CN112116050A - Rapid clone RFID label detection method - Google Patents
Rapid clone RFID label detection method Download PDFInfo
- Publication number
- CN112116050A CN112116050A CN202010951009.6A CN202010951009A CN112116050A CN 112116050 A CN112116050 A CN 112116050A CN 202010951009 A CN202010951009 A CN 202010951009A CN 112116050 A CN112116050 A CN 112116050A
- Authority
- CN
- China
- Prior art keywords
- phase
- tag
- fingerprint
- rfid
- reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/02—Preprocessing
- G06F2218/04—Denoising
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/08—Feature extraction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
本发明公开了一种快速克隆RFID标签检测方法,包括如下步骤:S1:使用RFID相位提取工具对所有RFID标签进行相位采集处理;S2:对所有待测量的RFID标签,经过多次变换距离测量得到多个相位数据,并利用最小二乘法进行减噪操作,得到的优化指纹库;S3:对于所得到的相位指纹信息库,进行了c2和K‑S随机性检测,经验证相位指纹符合均匀分布;S3:对于给定的待检测标签,我们同样做多次测量,进行最小二乘法操作得到待检测标签的优化相位指纹;S4:将测量得到的相位指纹和所存储相位指纹进行对比。本发明可准确识别出隐藏在真实标签中的所有克隆标签,有效减少克隆RFID标签带来的攻击威胁,提升系统安全性,保护RFID用户的隐私,保障RFID产品的应用安全。
The invention discloses a rapid clone RFID tag detection method, comprising the following steps: S1: using an RFID phase extraction tool to perform phase acquisition processing on all RFID tags; S2: for all RFID tags to be measured, obtain through multiple transformation distance measurements Multiple phase data, and use the least squares method for noise reduction operation to obtain an optimized fingerprint database; S3: For the obtained phase fingerprint information database, c2 and K-S randomness detection is performed, and it is verified that the phase fingerprints conform to a uniform distribution ; S3: For a given tag to be detected, we also do multiple measurements, and perform the least squares operation to obtain the optimized phase fingerprint of the tag to be detected; S4: Compare the measured phase fingerprint with the stored phase fingerprint. The invention can accurately identify all cloned tags hidden in real tags, effectively reduce the attack threat brought by cloned RFID tags, improve system security, protect the privacy of RFID users, and ensure the application security of RFID products.
Description
技术领域technical field
本发明属于RFID标签技术领域,具体涉及一种快速克隆RFID标签检测方法。The invention belongs to the technical field of RFID tags, and in particular relates to a method for detecting a rapid clone RFID tag.
背景技术Background technique
万物互联时代,物联网感知层技术为国防军事变革深入发展提供了新契机。物联网技术可有效弥补军事后勤管理领域的诸多不足。如借助RFID技术,可实时获知特殊物资的运输要求,及时把控物品更换和补充的精确时间,根据战场环境变化,有预见性地做出决策,自主协调、控制、组织和实施后勤行动,实现后勤保障与作战行动的一体化。同时,RFID技术应用能够强化重要战场物质管理,实现对人员流、装备流和物资流的全程准确跟踪,避免重要物资遗失,有效地指挥控制了接收、分发和调换的过程,使物资的供应和管理达到高度透明,大大提高了军事物流保障的有效性。可以看出,从军事科研试验、后勤设备流转到装备工程,RFID应用将遍及战争准备与实施的各个环节。而同时,RFID技术将许多原本隔离的设备连接到网络中,这大大增加了设备遭受攻击的风险。由于RFID系统具有资源受限,通信模式开放,缺乏统一标准,安全能力较低等特点,极易遭受伪造等恶意攻击。作为RFID系统的重要组成部分,标签在整个RFID系统中承担着十分重要的作用,RFID标签内存中的数据均可被阅读器读取,甚至篡改标识信息。考虑到RFID系统常用于工业生产与国防监控等关键领域,其攻击影响后果严重。安全问题已经成为阻碍基于RFID技术的物联网进一步发展的重要因素。而由于RFID系统涉及到嵌入式、网络及软件等多种技术体系,其安全需求及应用环境,较传统互联网环境更为复杂。In the era of the Internet of Everything, the perception layer technology of the Internet of Things provides a new opportunity for the in-depth development of national defense and military reforms. IoT technology can effectively make up for many deficiencies in the field of military logistics management. For example, with the help of RFID technology, the transportation requirements of special materials can be known in real time, the precise time of replacement and replenishment of items can be controlled in time, decisions can be made predictably according to changes in the battlefield environment, and logistics operations can be independently coordinated, controlled, organized and implemented to achieve The integration of logistics support and combat operations. At the same time, the application of RFID technology can strengthen the management of important battlefield