CN113225734A - Base station-like type energy supply encryption method based on RFID passive transmission - Google Patents

Base station-like type energy supply encryption method based on RFID passive transmission Download PDF

Info

Publication number
CN113225734A
CN113225734A CN202110341132.0A CN202110341132A CN113225734A CN 113225734 A CN113225734 A CN 113225734A CN 202110341132 A CN202110341132 A CN 202110341132A CN 113225734 A CN113225734 A CN 113225734A
Authority
CN
China
Prior art keywords
tag
reader
energy supply
base station
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110341132.0A
Other languages
Chinese (zh)
Inventor
赵菊敏
李灯熬
张晓鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiyuan University of Technology
Original Assignee
Taiyuan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiyuan University of Technology filed Critical Taiyuan University of Technology
Priority to CN202110341132.0A priority Critical patent/CN113225734A/en
Publication of CN113225734A publication Critical patent/CN113225734A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/20Circuit arrangements or systems for wireless supply or distribution of electric power using microwaves or radio frequency waves

Abstract

The invention relates to the technical field of data transmission, in particular to a base station-like energy supply encryption method based on RFID passive transmission, which comprises the steps that a transmitting tower constantly receives a command of a reader/receiving end in a local area in a silent mode; when a Query command sent by a reader/receiving end is received, the transmitting tower starts to send continuous waves with encryption information to the tag for encryption and reflection communication of the tag; the reader receives the reflected wave from the label and the encrypted information of the continuous wave sent by the transmitting tower, and corresponding decoding is carried out at the receiving end; according to the invention, the energy supply is ensured and the encryption effect is ensured by additionally arranging the transmitting tower; and the stability of transmission and encryption requirements are improved.

