通信学报 ›› 2014, Vol. 35 ›› Issue (7): 86-93.doi: 10.3969/j.issn.1000-436x.2014.07.011

• 论文Ⅱ • 上一篇    下一篇

基于对数谱射频指纹识别的RFID系统信息监控方法

袁红林1,包志华1,严燕2   

  1. 1 南通大学 电子信息学院,江苏 南通 226019
    2 南通大学 计算机科学与技术学院,江苏 南通 226019
  • 出版日期:2014-07-25 发布日期:2017-06-24
  • 基金资助:
    国家自然科学基金资助项目;国家交通运输部科技基金资助项目;国家交通运输部科技基金资助项目;江苏政府留学奖学金基金资助项目(2012)

Information monitor method of RFID system based on logarithm spectrum RF fingerprint identification

Hong-lin YUAN1,Zhi-hua BAO1,Yan YAN2   

  1. 1 School of Electronics and Information,Nantong University, Nantong 226019,China
    2 School of Computer Science and Technology,Nantong University,Nantong 226019,China
  • Online:2014-07-25 Published:2017-06-24
  • Supported by:
    The National Natural Science Foundation of China;The Science and Technology Project of Ministry of Transport of China;The Science and Technology Project of Ministry of Transport of China;The Jiangsu Provincial Government Overseas Scholarship (2012)

摘要:

针对常规RFID系统对信息控制的不足,提出了一种基于辐射源识别的无源RFID系统的信息监控方法。采集无源RFID标签的辐射射频信号,变换为新的对数谱射频指纹,并进行特征提取与识别,获得标签身份真伪结果;把射频指纹等集成到读写器应用层协议,实现标签与读写器之间信息的控制。建模、仿真与实验表明,对数谱射频指纹仅由标签的频偏与冲击响应决定,具有稳健性等;给出了融合提出指纹的 RFID 系统挑战——应答认证协议实例。提出方法不仅能增强标签与读写器的认证安全强度,而且能实现通信中标签的身份监控,对于解决密钥泄漏检测公开问题也有一定贡献。

关键词: 通信对抗, 辐射源识别, RFID, 身份识别, 对数谱

Abstract:

To make up for the shortcomings of the information control in RFID systems, an information monitor method of passive RFID systems based on emitter identification was proposed. The emitted RF signal of the passive RFID tag was acquired and transformed into logarithm spectrum RF fingerprint, the features were extracted and classified, and the authenticity of the tag was obtained, the application layer protocol of the reader was integrated with the RF fingerprint etc., and the control of the information between the tag and reader was achieved. It was demonstrated with modeling, simulation and experiments that the novel fingerprint was solely determined by the frequency offset and impulse response of the tag, and had stability etc., a challenge-response authentication protocol instance of RFID systems integrated with the proposed fingerprint was given. The proposed method can not only enhance the authentication intensity, but also monitor the identity of the tag in the communication, and has certain contribution to solve the open question of the secret key leakage detection.

Key words: communication countermeasures, emitter identification, RFID, identity recognition, logarithm spectrum

No Suggested Reading articles found!