基于超高频RFID的供应链系统设计部署和安全性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着全球化的加快,中国融入世界经济的程度加深,全球产业分工日趋精细,生产对产业链的依赖日益加深。供应链是现代产品生产链的核心,控制着各个产业的上下游。在中国,特别是在制造业中,整个供应链存在信息化不足,效率低,成本高,安全风险大等问题,直接影响公司乃至行业的经济效益。
     本课题主要是结合供应链信息化需求,研究UHF (Ultra High Frequency)频段RFID技术运用于供应链的性能表现,通过对供应链中生产线,仓储,终端零售、展示、防伪等关键部分设计部署,形成一套基于超频高频RFID技术供应链演示系统。结合该系统,针对在使用过程中出现以及可能出现的安全性问题,对系统的安全性进行全面分析。从超高频RFID系统的标签编码、空中接口、中间件以及后台服务四个方面分层研究系统安全性,制定相应的安全措施。
     本文主要成果是,在研究超高频RFID技术基础上,根据项目的开发背景和需求对系统各个分项进行详细的分析,设计相应的应用场景。同时根据需求进行软件系统的架构和软件设计实现。对系统中使用的关键设备和技术方法进行详细说明。结合课题中的应用系统,研究超高频RFID技术在应用过程中的安全性问题,分析问题出现的原因,同时从软件和硬件两个方面对系统进行改进,增强系统的安全性。在系统的部署演示过程中,研究在大型RFID分布式系统部署中的数据库远程连接,WCF服务部署,阅读器配置安装以及提高标签识别率的相关方法。
With the acceleration of globalization, China is more in-depth integrating into the world economy. Global division of labor has become increasingly sophisticated, growing the dependence of industrial chain over production. The supply chain is the core of modern production, controlling the upstream and downstream of industries. Entire supply chain in Chinese industry, especially in the manufacturing sector, is lack of information, low efficiency, high cost and security risk that will directly impact on the economic benefits of a company and even the whole industry as well.
     The main subject of this paper is to fit the needs of supply chain information, research the performance of supply chain with UHF (Ultra High Frequency) RFID technology, and develop a supply chain demonstration center which consisted of production line, warehousing, retail terminals, production display and anti-counterfeiting those are the important parts of a supply chain. Based on the problems appearing or possibley appearing in the process of using the system, we can conduct a comprehensive analysis of the system's security and develop appropriate safety measures to strengthen the security of the hierarchical system which is consisted of the UHF RFID tag coding system, air interface, middleware and back-office services.
     In this paper, according to the development of the project background and needs of the various sub-items of the supply chain system, I made a detailed analysis on the UHF RFID technology. With the needs of the system, I researched the software architecture and database design, and given a detailed description of the key equipment and technology of the demonstrate system. During the development of the large-scale distributed RFID systems, I researched UHF RFID technology security issues in the application process, analyzed the cause of the problem, and enhanced the security of the system from both the software and hardware. In the deployment of the system during the demonstration, I also researched remote database connection, WCF service deployment, the RFID reader's configuration and installation as well as the way to improve the tag's recognition rate.
引文
[1]江少文编著.现代仓储管理实务.国铁道出版社.2006.50-52
    [2]Sarmas.E.,WeisS.A.,Engels D.W..RFID Systems And Security And Privacy Implications. In: Proceedings Of The 4th Iternational Workshop On Cryptographic Hard-ware And Embedded Systems. Springer-Verlag Berlin,2003:454-469
    [3]周晓光,王晓华.射频识别技术原理与应用实例.人民邮电出版社.2006.12-15
    [4]Stephen A. Weis,Sanjay E.Sarma,Ronald L.Rivest,and Daniel W. E..security and Privacy Aspects of Low-Cost RFID Systems.2001.
    [5]游战清,刘克胜.无线射频识别技术规划与实施.电子工业出版社.2005.24-53
    [6]Frank Thornton,Brad Hainesm,Anand M.Das..RFID Security.2006.17-20
    [7]Harry Stockman. Communication by Means of Reflected Power.1948.
    [8]张自宾,和可月,王竹林.微波标签识别系统.测试技术学报,2004.6-32
    [9]张云勇, 张智江,刘锦德.中间件技术原理与应用.清华大学出版社.2004.17-25
    [10]Chris Hurley, Frank J. Thornton, ((WarDriving:Drive, Detect, Defend)),36-70
    [11]EPC Global.EPC Radio-Frequency Identity Protocols Class-1 Generation 2 UHF RFID.2005
    [12]S Muehlenkamp. RFID 发展和应用现状. 现代制造,2004.39-89
    [13]Frank Thornton,Brad Hainesm,Anand M.Das..RFID Security.2006.29-37
    [14]陈志雄.RFID发展的前景及应用分析.金卡工程,2004.13-34
    [15]R Want. RFID:A key to automating everything.Scientific American.1991
    [16巴罗著/王晓东译.企业物流管理——供应链的规划、组织和控制.机械工业出版社.2006
    [17马林.基于供应链演变的信息分享模式分析.数量经济技术经济研究.2003
    [18彼得·圣吉著,张成林译.第五项修炼.中信出版社.2009.56-89
    [19谢海滨.供应链“牛鞭效应”.中国民营科技与经济.2008
    [20]张涛,孙林岩.供应链不确定性管理:技术与策略.2005.13-28
    [21]Frank Thornton,Brad Hainesm,Anand M.Das..RFID Security.2006.p57
    [22]G Dhillon, J Backhouse. Technical opinion:Information system security management in the new millennium.Communications of the ACM.2000
    [23]EPC Global.EPC Radio-Frequency Identity Protocols Class-1 Generation 2 UHF RFID.2005
    [24]李晓延.用RFID铸造打假利器.今日电子.2007
    [251 Stephen A. Weis,Sanjay E.Sarma,Ronald L.Rivest,and Daniel W. E..security and Privacy Aspects of Low-Cost RFID Systems.2001
    [26]MSDN WCF技术文档]tttp://msdn.microsoft.com/zh-cn/library/ms731082.aspx
    [27]J Daemen, V Rijmen.Rijndael.AES Proposal.1998
    [28]马骏主编.《C#网络应用编程》第二版.人民邮电出版社.2019,2:276-307
    [29]维基百科.RSA加密演算法。http://en.wikipedia.org/wiki/RSA_(algorithm)