materials, realize the accurate tracking of personnel flow, equipment flow and material flow, avoid the loss of important materials, effectively command and control the process of receiving, distribution and exchange, so that the supply of materials and the The management achieves a high degree of transparency, which greatly improves the effectiveness of military logistics support. It can be seen that from military scientific research and testing, logistics equipment flow to equipment engineering, RFID applications will spread throughout all aspects of war preparation and implementation. At the same time, RFID technology connects many otherwise isolated devices to the network, which greatly increases the risk of devices being attacked. Because the RFID system has the characteristics of limited resources, open communication mode, lack of unified standards, and low security capabilities, it is extremely vulnerable to malicious attacks such as forgery. As an important part of the RFID system, the tag plays a very important role in the entire RFID system. The data in the memory of the RFID tag can be read by the reader, and even the identification information can be tampered with. Considering that RFID systems are often used in key fields such as industrial production and defense monitoring, their attack has serious consequences. Security issues have become an important factor hindering the further development of the Internet of Things based on RFID technology. Since the RFID system involves various technical systems such as embedded, network and software, its security requirements and application environment are more complex than the traditional Internet environment.
现有市面上安全分析工具大都基于传统互联网安全技术,并且成本较高,因此很难快速检查发现RFID系统中存在克隆标签。Most of the existing security analysis tools on the market are based on traditional Internet security technology, and the cost is high, so it is difficult to quickly check and find the existence of cloned tags in the RFID system.
RFID标签数据通过无线射频与读写器进行通信,目前的RFID通信协议保证了不同厂家读写器读取标签数据的通用性,但同时也导致RFID系统无法拦截恶意读写器对标签数据的识读及篡改。另一方面,由于RFID系统存在资源受限的问题,因此无法采取复杂的加密方案对RFID标签数据进行保护。攻击者很可能利用恶意阅读器克隆标签,对RFID物流应用系统进行干扰和破坏,使RFID系统面临严重的安全威胁与数据隐私保护问题,产生巨大的安全风险,对生活和工作带来极大的威胁。The RFID tag data communicates with the reader through radio frequency. The current RFID communication protocol ensures the versatility of the reader from different manufacturers to read the tag data, but it also makes the RFID system unable to intercept the malicious reader's identification of the tag data. read and tamper with. On the other hand, due to the resource limitation problem of the RFID system, it is impossible to adopt a complex encryption scheme to protect the RFID tag data. Attackers are likely to use malicious readers to clone tags, interfere and destroy the RFID logistics application system, make the RFID system face serious security threats and data privacy protection issues, generate huge security risks, and bring great harm to life and work. threaten.
国内在RFID标签克隆检测领域的研究成果主要集中在数据加密与安全协议方向,针对RFID标签克隆检测的研究主要采用数据分析或额外硬件监测方法加以实现,缺少对RFID系统“资源受限”问题的考虑,效率较低且成本偏高,实现难度较大,为此,我们提出一种快速克隆RFID标签检测方法,以解决上述背景技术中提到的问题。Domestic research results in the field of RFID tag clone detection mainly focus on the direction of data encryption and security protocols. The research on RFID tag clone detection is mainly realized by data analysis or additional hardware monitoring methods. Considering that the efficiency is low, the cost is high, and the implementation is difficult, we propose a rapid clone RFID tag detection method to solve the problems mentioned in the above background art.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种快速克隆RFID标签检测方法,以解决上述背景技术中提出的问题。The purpose of the present invention is to provide a rapid clone RFID tag detection method to solve the problems raised in the above background art.
