咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Intrusion Detection Methods Ba... 收藏

Intrusion Detection Methods Based on Incomplete RFID Traces

Intrusion Detection Methods Based on Incomplete RFID Traces

作     者:LI Peng WANG Zhen XU He ZHU Feng WANG Ruchuan 

作者机构:School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks 

出 版 物:《Chinese Journal of Electronics》 (电子学报(英文))

年 卷 期:2017年第26卷第4期

页      面:675-680页

核心收录:

学科分类:1305[艺术学-设计学(可授艺术学、工学学位)] 13[艺术学] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 081104[工学-模式识别与智能系统] 0804[工学-仪器科学与技术] 081101[工学-控制理论与控制工程] 0701[理学-数学] 0811[工学-控制科学与工程] 

基  金:supported by the National Natural Science Foundation of China(No.61572260,No.61572261,No.61672296,No.61602261) the Natural Science Foundation of Jiangsu Province(No.BK20140886,No.BK20140888) Scientific&Technological Support Project of Jiangsu Province(No.BE2015702,No.BE2016777,No.BE2016185) Natural Science Key Fund for Colleges and Universities in Jiangsu Province(No.12KJA520002) China Postdoctoral Science Foundation(No.2014M551636,No.2014M561696) Jiangsu Planned Projects for Postdoctoral Research Funds(No.1302090B,No.1401005B) Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Foundation(No.WSNLBZY201508) 

主  题:Intrusion detection Radio frequency identification Information security Tag cloning attack Incomplete RFID traces 

摘      要:According to the Radio frequency identification(RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method of intrusion detection by combining the Markov chain technology and probability statistics technology. We use this method to calculate the threshold that is used to determine whether the tag event is a cloning tag intrusion one. Current research focuses on RFID intrusion detection under the condition of complete RFID traces, such as encryption algorithm improvement, tag authentication protocol improvement, and track and trace technology in RFID supply chain. RFID traces are occasionally to be incomplete, which causes the above methods to be inefficient. Our method proposed in this paper is the solution to incomplete RFID traces which makes up for the study of RFID intrusion detection research.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分