天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

大規(guī)模RFID系統(tǒng)中快速識(shí)別克隆標(biāo)簽算法研究

發(fā)布時(shí)間:2018-12-12 05:42
【摘要】:RFID (Radio Frequency Identification)是一種無(wú)線射頻識(shí)技術(shù),可實(shí)現(xiàn)自動(dòng)識(shí)別和數(shù)據(jù)采集,其最大的優(yōu)點(diǎn)是非接觸識(shí)別。除此之外,RFID系統(tǒng)在閱讀距離、抗干擾能力、讀取速等方面都有顯著優(yōu)勢(shì),因而被廣泛的應(yīng)用在倉(cāng)庫(kù)管理、電子支付、目標(biāo)監(jiān)測(cè)與跟蹤等各個(gè)領(lǐng)域。 隨著科技與經(jīng)濟(jì)的的快速發(fā)展,人們對(duì)各類商品的需求量也迅速增加,隨之出現(xiàn)了大量的假冒偽造產(chǎn)品,雖然商家們不斷的尋求防假防偽的手段,但仍無(wú)法徹底杜絕假冒偽造產(chǎn)品。假冒偽造產(chǎn)品給世界政治、經(jīng)濟(jì)、文化等各方面造成了巨大損失,已成為世界性難題。商品尤其是與人們生命安全密切相關(guān)商品的防偽一直受到全世界的關(guān)注。大規(guī)模使用的RFID系統(tǒng)在展現(xiàn)其優(yōu)勢(shì)的同時(shí)也暴露了其自身存在的缺陷,標(biāo)簽的可復(fù)制性(即克隆標(biāo)簽)成為防偽的絆腳石。 電子標(biāo)簽的價(jià)格低廉,結(jié)構(gòu)簡(jiǎn)單,安全性較差,為了提高其安全性,一些防克隆協(xié)議使用加密的的方法增加標(biāo)簽克隆的難度,這種方法并不能徹底杜絕克隆攻擊,而且需要額外的硬件資源和密鑰管理策略,這對(duì)于低成本的標(biāo)簽是很難實(shí)現(xiàn)的。貼有克隆標(biāo)簽的商品擁有正常商品的一切屬性,因此通過(guò)查詢防偽、認(rèn)證等均無(wú)法辨別其真假。通過(guò)研究發(fā)現(xiàn),克隆攻擊不能簡(jiǎn)單的通過(guò)提高電子標(biāo)簽的硬件結(jié)構(gòu)來(lái)解決。 近些年,不少專家學(xué)者開(kāi)始研究克隆標(biāo)簽檢測(cè)算法,現(xiàn)存的克隆攻擊檢測(cè)算法多利用標(biāo)簽ID的唯一性,每個(gè)標(biāo)簽都有唯一的ID,如果某個(gè)標(biāo)簽ID同時(shí)對(duì)應(yīng)多個(gè)屬性(如標(biāo)簽位置、同步密鑰等),那么說(shuō)明該標(biāo)簽受到了克隆攻擊。然而這些算法必須要對(duì)標(biāo)簽ID進(jìn)行廣播,這樣就泄露了用戶或者商品的信,不適用于對(duì)隱私敏感的應(yīng)用中。還有一些其他的算法雖然不需要廣播標(biāo)簽的ID,但僅局限于檢測(cè)是否有克隆標(biāo)簽存在,而不能檢測(cè)出所有的克隆標(biāo)簽。此外,克隆標(biāo)簽的檢測(cè)還應(yīng)符合實(shí)際應(yīng)用,對(duì)于無(wú)源標(biāo)簽,通信距離是非常有限的,即使是有源標(biāo)簽,其通信距離也只有100英尺左右,因此,在大型RFID系統(tǒng)(標(biāo)簽個(gè)數(shù)少則幾萬(wàn),多則數(shù)以億計(jì))中一般有多個(gè)RFID閱讀器,而傳統(tǒng)的算法只適合在單一閱讀器的RFID系統(tǒng)中。本文中,我們針對(duì)現(xiàn)存算法的不足,提出一種新的克隆標(biāo)簽識(shí)別算法——大規(guī)模RFID系統(tǒng)中快速識(shí)別克隆標(biāo)簽算法(CAIP)。該算法首次提出在多閱讀器的大規(guī)模RFID系統(tǒng)中識(shí)別所有克隆標(biāo)簽。 首先,我們利用布魯姆過(guò)濾器快速查找待檢測(cè)閱讀器覆蓋范圍內(nèi)的所有標(biāo)簽,然后利用多Hash函數(shù)為每個(gè)標(biāo)簽分配一個(gè)單一時(shí)隙,閱讀器通過(guò)檢測(cè)各時(shí)隙的狀態(tài)來(lái)判斷標(biāo)簽是否受到克隆攻擊。經(jīng)過(guò)仿真證明,該算法能在多個(gè)閱讀器的RFID系統(tǒng)中迅速識(shí)別所有的被克隆標(biāo)簽。
[Abstract]:RFID (Radio Frequency Identification) is a radio frequency recognition technology, which can realize automatic identification and data acquisition, and its biggest advantage is non-contact identification. In addition, RFID system has significant advantages in reading distance, anti-jamming ability, reading speed and so on, so it is widely used in warehouse management, electronic payment, target monitoring and tracking and other fields. With the rapid development of science and technology and economy, the demand for all kinds of commodities has increased rapidly, and a large number of counterfeit and counterfeit products have appeared, although merchants are constantly seeking to prevent counterfeiting and forgery. However, it still can not completely eliminate counterfeit products. Counterfeit products have caused great losses to the world politics, economy, culture and so on, and have become a worldwide problem. The anti-counterfeiting of commodities, especially those closely related to people's life safety, has been concerned all over the world. Large-scale RFID system not only shows its advantages, but also exposes its own defects. The