为实现上述目的,本发明提供如下技术方案:一种快速克隆RFID标签检测方法,包括如下步骤:In order to achieve the above object, the present invention provides the following technical solutions: a rapid clone RFID tag detection method, comprising the following steps:
S1:使用RFID相位提取工具对所有RFID标签进行相位采集处理;S1: Use the RFID phase extraction tool to perform phase acquisition processing on all RFID tags;
S2:在采集过程中,为减少RFID标签相位测量误差,对于所有待测量的RFID标签,经过多次变换距离测量得到多个相位数据,并利用最小二乘法进行减噪操作,得到的优化指纹库;S2: In the acquisition process, in order to reduce the phase measurement error of the RFID tags, for all the RFID tags to be measured, multiple phase data are obtained through multiple transformation distance measurements, and the noise reduction operation is performed by the least square method to obtain an optimized fingerprint database. ;
S3:对于所得到的相位指纹信息库,运用Matlab的chi2gof函数与kstest函数对样本数据进行了c2和K-S随机性检测,经验证相位指纹符合均匀分布;S3: For the obtained phase fingerprint information library, use Matlab's chi2gof function and kstest function to perform c2 and K-S randomness detection on the sample data, and it is verified that the phase fingerprint conforms to a uniform distribution;
S3:对于给定的待检测标签,我们同样做多次测量,进行最小二乘法操作得到待检测标签的优化相位指纹;S3: For a given tag to be detected, we also do multiple measurements, and perform the least squares operation to obtain the optimized phase fingerprint of the tag to be detected;
S4:将测量得到的相位指纹和所存储相位指纹进行对比,如果符合,说明为合法标签,否则为克隆标签。S4: Compare the measured phase fingerprint with the stored phase fingerprint. If they match, it is a legal label, otherwise, it is a clone label.
优选的,所述相位指纹是由于阅读器通信机制与标签的反射特性,会在射频相位之外在产生一个额外的相位,这个相位由阅读器天线和标签自身的物理特性决定,因此既有稳定、唯一的特点,是作为指纹的良好选择,具体定义如下:Preferably, the phase fingerprint is due to the communication mechanism of the reader and the reflection characteristics of the tag, which will generate an extra phase in addition to the radio frequency phase. This phase is determined by the physical characteristics of the reader antenna and the tag itself, so both stable and stable , the only feature is that it is a good choice for fingerprints, and the specific definitions are as follows:
假设d是读写器天线和标签之间的距离,背向散射信号来回的距离是2d,阅读器的总相位输出可以表示为:Assuming that d is the distance between the reader antenna and the tag, and the backscattered signal back and forth is 2d, the total phase output of the reader can be expressed as:
θdiv=θant+θtag (2-2)θ div = θ ant + θ tag (2-2)
其中λ是波长,除了射频相位θ,读取器的收发信机制和标签的反射特性都将引入一些附加的相位θant和θtag,利用这种额外的相位作为一种新的指纹,称为相位指纹,因为相位指纹中涉及了标签和天线的硬件参数,所以如果要直接获取相位指纹就必须保证使用阅读器同一阅读器。where λ is the wavelength, in addition to the RF phase θ, the transceiver mechanism of the reader and the reflection characteristics of the tag will introduce some additional phases θant and θtag, and use this additional phase as a new fingerprint, called the phase fingerprint , because the hardware parameters of the tag and the antenna are involved in the phase fingerprint, if you want to obtain the phase fingerprint directly, you must ensure that the same reader is used as the reader.
优选的,所述相位指纹的提取过程如下:Preferably, the extraction process of the phase fingerprint is as follows:
将RFID系统设备连接后,阅读器通过天线采集标签与天线通信过程中的背向散射信号,阅读器将采集到的数据传送给连接的计算机;After the RFID system equipment is connected, the reader collects the backscattered signal during the communication between the tag and the antenna through the antenna, and the reader transmits the collected data to the connected computer;
计算机收到数据后做快速傅里叶变换,可以得到通信信号的频谱,包括相位谱和幅度谱,此外还包括标签序号、信号强度和所用天线序号等信息。After the computer receives the data, it performs fast Fourier transform to obtain the spectrum of the communication signal, including the phase spectrum and amplitude spectrum, as well as information such as the tag serial number, signal strength, and the serial number of the antenna used.
