您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 质量控制/管理 > 物联网感知层中RFID的信息安全对策研究
3220201010武汉理工大学学报JOURNALOFWUHANUNIVERSITYOFTECHNOLOGYVol.32No.20Oct.2010DOI:10.3963/j.issn.16714431.2010.20.017RFID刘利民,肖德宝,李琳,水海红(,430079):物联网是在计算机互联网的基础上,利用射频识别(RFID)二维码无线数据通信等技术,构造一个覆盖世界上万事万物的InternetofThings物联网由感知层网络层和应用层组成,其中感知层是物联网的核心主要由RFID系统组成,感知层的信息安全问题是物联网普及和发展所面临的首要问题感知层主要由无线通讯网络来实现,这必然会造成信息的被干扰和信息的被窃取另外物联网的普及,RFID标签的广泛应用会造成用户隐私的泄露解决物联网感知层的安全问题迫在眉睫,主要从隐私和安全两方面来进行分析和研究安全等级的划分是从实际出发解决感知层安全问题的基本方法:物联网;信息安全;RFID:TP393.08:A:16714431(2010)20007903InformationSecurityandItsCountermeasuresofRFIDSystemofInternetofThingsSensingLayerLIULimin,XIAODebao,LILin,SHUIHaihong(DepartmentofComputerScience,HuazhongNormalUniversity,Wuhan430079,China)Abstract:InternetofThingsisonthebasisoftheInternet,usingradiofrequencyidentification(RFID),two-dimensionalcode,wirelessdatacommunicationstechnology,toconstructaInternetofThings,whichiscoveredeverythingintheworld.Internetofthingsisconsistofthesensinglayer,networklayerandapplicationlayer,andthesensingisthecorelayerperception.ItmainlycomposedbytheRFIDsystem,anditsinformationsecurityisthemostimportantissue,whichisInternetofthingsuniversalanddevelopmentfacing.Thesensinglayerismadeupofwirelesscommunicationnetworkstoachieve,sothiswilldefinitelyleadtoinformationinterferencesandinformationtheft.WhilethepopularityofnetworkedobjectsandRFIDtagswidelyusedleadtoleakageofuserprivacy.Thesecurityissuesofsensinglayerareurgenttosolve.Itisthebasicmethodtosolvesecurityproblemsinthesensinglayer.Keywords:internetofthings;informationsecurity;RFID:20100620.:(1982),,,.Email:liulimin4504@sina.com.cn1,(RFID),InternetofThings,,RFID,,,303:,,,,RFID,,2RFIDRFIDRFID(RadioFrequencyIdentification)2080RFID,,,RFID,RFID,RFID2:RFID(Tag)(Reader)RFID2:RFID,;,,,RFID2:2.1RFIDRFIDRFID:RFID,RFID,2.2RFID,,,,1)RFID2[1],,(),125kHz,225kHz13.65MHz;,(),433MHz,915MHz,2.45GHz5.8GHz,,[1,2]:(1);(2);(3),[1]:(1),;(2),2),RFID,Reader3),4)5),,,,[3]6)Host()()3RFIDRFID,RFID,802010103.1RFID1)kill[3],,kill,,,:,(,)2)sleep[3],RFIDsleep,sleep,,,,3),RFID,,,,,3.2RFID1)[1,2]:(1);(2);(3),2)Hash[4](),,,RFID,3)[3]RFID,4),(),,13.3RFID,RFID,RFID,RFIDRFID,:,(11.()2.()3.4.),,(),1(下转第87页)813220,,,:RFIDVisibleSpectrum:MethodsandApplications,2000.[2],,,.[J].,2006,28(2):7376.[3]WuSQ,JiangLJ,XieSL,etal.InfraredFaceRecognitionbyUsingBloodPerfusionData[C]//ProcAudioandVideobasedBiometricPersonAuthentication,NY:[s.n.],2005(AVBPA05):320328.[4]ChenL,LiaoH,KoM,etal.ANewLDABasedFaceRecognitionSystemWhichCanSolvetheSmallSample=-SizeProblem[J].PatternRecognition,2000,33(10):17131726.[5],.SVDDCT[J].:,2005,30(2):119121.[6],,.PCA+LDA[J].,2008,21(2):160164.[7]ChenX,FlynnPJ,BowyerK.PCABasedFaceRecognitioninInfraredImagery:BaselineandComparativeStudies[C]//ProcIEEEIntWorkshoponAnalysisandModelingofFacesandGestures.France:Nice,2003:127134.[8],,,.Fisher[J].,2007,12(8):13961400.[9]JonathonPhillipsP,AlvinMartin,WilsonCL,etal.AnIntroductiontoEvaluatingBiometricSystems[C]//IEEEComputer,2000:5663.[10]MoghaddamB,JebaraT,PentlandA.BayesianFaceRecognition[J].PatternRecognition,2000,33(11):17711782.(上接第81页)4,(RFID),,,,,[1],.(RFID)[M].:,2006.[2]FrankThornton,BradHaines.RFIDSecurity[M].:,2007.[3].RFID[J].:,2007(12):1720.[4].RFID[D].:,2008.873220,,,:DCT+FLD
本文标题:物联网感知层中RFID的信息安全对策研究
链接地址:https://www.777doc.com/doc-4271889 .html