天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

大規(guī)模RFID系統(tǒng)中快速識別克隆標簽算法研究

發(fā)布時間:2018-12-12 05:42
【摘要】:RFID (Radio Frequency Identification)是一種無線射頻識技術,可實現(xiàn)自動識別和數(shù)據(jù)采集,其最大的優(yōu)點是非接觸識別。除此之外,RFID系統(tǒng)在閱讀距離、抗干擾能力、讀取速等方面都有顯著優(yōu)勢,因而被廣泛的應用在倉庫管理、電子支付、目標監(jiān)測與跟蹤等各個領域。 隨著科技與經(jīng)濟的的快速發(fā)展,人們對各類商品的需求量也迅速增加,隨之出現(xiàn)了大量的假冒偽造產(chǎn)品,雖然商家們不斷的尋求防假防偽的手段,但仍無法徹底杜絕假冒偽造產(chǎn)品。假冒偽造產(chǎn)品給世界政治、經(jīng)濟、文化等各方面造成了巨大損失,已成為世界性難題。商品尤其是與人們生命安全密切相關商品的防偽一直受到全世界的關注。大規(guī)模使用的RFID系統(tǒng)在展現(xiàn)其優(yōu)勢的同時也暴露了其自身存在的缺陷,標簽的可復制性(即克隆標簽)成為防偽的絆腳石。 電子標簽的價格低廉,結構簡單,安全性較差,為了提高其安全性,一些防克隆協(xié)議使用加密的的方法增加標簽克隆的難度,這種方法并不能徹底杜絕克隆攻擊,而且需要額外的硬件資源和密鑰管理策略,這對于低成本的標簽是很難實現(xiàn)的。貼有克隆標簽的商品擁有正常商品的一切屬性,因此通過查詢防偽、認證等均無法辨別其真假。通過研究發(fā)現(xiàn),克隆攻擊不能簡單的通過提高電子標簽的硬件結構來解決。 近些年,不少專家學者開始研究克隆標簽檢測算法,現(xiàn)存的克隆攻擊檢測算法多利用標簽ID的唯一性,每個標簽都有唯一的ID,如果某個標簽ID同時對應多個屬性(如標簽位置、同步密鑰等),那么說明該標簽受到了克隆攻擊。然而這些算法必須要對標簽ID進行廣播,這樣就泄露了用戶或者商品的信,不適用于對隱私敏感的應用中。還有一些其他的算法雖然不需要廣播標簽的ID,但僅局限于檢測是否有克隆標簽存在,而不能檢測出所有的克隆標簽。此外,克隆標簽的檢測還應符合實際應用,對于無源標簽,通信距離是非常有限的,即使是有源標簽,其通信距離也只有100英尺左右,因此,在大型RFID系統(tǒng)(標簽個數(shù)少則幾萬,多則數(shù)以億計)中一般有多個RFID閱讀器,而傳統(tǒng)的算法只適合在單一閱讀器的RFID系統(tǒng)中。本文中,我們針對現(xiàn)存算法的不足,提出一種新的克隆標簽識別算法——大規(guī)模RFID系統(tǒng)中快速識別克隆標簽算法(CAIP)。該算法首次提出在多閱讀器的大規(guī)模RFID系統(tǒng)中識別所有克隆標簽。 首先,我們利用布魯姆過濾器快速查找待檢測閱讀器覆蓋范圍內(nèi)的所有標簽,然后利用多Hash函數(shù)為每個標簽分配一個單一時隙,閱讀器通過檢測各時隙的狀態(tài)來判斷標簽是否受到克隆攻擊。經(jīng)過仿真證明,該算法能在多個閱讀器的RFID系統(tǒng)中迅速識別所有的被克隆標簽。
[Abstract]:RFID (Radio Frequency Identification) is a radio frequency recognition technology, which can realize automatic identification and data acquisition, and its biggest advantage is non-contact identification. In addition, RFID system has significant advantages in reading distance, anti-jamming ability, reading speed and so on, so it is widely used in warehouse management, electronic payment, target monitoring and tracking and other fields. With the rapid development of science and technology and economy, the demand for all kinds of commodities has increased rapidly, and a large number of counterfeit and counterfeit products have appeared, although merchants are constantly seeking to prevent counterfeiting and forgery. However, it still can not completely eliminate counterfeit products. Counterfeit products have caused great losses to the world politics, economy, culture and so on, and have become a worldwide problem. The anti-counterfeiting of commodities, especially those closely related to people's life safety, has been concerned all over the world. Large-scale RFID system not only shows its advantages, but also exposes its own defects. The replicability of tags (that is, cloning tags) becomes a stumbling block of anti-counterfeiting. In order to improve its security, some anti-cloning protocols use encryption methods to increase the difficulty of tag cloning. This method can not completely eliminate cloning attacks. Moreover, additional hardware resources and key management strategies are required, which is difficult to achieve for low-cost tags. The products with cloned labels have all the properties of normal goods, so they can not distinguish the true and false through inquiry, authentication and so on. It is found that cloning attack can not be solved simply by improving the hardware structure of electronic tag. In recent years, many experts and scholars have begun to study the clonal tag detection algorithm. The existing clone attack detection algorithms make use of the uniqueness of tag ID, and each tag has a unique ID,. If a tag ID has multiple attributes (such as tag location, synchronization key, etc.) at the same time, then the tag is under cloning attack. However, these algorithms must broadcast the label ID, thus revealing the letters of users or products, which are not suitable for privacy sensitive applications. There are some other algorithms that do not require ID, of broadcast tags, but only detect the existence of cloned tags, but can not detect all cloning tags. In addition, the detection of cloned tags should conform to the practical application. For passive tags, the communication distance is very limited, even for active tags, the communication distance is only about 100 feet, so, In large RFID systems (tens of thousands of tags and hundreds of millions of tags), there are usually multiple RFID readers, but the traditional algorithm is only suitable for RFID systems with a single reader. In this paper, we propose a new clonal tag recognition algorithm, (CAIP)., which is a fast recognition algorithm for large scale RFID system, aiming at the shortcomings of the existing algorithms. This algorithm is the first time to identify all the cloned tags in a large scale RFID system with multiple readers. First, we use the Bloom filter to quickly find all the tags covered by the reader to be detected, and then use the multiple Hash function to assign a single slot for each tag. The reader detects the state of each slot to determine whether the tag is attacked by cloning. Simulation results show that the algorithm can quickly identify all the cloned tags in RFID systems with multiple readers.
【學位授予單位】:太原理工大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP391.44

【參考文獻】

相關期刊論文 前4條

1 俄廣西,龔耀寰;移動通信中的空分多址技術[J];電訊技術;2002年02期

2 謝勝眉;趙軍輝;;基于最優(yōu)化原理的RFID系統(tǒng)中的ALOHA防碰撞算法研究[J];電路與系統(tǒng)學報;2009年04期

3 陶玉芬;;RFID技術應用展望[J];電腦應用技術;2007年01期

4 李興鶴;胡詠梅;王華蓮;付延安;郭春花;;基于動態(tài)二進制的二叉樹搜索結構RFID反碰撞算法[J];山東科學;2006年02期

,

本文編號:2374026

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/jingjilunwen/zhengzhijingjixuelunwen/2374026.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶a5395***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com