Netinfo Security ›› 2018, Vol. 18 ›› Issue (2): 34-39.doi: 10.3969/j.issn.1671-1122.2018.02.005
• Orginal Article • Previous Articles Next Articles
Received:
2017-10-30
Online:
2018-02-20
Published:
2020-05-11
CLC Number:
Xiaohong ZHANG, Jiaqi ZHANG. Research on the Zero-forcing Precoding Anti-collision Algorithm Based on Frame Slot for RFID System[J]. Netinfo Security, 2018, 18(2): 34-39.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2018.02.005
[1] | 中华人民共和国科学技术部等十五部委. 中国射频识别 (RFID) 技术政策白皮书[EB/OL]. , 2006-6-9. |
[2] | 蒋政君,田海博,张方国.基于PUF的RFID防伪技术研究综述[J].信息网络安全,2016(4):38-43. |
[3] | 丁治国. RFID关键技术研究与实现[D]. 合肥:中国科学技术大学, 2009. |
[4] | 栗华. UHF RFID多标签防碰撞算法的研究与性能分析[D]. 济南:山东大学, 2011. |
[5] | WU Haifeng, ZENG Yu.Efficient Framed Slotted Aloha Protocol for RFID Tag Anticollision[J]. IEEE Transactions on Automation Science & Engineering, 2011, 8(3):581-588. |
[6] | DENG D J, TSAO H W.Optimal Dynamic Framed Slotted ALOHA Based Anti-collision Algorithm for RFID Systems[J]. Wireless Personal Communications, 2011, 59(1):109-122. |
[7] | SU Jian, XIE Liangbo, YANG Ying, et al.Idle Slots Elimination Based Anti-collision Algorithm for UHF RFID[J]. Acta Electronica Sinica, 2017,45(2):307-314. |
[8] | ZHANG Yin, YANG Fan, WANG Qian, et al.An Anti-collision Algorithm for RFID-based Robots Based on Dynamic Grouping Binary Trees[J]. Computers & Electrical Engineering, 2017,63:91-98. |
[9] | SAARINEN K, BJOMINEN T,UKKONEN L,et al.Reliability Analysis of RFID Tags in Changing Humid Environment[J].IEEE Transactions on Components,Packaging and Manufacturing Technology,2014, 4(1): 77-85. |
[10] | STANKOVIC J A.Research Directions for the Internet of Things[J]. Internet of Things Journal IEEE, 2014, 1(1): 3-9. |
[11] | 王伟. 多用户MIMO系统预编码技术研究[D]. 西安:西安电子科技大学, 2014. |
[12] | 顾军. 多小区多用户MIMO系统干扰对齐技术研究[D].重庆:重庆大学, 2015. |
[13] | 柳臻一. MIMO超高频RFID系统关键技术研究[D].成都:电子科技大学, 2015. |
[14] | 杨玉龙,彭长根,郑少波,等.基于移动智能终端的超轻量级移动RFID安全认证协议[J].信息网络安全,2017(5):22-27. |
[15] | 张友雷. 大规模MIMO系统预编码算法研究[D]. 南京:南京邮电大学, 2014 |
[16] | 林辉. 多用户分布式网络MIMO技术的研究[D].北京:北京邮电大学, 2011. |
[17] | 佘开, 何怡刚, 朱彦卿,等. MIMO-RFID系统反向识别距离研究[J]. 电子测量与仪器学报, 2012, 26(4): 305-311. |
[18] | 陈汉臻, 王喆, 吴明明. 基于MIMO技术的UHF-RFID研究[J]. 电信工程技术与标准化, 2011, 24(2): 61-65. |
[19] | 张昕. 大规模MIMO系统预编码技术的研究[D]. 南京:东南大学, 2014. |
[20] | LIVA G.Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA[J]. IEEE Transactions on Communications, 2011, 59(2):477-487. |
[21] | 张玉婷,严承华.一种基于双向认证协议的RFID标签认证技术研究[J].信息网络安全,2016(1):64-69. |
[22] | 魏静, 冯秀芳. 基于自适应分组的帧时隙ALOHA算法在RFID中的研究[J].计算机技术与发展, 2012(11):57-60. |
[23] | LI Bo, WANG Junyu.Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol[J]. IEEE Communications Letters, 2011, 15(3): 352-354. |
