期刊文献+

RFID芯片在物联网应用中的设计与研究 被引量:11

Researchin the Application of 915.0MHz RFID Chips in Internet of Things
在线阅读 下载PDF
导出
摘要 文章就政府主管部门在物联网应用环境下,在物品监管、证件关联和失控溯源等管控过程中的RFID芯片的信息安全问题进行了研究,特别是针对工作在915.0MHz频段的RFID芯片的安全机制,分析了在保证实时掌握监管物品本身的状态、随时检查与之对应的监管证件和文书状态、实时绑定监管物品的信息与物联网视频监控的管控要求下的信息安全机制,并提出了可资借鉴的信息安全解决方案。 This paper studies the information security problems of RFID chips in management and control processes in intemet of things, such as supervision and control of goods, associating goods with related credentials and tracing the things out of control, which are conducted by government agents. The information security mechanism of RFID chips, especially which are operating at 915.0MHz, is analyzed in this paper under the supervision and control requirements that the state of goods be under control in real time, that the corresponding credentials and state of documents be checked at any time, and that the information of the goods under control be bound to the video monitoring based on internet of things in real time. Besides, an information security solution is put forward.
作者 王雷
出处 《信息网络安全》 2012年第5期64-67,共4页 Netinfo Security
关键词 物联网 RFID 信息安全 物品监管 internet of things RFID information security supervision and control of goods
  • 相关文献

参考文献5

  • 1郎为民.射频识别(RFID)技术原理与应用[M].北京:机械工业出版社,2006.
  • 2谭民.RFID在公共安全方面的应用[M].北京:机械工业出版社,2010.
  • 3李振汕.RFID系统安全问题研究[J].网络安全技术与应用,2011(5):61-63. 被引量:3
  • 4赵云辉.浅析RFID电子标签的安全性能[J].中国自动识别技术,2009(3):46-48. 被引量:6
  • 5Hancock BJ,Dickens SV,Luks FI,et al.Complication of lymphangiomas in children[J].J Pediatr Surg,1992,27(2):220-203.

二级参考文献3

共引文献104

同被引文献79

  • 1乔钢柱,曾建潮.一种适用于动态环境的改进RSSI定位方法[J].计算机研究与发展,2010,47(S2):111-114. 被引量:8
  • 2龙毅宏,周祖德,刘泉.动态口令的安全脆弱性分析及对策[J].信息安全与通信保密,2006,28(7):16-17. 被引量:10
  • 3刘金伟,黄樟钦,侯义斌,王普.校园CPU卡密钥管理系统的设计与实现[J].信息安全与通信保密,2006,28(10):51-54. 被引量:6
  • 4李彦辉,王述洋,王春艳.网络信息安全技术综述[J].林业劳动安全,2007,20(1):25-29. 被引量:2
  • 5Zhang Wei, Mei Hong, Zhao Haiyan. A Feature—Oriented Approachto Modeling Requirements Dependencies [C]. 13th IEEE InternationalConference on Requirements Engineering.2005:273—284.
  • 6Schobbens P Y, Heymans P, Trigaux J C, et al. Feature Diagrams:A Survey and a Formal Semantics [C]. Proceedings of the 14thIEEE International Conference on Requirements Engineering(RE’ 06).2006:136-145.
  • 7MARIO C, LUIQI D C , CLAUDIO S. Emerging Topic Detectionon Twitter based on Temporal and Social Terms Evaluation[A].In:MDMKDD 10 Proceedings of the tenth International Workshop onMultimedia Data Mining[C]. Washington ,2010:1—10.
  • 8SakakiTi, Okazaki M, Matsuo Y. Earthquake Shakes Twitter User:Real-time Event Detection by Social Sensors[A]. Proceedings of the 19thInternational Conference on World Wide Web, 2010[C].Raleigh, NorthCarolina: ACM Press, 2010:851—861.
  • 9Kejia Wu,Enjian Bai,Wen Zhang. A Hash-Based Authentication Protocol for Secure Mobile RFID Systems[A].
  • 10Kin Ying Yu,S.M.Yiu,Lucas C.K.Hui. RFID Forward Secure Authentication Protocol:Flaw and Solution[A].2009.

引证文献11

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部