优选的,所述相位指纹的降噪处理具体过程如下:Preferably, the specific process of noise reduction processing of the phase fingerprint is as follows:
首先通过变更阅读器和待采集标签的距离n次,取得不同相位值{θ1,θ2,......,θn},其中θi表示第i次测量得到相位θ值;First, by changing the distance between the reader and the tag to be collected n times, different phase values {θ 1 , θ 2 ,..., θ n } are obtained, where θ i represents the phase θ value obtained by the i-th measurement;
然后利用如下公式进行降噪处理,可以得到优化的待采集标签相位值θ′:且有 Then use the following formula to perform noise reduction processing, and the optimized phase value θ' of the tag to be collected can be obtained: and have
优选的,所述相位指纹的均匀性验证具体过程如下:Preferably, the specific process of the uniformity verification of the phase fingerprint is as follows:
在使用同一个阅读器获取50个标签的相位指纹后,为保证相位指纹的唯一性,需对相位指纹的分布特性进行检验;这里对样本数据进行了χ2和K-S随机性检测,检测的方法是直接调运Matlab的chi2gof函数与kstest函数,输出h=0时符合均匀分布,h=1时不符合均匀分布。After using the same reader to obtain the phase fingerprints of 50 tags, in order to ensure the uniqueness of the phase fingerprints, the distribution characteristics of the phase fingerprints need to be tested; here, χ2 and K-S randomness detection is performed on the sample data. The detection method is Directly transfer Matlab's chi2gof function and kstest function, the output conforms to the uniform distribution when h=0, and does not conform to the uniform distribution when h=1.
与现有技术相比,本发明的有益效果是:本发明提供的一种快速克隆RFID标签检测方法,本发明可准确识别出隐藏在真实标签中的所有克隆标签,针对常见RFID克隆攻击特点,可提取RFID标签的物理特征信息分析,并根据RFID系统的具体应用场景采取合理的检测方案,以求发现甄别出被恶意克隆的RFID标签,有效减少克隆RFID标签带来的攻击威胁,提升系统安全性,保护RFID用户的隐私,保障RFID产品的应用安全。Compared with the prior art, the beneficial effects of the present invention are as follows: the present invention provides a method for detecting a rapid clone RFID label, the present invention can accurately identify all clone labels hidden in real labels, and for common RFID clone attack characteristics, It can extract the physical feature information analysis of RFID tags, and adopt a reasonable detection scheme according to the specific application scenarios of the RFID system, in order to find and identify RFID tags that have been maliciously cloned, effectively reduce the attack threat caused by cloned RFID tags, and improve system security. security, protect the privacy of RFID users, and ensure the application security of RFID products.
附图说明Description of drawings
图1为本发明的流程示意图;Fig. 1 is the schematic flow chart of the present invention;
图2为本发明的相位指纹的均匀性验证过程中的相位采集结果示意图。FIG. 2 is a schematic diagram of a phase acquisition result during the uniformity verification process of the phase fingerprint of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
实施例1Example 1
本发明提供了如图1的一种快速克隆RFID标签检测方法,包括如下步骤:The present invention provides a rapid clone RFID tag detection method as shown in Figure 1, comprising the following steps:
S1:使用RFID相位提取工具对所有RFID标签进行相位采集处理;S1: Use the RFID phase extraction tool to perform phase acquisition processing on all RFID tags;
S2:在采集过程中,为减少RFID标签相位测量误差,对于所有待测量的RFID标签,经过多次变换距离测量得到多个相位数据,并利用最小二乘法进行减噪操作,得到的优化指纹库;S2: In the acquisition process, in order to reduce the phase measurement error of the RFID tags, for all the RFID tags to be measured, multiple phase data are obtained through multiple transformation distance measurements, and the noise reduction operation is performed by the least square method to obtain an optimized fingerprint database. ;
S3:对于所得到的相位指纹信息库,运用Matlab的chi2gof函数与kstest函数对样本数据进行了c2和K-S随机性检测,经验证相位指纹符合均匀分布;S3: For the obtained phase fingerprint information library, use Matlab's chi2gof function and kstest function to perform c2 and K-S randomness detection on the sample data, and it is verified that the phase fingerprint conforms to a uniform distribution;
S3:对于给定的待检测标签,我们同样做多次测量,进行最小二乘法操作得到待检测标签的优化相位指纹;S3: For a given tag to be detected, we also do multiple measurements, and perform the least squares operation to obtain the optimized phase fingerprint of the tag to be detected;
S4:将测量得到的相位指纹和所存储相位指纹进行对比,如果符合,说明为合法标签,否则为克隆标签。S4: Compare the measured phase fingerprint with the stored phase fingerprint. If they match, it is a legal label, otherwise, it is a clone label.
