物联网感知层中RFID的信息安全对策研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

3220201010武汉理工大学学报JOURNALOFWUHANUNIVERSITYOFTECHNOLOGYVol.32No.20Oct.2010DOI:10.3963/j.issn.16714431.2010.20.017RFID刘利民,肖德宝,李琳,水海红(,430079):物联网是在计算机互联网的基础上,利用射频识别(RFID)二维码无线数据通信等技术,构造一个覆盖世界上万事万物的InternetofThings物联网由感知层网络层和应用层组成,其中感知层是物联网的核心主要由RFID系统组成,感知层的信息安全问题是物联网普及和发展所面临的首要问题感知层主要由无线通讯网络来实现,这必然会造成信息的被干扰和信息的被窃取另外物联网的普及,RFID标签的广泛应用会造成用户隐私的泄露解决物联网感知层的安全问题迫在眉睫,主要从隐私和安全两方面来进行分析和研究安全等级的划分是从实际出发解决感知层安全问题的基本方法:物联网;信息安全;RFID:TP393.08:A:16714431(2010)20007903InformationSecurityandItsCountermeasuresofRFIDSystemofInternetofThingsSensingLayerLIULimin,XIAODebao,LILin,SHUIHaihong(DepartmentofComputerScience,HuazhongNormalUniversity,Wuhan430079,China)Abstract:InternetofThingsisonthebasisoftheInternet,usingradiofrequencyidentification(RFID),two-dimensionalcode,wirelessdatacommunicationstechnology,toconstructaInternetofThings,whichiscoveredeverythingintheworld.Internetofthingsisconsistofthesensinglayer,networklayerandapplicationlayer,andthesensingisthecorelayerperception.ItmainlycomposedbytheRFIDsystem,anditsinformationsecurityisthemostimportantissue,whichisInternetofthingsuniversalanddevelopmentfacing.Thesensinglayerismadeupofwirelesscommunicationnetworkstoachieve,sothiswilldefinitelyleadtoinformationinterferencesandinformationtheft.WhilethepopularityofnetworkedobjectsandRFIDtagswidelyusedleadtoleakageofuserprivacy.Thesecurityissuesofsensinglayerareurgenttosolve.Itisthebasicmethodtosolvesecurityproblemsinthesensinglayer.Keywords:internetofthings;informationsecurity;RFID:20100620.:(1982),,,.Email:liulimin4504@sina.com.cn1,(RFID),InternetofThings,,RFID,,,303:,,,,RFID,,2RFIDRFIDRFID(RadioFrequencyIdentification)2080RFID,,,RFID,RFID,RFID2:RFID(Tag)(Reader)RFID2:RFID,;,,,RFID2:2.1RFIDRFIDRFID:RFID,RFID,2.2RFID,,,,1)RFID2[1],,(),125kHz,225kHz13.65MHz;,(),433MHz,915MHz,2.45GHz5.8GHz,,[1,2]:(1);(2);(3),[1]:(1),;(2),2),RFID,Reader3),4)5),,,,[3]6)Host()()3RFIDRFID,RFID,802010103.1RFID1)kill[3],,kill,,,:,(,)2)sleep[3],RFIDsleep,sleep,,,,3),RFID,,,,,3.2RFID1)[1,2]:(1);(2);(3),2)Hash[4](),,,RFID,3)[3]RFID,4),(),,13.3RFID,RFID,RFID,RFIDRFID,:,(11.()2.()3.4.),,(),1(下转第87页)813220,,,:RFIDVisibleSpectrum:MethodsandApplications,2000.[2],,,.[J].,2006,28(2):7376.[3]WuSQ,JiangLJ,XieSL,etal.InfraredFaceRecognitionbyUsingBloodPerfusionData[C]//ProcAudioandVideobasedBiometricPersonAuthentication,NY:[s.n.],2005(AVBPA05):320328.[4]ChenL,LiaoH,KoM,etal.ANewLDABasedFaceRecognitionSystemWhichCanSolvetheSmallSample=-SizeProblem[J].PatternRecognition,2000,33(10):17131726.[5],.SVDDCT[J].:,2005,30(2):119121.[6],,.PCA+LDA[J].,2008,21(2):160164.[7]ChenX,FlynnPJ,BowyerK.PCABasedFaceRecognitioninInfraredImagery:BaselineandComparativeStudies[C]//ProcIEEEIntWorkshoponAnalysisandModelingofFacesandGestures.France:Nice,2003:127134.[8],,,.Fisher[J].,2007,12(8):13961400.[9]JonathonPhillipsP,AlvinMartin,WilsonCL,etal.AnIntroductiontoEvaluatingBiometricSystems[C]//IEEEComputer,2000:5663.[10]MoghaddamB,JebaraT,PentlandA.BayesianFaceRecognition[J].PatternRecognition,2000,33(11):17711782.(上接第81页)4,(RFID),,,,,[1],.(RFID)[M].:,2006.[2]FrankThornton,BradHaines.RFIDSecurity[M].:,2007.[3].RFID[J].:,2007(12):1720.[4].RFID[D].:,2008.873220,,,:DCT+FLD

1 / 4
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功