A physical layer-based detection method for illegal tampering of UHF RFID tags
A technology of RFID tags and detection methods, which is applied in the direction of instruments, induction record carriers, electromagnetic radiation induction, etc., can solve the problem of not being able to protect illegal readers from malicious attacks on legal tags, and achieve the protection of smooth RFID communication, perfect compatibility, and accuracy high effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The present invention will be further explained below in conjunction with specific embodiments and accompanying drawings.
[0038] see figure 1 , the present invention comprises the following steps:
[0039] 1) The listener listens to the communication channel between the reader and the RFID tag. The listener is a general software radio peripheral (USRP). The reader communicates with the RFID tag in frequency hopping mode. 16 channels, working in the frequency range of 920MHz ~ 925MHz. At the beginning of the inventory cycle, when the RFID tag has received the query command Query and the next command from the reader, it will actively send Gaussian noise to interfere with the channel, and use the pulse width to execute the Query command. Decoding, if the Query command can be successfully decoded, proceed to the next step, otherwise Gaussian noise blocks the channel and ends the detection;
[0040] 2) After successfully decoding the Query command, perform predefined fea...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