具体的,所述相位指纹是由于阅读器通信机制与标签的反射特性,会在射频相位之外在产生一个额外的相位,这个相位由阅读器天线和标签自身的物理特性决定,因此既有稳定、唯一的特点,是作为指纹的良好选择,具体定义如下:Specifically, the phase fingerprint is due to the communication mechanism of the reader and the reflection characteristics of the tag, which will generate an extra phase in addition to the radio frequency phase. This phase is determined by the physical characteristics of the reader antenna and the tag itself, so both stable and stable , the only feature is that it is a good choice for fingerprints, and the specific definitions are as follows:
假设d是读写器天线和标签之间的距离,背向散射信号来回的距离是2d,阅读器的总相位输出可以表示为:Assuming that d is the distance between the reader antenna and the tag, and the backscattered signal back and forth is 2d, the total phase output of the reader can be expressed as:
θdiv=θant+θtag (2-2)θ div = θ ant + θ tag (2-2)
其中λ是波长,除了射频相位θ,读取器的收发信机制和标签的反射特性都将引入一些附加的相位θant和θtag,利用这种额外的相位作为一种新的指纹,称为相位指纹,因为相位指纹中涉及了标签和天线的硬件参数,所以如果要直接获取相位指纹就必须保证使用阅读器同一阅读器。where λ is the wavelength, in addition to the RF phase θ, the transceiver mechanism of the reader and the reflection characteristics of the tag will introduce some additional phases θant and θtag, and use this additional phase as a new fingerprint, called the phase fingerprint , because the hardware parameters of the tag and the antenna are involved in the phase fingerprint, if you want to obtain the phase fingerprint directly, you must ensure that the same reader is used as the reader.
具体的,所述相位指纹的提取过程如下:Specifically, the extraction process of the phase fingerprint is as follows:
将RFID系统设备连接后,阅读器通过天线采集标签与天线通信过程中的背向散射信号,阅读器将采集到的数据传送给连接的计算机;After the RFID system equipment is connected, the reader collects the backscattered signal during the communication between the tag and the antenna through the antenna, and the reader transmits the collected data to the connected computer;
计算机收到数据后做快速傅里叶变换,可以得到通信信号的频谱,包括相位谱和幅度谱,此外还包括标签序号、信号强度和所用天线序号等信息。After the computer receives the data, it performs fast Fourier transform to obtain the spectrum of the communication signal, including the phase spectrum and amplitude spectrum, as well as information such as the tag serial number, signal strength, and the serial number of the antenna used.