replicability of tags (that is, cloning tags) becomes a stumbling block of anti-counterfeiting. In order to improve its security, some anti-cloning protocols use encryption methods to increase the difficulty of tag cloning. This method can not completely eliminate cloning attacks. Moreover, additional hardware resources and key management strategies are required, which is difficult to achieve for low-cost tags. The products with cloned labels have all the properties of normal goods, so they can not distinguish the true and false through inquiry, authentication and so on. It is found that cloning attack can not be solved simply by improving the hardware structure of electronic tag. In recent years, many experts and scholars have begun to study the clonal tag detection algorithm. The existing clone attack detection algorithms make use of the uniqueness of tag ID, and each tag has a unique ID,. If a tag ID has multiple attributes (such as tag location, synchronization key, etc.) at the same time, then the tag is under cloning attack. However, these algorithms must broadcast the label ID, thus revealing the letters of users or products, which are not suitable for privacy sensitive applications. There are some other algorithms that do not require ID, of broadcast tags, but only detect the existence of cloned tags, but can not detect all cloning tags. In addition, the detection of cloned tags should conform to the practical application. For passive tags, the communication distance is very limited, even for active tags, the communication distance is only about 100 feet, so, In large RFID systems (tens of thousands of tags and hundreds of millions of tags), there are usually multiple RFID readers, but the traditional algorithm is only suitable for RFID systems with a single reader. In this paper, we propose a new clonal tag recognition algorithm, (CAIP)., which is a fast recognition algorithm for large scale RFID system, aiming at the shortcomings of the existing algorithms. This algorithm is the first time to identify all the cloned tags in a large scale RFID system with multiple readers. First, we use the Bloom filter to quickly find all the tags covered by the reader to be detected, and then use the multiple Hash function to assign a single slot for each tag. The reader detects the state of each slot to determine whether the tag is attacked by cloning. Simulation results show that the algorithm can quickly identify all the cloned tags in RFID systems with multiple readers.
【學(xué)位授予單位】:太原理工大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP391.44

【參考文獻(xiàn)】

相關(guān)期刊論文 前4條

1 俄廣西,龔耀寰;移動(dòng)通信中的空分多址技術(shù)[J];電訊技術(shù);2002年02期

2 謝勝眉;趙軍輝;;基于最優(yōu)化原理的RFID系統(tǒng)中的ALOHA防碰撞算法研究[J];電路與系統(tǒng)學(xué)報(bào);2009年04期

3 陶玉芬;;RFID技術(shù)應(yīng)用展望[J];電腦應(yīng)用技術(shù);2007年01期

4 李興鶴;胡詠梅;王華蓮;付延安;郭春花;;基于動(dòng)態(tài)二進(jìn)制的二叉樹(shù)搜索結(jié)構(gòu)RFID反碰撞算法[J];山東科學(xué);2006年02期

,

本文編號(hào):2374026

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/jingjilunwen/zhengzhijingjixuelunwen/2374026.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶a5395***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com