[1]孔春明,黄茗涵,徐 鹤.RFID 系统克隆标签检测方法综述[J].计算机技术与发展,2022,32(08):122-128.[doi:10. 3969 / j. issn. 1673-629X. 2022. 08. 020]
 KONG Chun-ming,HUANG Ming-han,XU He.Overview of RFID System Clone Tag Detection Methods[J].,2022,32(08):122-128.[doi:10. 3969 / j. issn. 1673-629X. 2022. 08. 020]
点击复制

RFID 系统克隆标签检测方法综述()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年08期
页码:
122-128
栏目:
网络与安全
出版日期:
2022-08-10

文章信息/Info

Title:
Overview of RFID System Clone Tag Detection Methods
文章编号:
1673-629X(2022)08-0122-07
作者:
孔春明1黄茗涵1徐 鹤2
1. 南京邮电大学 贝尔英才学院,江苏 南京 210023;
2. 南京邮电大学 计算机学院、软件学院、网络空间安全学院,江苏 南京 210023
Author(s):
KONG Chun-ming1HUANG Ming-han1XU He2
1. Bell Honors School,Nanjing University of Posts and Telecommunications,Nanjing 210023,China;
2. School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
关键词:
无线射频识别克隆标签射频指纹同步秘密轨迹分析碰撞检测
Keywords:
radio frequency identificationclone tagsRF fingerprintsynchronization secrettrajectory analysiscollision detection
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 08. 020
摘要:
随着物联网的发展和无线射频识别技术(radio frequency identification,RFID)的广泛应用,RFID 系统的安全问题越发突出。 其中克隆标签的出现极大地阻碍了 RFID 系统的大规模发展,成为当前一个亟待解决的难题。 通过总结分析目前 RFID 克隆标签检测领域的一些主流方法,旨在为后续研究更有效的 RFID 克隆标签检测策略奠定基础。 针对目前已知的一些检测方法,该文将克隆标签检测方法归纳总结为射频指纹、同步秘密、轨迹分析和碰撞检测四大类,并较为系统地对这四大类方法所包含的具体策略进行了研究,同时对这些方法策略进行了横向与纵向的对比分析。 目前这四类方法都存在一定的缺陷,导致其无法直接应用于现有 RFID 系统进行克隆标签检测或者应用条件较苛刻。 针对目前这些方法存在的问题,认为匿名 RFID 系统克隆标签的分布式检测是未来的一个主要研究方向。
Abstract:
With the development of the Internet of Things and the wide application of radio frequency identification,the security problemof RFID system is becoming more and more prominent. Among them,the emergence of clone tags greatly threatens the life and propertysafety of producers and consumers,which has become an urgent problem to be solved. At present,some mainstream methods in the fieldof RFID clone tag detection are summarized and analyzed,aiming to lay the foundation for further research on more effective RFID clonetag detection strategies. According to some known detection methods,clone tag detection methods are summarized into four categories:radio frequency fingerprint,synchronization secret,trajectory analysis and collision detection. The specific strategies contained in these fourcategories are systematically studied. At the same time,these methods are compared horizontally and vertically,and the evaluation conclusions are shown in the form of tables. At present,these four methods have been found to have certain defects after analysis,which makesthem unable to be directly applied to the existing RFID systematic clone tag detection or the application conditions are harsh. In view ofthe existing problems of these methods,the distributed detection of clone tags in an onymous RFID systems is identified as a direction thatneeds to be worked in the future.

相似文献/References:

[1]王铖岑 邓建明.RFID系统防碰撞算法[J].计算机技术与发展,2010,(01):25.
 WANG Cheng-cen.RFID Anti-collision:Standards,Algorithms and Protocols[J].,2010,(08):25.
[2]何伟 魏书楷 赵昼辰 张晓华.一种离散制造生产线RFID接口控制器[J].计算机技术与发展,2010,(06):192.
 HE Wei,WEI Shu-kai,ZHAO Zhou-chen,et al.An RFID Interface Controller for Production Line of Discrete Manufacturing[J].,2010,(08):192.
[3]梁昌勇 曹镭 张俊岭.基于事件通知服务的RFID数据处理框架[J].计算机技术与发展,2009,(08):74.
 LIANG Chang-yong,CAO Lei,ZHANG Jun-ling.RFID Data Processing Framework Based on Events Notification Service[J].,2009,(08):74.
[4]马新军 曹永军 李丽丽.图书馆实现射频识别自动化管理的应用研究[J].计算机技术与发展,2009,(01):211.
 MA Xin-jun,CAO Yong-jun,LI Li-li.Application Research of Library Realizes RFID Automated Management[J].,2009,(08):211.
[5]王庆生 魏晓伟.RFID复杂事件处理关键技术的研究与改进[J].计算机技术与发展,2012,(01):45.
 WANG Qing-sheng,WEI Xiao-wei.Research and Improvement on Key Technology of RFID Complex Event Processing[J].,2012,(08):45.
[6]吴圭亮,丁广太,吴敏.一种基于物联网的多天线RFID纱锭定位系统[J].计算机技术与发展,2013,(11):177.
 WU Gui-liang[],DING Guang-tai[],WU Min[].A Spindles Positioning System Used Multi-antenna RFID Reader Based on IOT Technology[J].,2013,(08):177.
[7]李云峰,王琛.航空制造过程管理电子标签技术应用研究[J].计算机技术与发展,2013,(11):234.
 LI Yun-feng,WANG Chen.Application and Research on RFID Technology of Manufacturing Process Management of Aviation Industry[J].,2013,(08):234.
[8]蒋明哲,朱义生.RFID 技术在汽车整车总装物料配送过程中的应用[J].计算机技术与发展,2013,(01):249.
 JIANG Ming-zhe,ZHU Yi-sheng.Application of RFID Technology in Automotive Vehicle Assembly Process of Logistics[J].,2013,(08):249.
[9]宋英娟,杨恒新,陆音,等. 基于分层定位模型的RFID定位算法研究[J].计算机技术与发展,2014,24(10):80.
 SONG Ying-juan,YANG Heng-xin,LU Yin,et al. Study on RFID Location Algorithm Based on Hierarchical Location Model[J].,2014,24(08):80.
[10]张瑾瑾,张浩军. 一种改进的RFID高效认证协议[J].计算机技术与发展,2015,25(01):147.
 ZHANG Jin-jin,ZHANG Hao-jun. An Improved RFID Efficient Authentication Protocol[J].,2015,25(08):147.

更新日期/Last Update: 2022-08-10