具体的,所述相位指纹的降噪处理具体过程如下:Specifically, the specific process of noise reduction processing of the phase fingerprint is as follows:
首先通过变更阅读器和待采集标签的距离n次,取得不同相位值其中θi表示第i次测量得到相位θ值;First, obtain different phase values by changing the distance between the reader and the tag to be collected n times. where θ i represents the phase θ value obtained by the i-th measurement;
然后利用如下公式进行降噪处理,可以得到优化的待采集标签相位值θ′:且有 Then use the following formula to perform noise reduction processing, and the optimized phase value θ' of the tag to be collected can be obtained: and have
具体的,所述相位指纹的均匀性验证具体过程如下:Specifically, the specific process of the uniformity verification of the phase fingerprint is as follows:
在使用同一个阅读器获取50个标签的相位指纹后,为保证相位指纹的唯一性,需对相位指纹的分布特性进行检验;这里对样本数据进行了χ2和K-S随机性检测,检测的方法是直接调运Matlab的chi2gof函数与kstest函数,输出h=0时符合均匀分布,h=1时不符合均匀分布。检验结果如图2所示,经验证相位指纹符合均匀分布。After using the same reader to obtain the phase fingerprints of 50 tags, in order to ensure the uniqueness of the phase fingerprints, the distribution characteristics of the phase fingerprints need to be tested; here, χ2 and K-S randomness detection is performed on the sample data. The detection method is Directly transfer Matlab's chi2gof function and kstest function, the output conforms to the uniform distribution when h=0, and does not conform to the uniform distribution when h=1. The test results are shown in Figure 2, and it is verified that the phase fingerprints conform to a uniform distribution.
具体的,所述克隆标签的检测过程如下:Specifically, the detection process of the clone tag is as follows:
对于给定的待检测标签,我们同样做多次测量,进行最小二乘法操作得到待检测标签的优化相位指纹,并将测量得到的相位指纹和所存储相位指纹进行对比,如果符合,说明为合法标签,否则为克隆标签。For a given tag to be detected, we also do multiple measurements, perform the least squares operation to obtain the optimized phase fingerprint of the tag to be detected, and compare the measured phase fingerprint with the stored phase fingerprint. If it matches, it is legal. label, otherwise a clone label.
综上所述,与现有技术相比,本发明可准确识别出隐藏在真实标签中的所有克隆标签,针对常见RFID克隆攻击特点,可提取RFID标签的物理特征信息分析,并根据RFID系统的具体应用场景采取合理的检测方案,以求发现甄别出被恶意克隆的RFID标签,有效减少克隆RFID标签带来的攻击威胁,提升系统安全性,保护RFID用户的隐私,保障RFID产品的应用安全。To sum up, compared with the prior art, the present invention can accurately identify all clone tags hidden in real tags, and can extract the physical feature information analysis of RFID tags according to the characteristics of common RFID clone attacks, and analyze the physical characteristics of the RFID tags according to the characteristics of the RFID system. A reasonable detection scheme is adopted for specific application scenarios, in order to find and identify maliciously cloned RFID tags, effectively reduce the attack threat caused by cloned RFID tags, improve system security, protect the privacy of RFID users, and ensure the application security of RFID products.
最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, the The technical solutions recorded in the foregoing embodiments can be modified, or some technical features thereof can be equivalently replaced, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included. within the protection scope of the present invention.
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010951009.6A CN112116050A (en) | 2020-09-11 | 2020-09-11 | Rapid clone RFID label detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010951009.6A CN112116050A (en) | 2020-09-11 | 2020-09-11 | Rapid clone RFID label detection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112116050A true CN112116050A (en) | 2020-12-22 |
Family
ID=73802913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010951009.6A Pending CN112116050A (en) | 2020-09-11 | 2020-09-11 | Rapid clone RFID label detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112116050A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112836540A (en) * | 2021-02-09 | 2021-05-25 | 青岛黄海学院 | Detection method of probabilistic clone attack in large-scale anonymous RFID system |
CN116402077A (en) * | 2023-06-07 | 2023-07-07 | 浙江波誓盾科技有限公司 | Clone tag identification method and system in radio frequency identification system |
CN118733817A (en) * | 2024-08-28 | 2024-10-01 | 国科大杭州高等研究院 | RFID cloning attack detection method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060181394A1 (en) * | 2005-01-28 | 2006-08-17 | Clarke James B | Radio frequency fingerprinting to detect fraudulent radio frequency identification tags |
