm,is proposed.Firstly,tags storage k numbers Hash function,and reply reader k times within a frame constructing to build virtual Bloom filter through which tags set M in the reader communication area canbe find quickly.Secondly,tags on set M perform several rounds of Hash algorithm to make the reader to build time-slotstate vector.The purpose is to assign each tag a single time-slot.Finally,tags on set M reply the reader back with10bit information.The reader judges whether the label is being cloned by examining whether a single time-slot becomes into a conflict time-slot.Through the simulation analysis,it proves that the algorithm has quicker execution time than GREAT algorithm and RIP algorithm.
作者 李娟娟 龚向阳 LI Juanjuan;GONG Xiangyang(Departmetn of Physics, Lvliang College, Lvliang, Shanxi 033000, China;State Key Laboratory for Networks and Switching Technology, Beijing University of Posts and Telecommunications,Beijing 100876, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第8期106-112,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.61271041)
关键词 无线射频识别 复制标签识别 克鲁姆过滤器 多哈希函数 冲突时隙 Radio Frequency Identification(RFID) cloned tags detection Bloom filter multi-Hash function conflict time-slot
  • 相关文献

参考文献3

二级参考文献41

  • 1余雷.基于RFID电子标签的物联网物流管理系统[J].微计算机信息,2006(01Z):233-235. 被引量:112
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 5Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 6Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 7Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 8Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 9Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 10Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140

共引文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部