搜索结果: 16-30 共查到“RFID”相关记录421条 . 查询时间(0.03 秒)
针对温度感知RFID(radio frequency identification)标签应用于冷链物流温度监测中缺乏有效数据验证的问题,该研究通过将42个温度感知RFID标签部署于冷链模拟平台中,划分了7个横截面、3个纵截面和两个层,设置了机械降温-冷链维持-自然回温3个不同阶段,同时在42个监测位点中选择7个位点同步部署了便携式温度记录仪,获取了不同条件下的温度监测数据,并与便携式温度记录仪数据...
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Mobile commerce RFID Ultra-lightweight
2017/6/9
Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Security and privacy concerns have been growing with the increased usage of the RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have be...
针对军事物联网中低成本RFID设备安全缺陷,提出了一个超轻量级RFID系统身份认证协议,解决了标签发送的消息不具有时效性的问题,提高了RFID系统安全性能,平衡了成本和安全的问题,并在OPNET软件平台上对该协议进行了仿真实验。结果表明,在同等网络环境下,协议的安全性和性能都达到了RFID系统安全的改进要求。
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT
RFID authentication protocols Traceability attacks Internet of Things
2016/6/27
Recently, Radio Frequency Identification (RFID) and Near Field Communication (NFC) systems are found in various
user-friendly services that all of us deal with in our daily lives. As these systems ar...
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
RFID based supply chain clone detection authentication
2016/6/15
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentic...
一种适用于超高频RFID系统的低复杂度防碰撞算法
射频识别 防碰撞 早期调整 系统吞吐率
2016/10/17
为提高EPCglobal C1 Gen2 射频识别系统的多标签识别性能,提出一种快速防碰撞算法。该算法仅在一帧 中的某个监测点估计标签数量和调整帧长,分析研究了多个监测点,对不同监测点的性能进行比较以寻找最佳检测 点,并利用Matlab2010 软件,采用蒙特卡罗仿真方法对其进行仿真验证。仿真结果表明:在该算法下,系统吞吐率 可以达到0.34,非常接近EPCglobal C1 Gen2 防碰撞算法...
AC-DC rectifier and storage capacitors take up 25% or more of chip area for cost-sensitive passive RFID tags. In this work, we show that these components can be eliminated by utilizing a RF-only circu...
一种适用于超高频RFID系统的低复杂度防碰撞算法
射频识别 防碰撞 早期调整 系统吞吐率
2016/4/5
为提高EPCglobal C1 Gen2射频识别系统的多标签识别性能,提出一种快速防碰撞算法。该算法仅在一帧中的某个监测点估计标签数量和调整帧长,分析研究了多个监测点,对不同监测点的性能进行比较并寻找最佳检测点;并利用MATLAB2010软件,采用蒙特卡罗仿真方法对其进行仿真验证。仿真结果表明,在该算法下,系统吞吐率可以达到0.34,非常接近EPCglobal C1 Gen2防碰撞算法的理论最大值...
RFID技术在武器装备仓储管理中的应用
RFID 武器装备仓储管理 应用
2016/9/6
针对部队武器装备仓储管理的特点及信息化水平不高的现状,研究了武器装备仓储管理领域中应用RFID技术改进管理手段的方法。分析了基于RFID技术的武器装备仓储管理系统面临的安全威胁,提出了实用有效的保密措施,建立了基于RFID技术的武器装备仓储管理系统的软硬件系统。与传统仓储管理手段相比,增强了武器装备仓储管理的安全性,提高了对武器装备调度储备的效率。
一种适用于超高频RFID系统的低复杂度防碰撞算法
射频识别 防碰撞 早期调整 系统吞吐率
2016/5/26
为提高EPCglobal C1 Gen2射频识别系统的多标签识别性能,提出一种快速防碰撞算法。该算法仅在一帧中的某个监测点估计标签数量和调整帧长,分析研究了多个监测点,对不同监测点的性能进行比较并寻找最佳检测点;并利用MATLAB2010软件,采用蒙特卡罗仿真方法对其进行仿真验证。仿真结果表明,在该算法下,系统吞吐率可以达到0.34,非常接近EPCglobal C1 Gen2防碰撞算法的理论最大值...
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
cryptanalysis anonymity RFID
2016/1/5
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this p...
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
cryptanalysis identification protocol RFID security
2016/1/5
As low-cost RFID tags become more and more ubiquitous, it is necessary to design ultralightweight RFID
authentication protocols to prevent possible attacks and threats. We reevaluate Ahmadian et al.’...
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
RFID authentication protocols Yu-Jehn protocol Privacy
2015/12/23
Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and pri-vacy, researchers proposed different kind of protocols. In this pa-per...