CN103731833A (en) * | 2014-01-02 | 2014-04-16 | 东南大学 | Portable computer malicious node detecting and tolerating method of wireless sensor network |
CN108710121A (en) * | 2018-05-30 | 2018-10-26 | 佛山市顺德区中山大学研究院 | A kind of kNN fingerprinting localization algorithms based on phase difference |
-
2020
- 2020-09-11 CN CN202010951009.6A patent/CN112116050A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060181394A1 (en) * | 2005-01-28 | 2006-08-17 | Clarke James B | Radio frequency fingerprinting to detect fraudulent radio frequency identification tags |
CN103731833A (en) * | 2014-01-02 | 2014-04-16 | 东南大学 | Portable computer malicious node detecting and tolerating method of wireless sensor network |
CN108710121A (en) * | 2018-05-30 | 2018-10-26 | 佛山市顺德区中山大学研究院 | A kind of kNN fingerprinting localization algorithms based on phase difference |
Non-Patent Citations (2)
Title |
---|
LEI YANG .ETC: "Anti-counterfeiting via federated RFID tags fingerprints and geometric relationships", 《IEEE》 * |
张国柱等: ""牵星"法:一种基于射频指纹的高频RFID克隆卡检测方法", 《信息安全学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112836540A (en) * | 2021-02-09 | 2021-05-25 | 青岛黄海学院 | Detection method of probabilistic clone attack in large-scale anonymous RFID system |
CN116402077A (en) * | 2023-06-07 | 2023-07-07 | 浙江波誓盾科技有限公司 | Clone tag identification method and system in radio frequency identification system |
CN116402077B (en) * | 2023-06-07 | 2023-09-15 | 浙江波誓盾科技有限公司 | A method and system for identifying cloned tags in a radio frequency identification system |
CN118733817A (en) * | 2024-08-28 | 2024-10-01 | 国科大杭州高等研究院 | RFID cloning attack detection method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112116050A (en) | Rapid clone RFID label detection method | |
Liu et al. | Fast and accurate detection of unknown tags for RFID systems–hash collisions are desirable | |
Gu et al. | Convolution Neural Network‐Based Higher Accurate Intrusion Identification System for the Network Security and Communication | |
Chen et al. | DAP: Efficient detection against probabilistic cloning attacks in anonymous RFID systems | |
Sharma et al. | Detection of false data injection in smart grid using PCA based unsupervised learning | |
Zhang et al. | Convergence‐improved congruent matching cells (CMC) method for firing pin impression comparison | |
Lin et al. | Efficiently identifying unknown COTS RFID tags for intelligent transportation systems | |
Chen et al. | Revisiting cardinality estimation in COTS RFID systems | |
Zhang et al. | Frequency-and orientation-related phase fingerprints for rfid tag authentication | |
Xie et al. | A lightweight integrity authentication approach for RFID-enabled supply chains | |
Gandino et al. | Tampering in RFID: A survey on risks and defenses | |
Ding et al. | A taxonomy model of RFID security threats | |
Duc et al. | Open issues in RFID security | |
Xie et al. | Efficient integrity authentication scheme for large-scale RFID systems | |
KR102249758B1 (en) | Artificial intelligence personal privacy data security system applying case based reasoning technology and block chain method and server thereof | |
Yang et al. | Collaborative RFID intrusion detection with an artificial immune system | |
CN107704787B (en) | A kind of method and apparatus of malice RFID reader intrusion detection | |
Noman et al. | Improving security and usability of low cost RFID tags | |
KR20210053844A (en) | Server of artificial intelligence personal privacy data security system | |
Zhao et al. | Time‐Efficient Cloning Attacks Identification in Large‐Scale RFID Systems | |
Khor et al. | Detecting counterfeit RFID tags using digital forensic | |
Mustaffa et al. | RFID Clone Detection in Supply Chain Using Modified Count-Min and BASE Protocol. | |
Zhu et al. | Towards Location-and Orientation-Independent RFID Authentication with COTS Devices | |
Taylor et al. | Malware and botnet prevention in smart building IoT devices using blockchain-enabled federated learning | |
CN112364339B (en) | An Improved Secure Lightweight RFID Authentication Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20201222 |
|
WD01 | Invention patent application deemed withdrawn after publication |