[24] | ZHENG Xianrong, MARTIN P, BROHMAN K, et al.Cloud Service Negotiation in Internet of Things Environment: A Mixed Approach[J]. IEEE Transactions on Industrial Informatics, 2014, 10(2): 1506-1515. |
[1] | WEN Weiping, ZHANG Shichen, WANG Han, SHI Lin. Linux Malicious Application Detection Scheme Based on Virtual Machine Introspection [J]. Netinfo Security, 2024, 24(5): 657-666. |
[2] | LI Zhihua, CHEN Liang, LU Xulin, FANG Zhaohui, QIAN Junhao. Lightweight Detection Method for IoT Mirai Botnet [J]. Netinfo Security, 2024, 24(5): 667-681. |
[3] | YANG Zhipeng, WANG Juan, MA Chenjun, KANG Yunfeng. Python Sandbox Escape Defense Mechanism Based on Third-Party Library Isolation [J]. Netinfo Security, 2024, 24(5): 682-693. |
[4] | GU Guomin, CHEN Wenhao, HUANG Weida. A Covert Tunnel and Encrypted Malicious Traffic Detection Method Based on Multi-Model Fusion [J]. Netinfo Security, 2024, 24(5): 694-708. |
[5] | SHEN Zhuowei, WANG Renbo, SUN Xianjun. A Hierarchical Lightweight Authentication Scheme Based on Merkle Tree and Hash Chain [J]. Netinfo Security, 2024, 24(5): 709-718. |
[6] | TIAN Zhao, NIU Yajie, SHE Wei, LIU Wei. A Reputation Evaluation Method for Vehicle Nodes in V2X [J]. Netinfo Security, 2024, 24(5): 719-731. |
[7] | SHI Runhua, DENG Jiapeng, YU Hui, KE Weiyang. Electronic Voting Scheme Based on Public Key Cryptography of Quantum Walks [J]. Netinfo Security, 2024, 24(5): 732-744. |
[8] | GUO Jiansheng, GUAN Feiting, LI Zhihui. A Dynamic (t,n) Threshold Quantum Secret Sharing Scheme with Cheating Identification [J]. Netinfo Security, 2024, 24(5): 745-755. |
[9] | LI Yuxin, HUANG Wenchao, WANG Jionghan, XIONG Yan. Analysis Method of Monero Payment Protocol Based on Tamarin [J]. Netinfo Security, 2024, 24(5): 756-766. |
[10] | ZHANG Shuya, CHEN Liangguo, CHEN Xingshu. An Automatic Discovery Method for Heuristic Log Templates [J]. Netinfo Security, 2024, 24(5): 767-777. |
[11] | ZHANG Changlin, TONG Xin, TONG Hui, YANG Ying. A Survey of Large Language Models in the Domain of Cybersecurity [J]. Netinfo Security, 2024, 24(5): 778-793. |
[12] | WANG Wei, HU Yongtao, LIU Qingtao, WANG Kailun. Research on Softwaization Techniques for ERT Trusted Root Entity in Railway Operation Environment [J]. Netinfo Security, 2024, 24(5): 794-801. |
[13] | GUO Zimeng, ZHU Guangjie, YANG Yijie, SI Qun. Research on Railway Network Security Performance Based on APT Characteristics [J]. Netinfo Security, 2024, 24(5): 802-811. |
[14] | ZHANG Hao, XIE Dazhi, HU Yunsheng, YE Junwei. A Review of Network Anomaly Detection Based on Semi-Supervised Learning [J]. Netinfo Security, 2024, 24(4): 491-508. |
[15] | WANG Jian, CHEN Lin, WANG Kailun, LIU Jiqiang. Application Layer DDoS Detection Method Based on Spatio-Temporal Graph Neural Network [J]. Netinfo Security, 2024, 24(4): 509-519. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||