排序方式: 共有49条查询结果,搜索用时 15 毫秒
1.
2.
Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data integrity is attaching an identifying tag to individual data. The authenticity of the data can then be checked against its tag. If the data is altered by the adversary, the related tag becomes invalid and the attack will be detected. The work presented in this paper studies an existing tag design (CETD) for authenticating memory data in embedded processor systems, where data that are stored in the memory or transferred over the bus can be tampered. Compared to other designs, this design offers the flexibility of trading-off between the implementation cost and tag size (hence the level of security); the design is cost effective and can counter the data integrity attack with random values (namely the fake values used to replace the valid data in the attack are random). However, we find that the design is vulnerable when the fake data is not randomly selected. For some data, their tags are not distributed over the full tag value space but rather limited to a much reduced set of values. When those values were chosen as the fake value, the data alteration would likely go undetected. In this article, we analytically investigate this problem and propose a low cost enhancement to ensure the full-range distribution of tag values for each data, hence effectively removing the vulnerability of the original design. 相似文献
3.
4.
5.
为了满足2.45GHz射频识别系统工作的需求,所设计的2.45GHz圆环缝隙标签天线的性能指标为:在驻波比小于1.5的条件下,工作带宽约为300MHz(2.19~2.49GHz);天线增益为3.31dBi;天线尺寸满足RFID系统应用需求.本文给出了该标签天线的实测结果,与理论结果吻合良好.论文给出周边塑料瓶水、玻璃瓶水、金属罐头瓶在不同位置时对天线匹配特性影响的测量,结果表明,塑料瓶水和玻璃瓶水对天线匹配性能的影响类似,当周围物体距离天线小于2.5cm时,天线的谐振频率将发生偏移.金属罐头瓶距离天线小于0.3cm将导致天线无法工作,当所有物体距离天线的位置超过2.5cm时,天线可以正常工作. 相似文献
6.
为了解决射频识别(RFID)系统中的多标签防碰撞问题,在分析帧时隙ALOHA算法的基础上,提出一种基于模运算标签分类的RFID标签防碰撞识别方法。引入一种检测信息碰撞的时隙选择信息,对标签所选取时隙的碰撞情况进行分析并估计标签数量;然后对标签EPC编码进行逐级的取模运算,将同余的标签归为一组。各个标签经过K次取模运算后,分为2k组,每组只有发生少量碰撞位的标签。再将标签按照分组对应的时隙发送,碰撞标签采用二叉树后退式算法处理。本方法极大的提高了标签的识别效率,适用于射频识别系统中阅读器对于大量电子标签的快速识别。 相似文献
7.
8.
《Digital Communications & Networks》2020,6(3):377-388
Over the past few years, Radio Frequency IDentification (RFID) has stridden significantly due to its adoption in many business and daily life activities. RFID empowers end-to-end and item-by-item visibility, letting the customers or decision-makers effectively trail the personnel and resources for improved management. Significant research and development in this area have transformed the inexpensive, miniaturized technology of RFIDs without chip inside. Chipless Radio Frequency IDentification (CRFID) is a unique wireless technology based on radar principle to sense, identify, and track the objects. CRFIDs are simplified and miniaturized tags of traditional RFID, which can widely be used in small and cheap objects/applications in our daily life. This paper reviews the definition, principle, and most recent development in CRFIDs. Based on the reported researches, the ElectroMagnetic Spectrum (EMS) method is typical, which has been concerned by many RFID researchers. Therefore, this paper reviews different types of EMS CRFID tag and classifies these tags based on structure design emphasizing their significant geometries in comparison with performance parameters. Antenna and coding methods of the EMS CRFID are also elaborated, contrasting the tag capacity and coding performance. Finally, we briefly summarize the challenges and limitations in this emerging field and look forward to the prospects of future CRFID. 相似文献
9.
Radio Frequency Identification (RFID)‐based parking management systems provide facilities to control parking lot systems within easy access and secure inspection. Chen and Chong have presented a scheme to prevent car thefts for parking lot management systems, which is based on EPC C1‐G2 RFID standard. They claimed that their protocol is resistant against well‐known RFID attacks. In this paper, we prove that Chen and Chong's scheme is not resistant against secret disclosure and impersonation attacks. Therefore, in Chen and Chong parking lot system, a car may be stolen without having a valid tag. In this paper, we also show that the proposed impersonation attack works for any length of cyclic redundancy check and the secret disclosure attack costs at most 216 evaluations of the used pseudo random number generator. The success probability of both attacks is 1 while their complexity is only 2 runs of the protocol. Finally, we present an improved protocol and formally and informally prove that the improved protocol provides the desired level of security and privacy. 相似文献
10.