Unlock instant, AI-driven research and patent intelligence for your innovation.

A physical layer-based detection method for illegal tampering of UHF RFID tags

A technology of RFID tags and detection methods, which is applied in the direction of instruments, induction record carriers, electromagnetic radiation induction, etc., can solve the problem of not being able to protect illegal readers from malicious attacks on legal tags, and achieve the protection of smooth RFID communication, perfect compatibility, and accuracy high effect

Active Publication Date: 2019-01-18
西安和硕物流科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these research works only focus on verifying the legitimacy of tags, and cannot protect illegal readers from malicious attacks on legitimate tags.
[0005] In summary, the existing technical methods have major or minor problems in terms of operability, actual deployment, objects of concern, and cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer-based detection method for illegal tampering of UHF RFID tags
  • A physical layer-based detection method for illegal tampering of UHF RFID tags
  • A physical layer-based detection method for illegal tampering of UHF RFID tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further explained below in conjunction with specific embodiments and accompanying drawings.

[0038] see figure 1 , the present invention comprises the following steps:

[0039] 1) The listener listens to the communication channel between the reader and the RFID tag. The listener is a general software radio peripheral (USRP). The reader communicates with the RFID tag in frequency hopping mode. 16 channels, working in the frequency range of 920MHz ~ 925MHz. At the beginning of the inventory cycle, when the RFID tag has received the query command Query and the next command from the reader, it will actively send Gaussian noise to interfere with the channel, and use the pulse width to execute the Query command. Decoding, if the Query command can be successfully decoded, proceed to the next step, otherwise Gaussian noise blocks the channel and ends the detection;

[0040] 2) After successfully decoding the Query command, perform predefined fea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method for unauthorized tampering of an ultrahigh frequency RFID tag based on a physical layer, and is to identify an illegal malicious reader and provide reliable guarantee for safety communication of a reader and a tag in an RFID system. The technical scheme is that by monitoring communication between the reader and the RFID tag, the method is non-invasive to an existing passive RFID system; by continuously monitoring a communication channel between the reader and the tag, and when the inventory cycle begins, and when receiving a reader query command Query and the next command, such as an ACK command, Gaussian noise is emitted to actively block the channel; then, with frame synchronization codes as a recognition sequence, corresponding characteristics are extracted from the two command signals to check legality of the current reader; if the reader is legal, the channel is released, that is, the reader is authorized to access the tag, and the reader can read and write the memory of the tag; and if the reader is illegal, the channel is interfered continuously.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification (RFID), and in particular relates to a method for detecting illegal tampering of UHF RFID tags based on a physical layer. Background technique [0002] Due to the lack of protection mechanism, the existing UHF RFID communication system has many inherent shortcomings, which also makes RFID tags vulnerable to various security threats. RFID systems distinguish different types of threats based on the level at which the attack occurs. For example, attacks at the physical layer can cause long-term or short-term failure of RFID tags. Attacks at this layer are mainly aimed at physical interfaces, RFID devices, and transmitted radio signals; cloning, electronic spoofing, eavesdropping, and counterfeiting at the network transport layer It also brings serious security and privacy threats to the RFID system, and these threats make it possible for all parts of the RFID tag information t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/10
CPCG06K7/10257
Inventor 丁菡韩劲松王鸽韩凯惠维王志
Owner 西安和硕物流科技有限公司