Description

Base station-like type energy supply encryption method based on RFID passive transmission
Technical Field
The invention relates to the technical field of data transmission, in particular to a base station-like energy supply encryption method based on RFID passive transmission.
Background
In the future internet of things, network nodes can be passive (battery free), that is, the nodes do not have to be equipped with or mainly rely on power supply equipment such as batteries, and can obtain energy from the environment and support sensing, transmission and distributed computation of data. This new type of network is also known as a passive transport network. The passive transmission network is a wireless network which takes energy as a center and takes data as a core, and has the following characteristics:
1. energy oscillation
Because the node can acquire energy from the surrounding environment, the energy of the node is not a single static change trend from high to low, but is in a dynamic change state from high to low. When a node is performing a transmission or computation task, its energy accumulation may decrease; when a node begins to draw energy from the environment, its energy accumulation may rise. Thus, the energy of the passive transport network node accumulates high and low oscillations.
2. Loss of energy
The acquisition of the energy of the passive transmission network nodes has randomness and instability, so that the energy distribution of the whole network is unbalanced and greatly different, and the cooperative working capability of the passive nodes is low.
3. Limited energy
The power of the environmental energy collected by the microchip is very weak, generally on the order of nano watt (nW) to micro watt (μ W), and the microsensor is limited in external dimensions and has limited node power storage capability.
4. Connectivity vulnerability
The connectivity of the network is directly influenced by the energy of each node. When the energy of some nodes is lower than a certain level, the nodes become isolated nodes, and the network is disconnected. Due to the concussion of energy, the connectivity of the network is fragile, intermittent and difficult to maintain constant connectivity.
5. Ultra low duty cycle
The average working power required by driving the miniature sensing node is 3-6 orders of magnitude higher than the collected power, the node needs long-time energy storage to meet the energy required by the work of the node, and the node cannot work during energy storage. Therefore, the nodes are in a discontinuous working mode, the network is in a non-working state most of the time, and the duty ratio is ultralow.
At present, a passive transmission network is centered on energy, the energy is crucial to the performance of the network, and although the energy of passive nodes randomly obtained from the environment is wide, the problem of insufficient energy enrichment exists. In the face of trillions of passive nodes of the future Internet of things, the energy in the close environment is not enough to meet the development of the future Internet of things and support the passive nodes to carry out complex encryption and communication algorithms. In order to solve the problem of energy of a future passive transmission network, a special energy supply device should be provided for the nodes to meet the increasing demand of the passive nodes on energy, and meanwhile, in order to meet various future challenges, such as information stealing and various problems caused by energy restriction of the passive nodes, a new solution can be developed on the basis of a transmitting tower.
The passive tag in the existing backscatter system has two working states: absorbing signal energy and reflecting the signal. However, the existing passive tag can only save energy cost through a simple encoding mode, but sacrifices better and more complex encryption and communication algorithms.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the base station-like energy supply encryption method based on RFID passive transmission solves the problems in the prior art.
In order to solve the technical problems, the invention adopts the technical scheme that: a base station-like energy supply encryption method based on RFID passive transmission comprises
The transmitting tower is silent and continuously receives the command of the reader/receiving end in the area;
when a Query command sent by a reader/receiving end is received, the transmitting tower starts to send continuous waves with encryption information to the tag for encryption and reflection communication of the tag;
the reader receives the reflected wave from the label and the encrypted information of the continuous wave sent by the transmitting tower, and corresponding decoding is carried out at the receiving end.
The invention has the beneficial effects that: by additionally arranging the transmitting tower, the supply of energy is ensured, and the encryption effect is ensured; and the stability of transmission and encryption requirements are improved.
Drawings
Fig. 1 is a schematic diagram of a hardware direction of a base station-like energy supply encryption method based on RFID passive transmission according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of ranges between tags;
fig. 3 is a communication flow time domain diagram of a base station-like energy supply encryption method based on RFID passive transmission according to an embodiment of the present invention;
fig. 4 is a flow chart illustrating the rules of energy usage of a base station-like energy supply encryption method based on RFID passive transmission according to an embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 to 4, a base station-like energy supply encryption method based on RFID passive transmission includes
The transmitting tower is silent and continuously receives the command of the reader/receiving end in the area;
when a Query command sent by a reader/receiving end is received, the transmitting tower starts to send continuous waves with encryption information to the tag for encryption and reflection communication of the tag;
the reader receives the reflected wave from the label and the encrypted information of the continuous wave sent by the transmitting tower, and corresponding decoding is carried out at the receiving end.
As can be seen from the above description, the additional arrangement of the transmitting tower ensures the supply of energy and the encryption effect; and the stability of transmission and encryption requirements are improved.
Further, the communication between the reader and the tag follows the EPC C C1G2 standard protocol.
Further, in the communication between the reader and the tag, the reader continuously sends a Query command to the tag, when only one tag responds in one time slot, the time slot is valid, otherwise, the time slot is discarded.
Further, after receiving the Query command, the TAG sends RN16, the reader sends ACK confirmation after receiving RN16, and after receiving ACK, the TAG returns its TAG ID to complete reading of the TAG by the reader;
and the above process is repeated.
Further, when no RN16 replies, the reader will continue to send Query command, which is detected by the transmitting tower and used to determine whether there is a communication need in the area by receiving the Query command, and then choose whether to send encrypted continuous wave.
Example one
A base station-like energy supply encryption method based on RFID passive transmission comprises
The transmitting tower is silent and continuously receives the command of the reader/receiving end in the area;
when a Query command sent by a reader/receiving end is received, the transmitting tower starts to send continuous waves with encryption information to the tag for encryption and reflection communication of the tag;
the reader receives the reflected wave from the label and the encrypted information of the continuous wave sent by the transmitting tower, and corresponding decoding is carried out at the receiving end.
The communication between the reader and the tag follows EPC C C1G2 standard protocol.
In the communication between the reader and the tag, the reader continuously sends a Query command to the tag, when only one tag responds in one time slot, the time slot is valid, otherwise, the time slot is discarded.
After receiving the Query command, the TAG sends RN16, the reader sends an ACK acknowledgement after receiving RN16, and after receiving the ACK, the TAG returns the TAG ID of the TAG to finish reading the TAG by the reader;
and the above process is repeated.
When no RN16 replies, the reader will continue to send Query commands, which the transmitting tower will detect and determine whether the area has communication needs by receiving the Query commands, and then choose whether to send encrypted continuous waves.
The design scheme of the invention is to add base station-like energy supply points in a passive transmission network, and a schematic diagram is shown in figure 1. The number of the energy points is set properly according to the distribution setting of the passive rfid tags and the radiation range of the energy supply points. While the communication between the tags is subject to malicious eavesdropping, as shown in fig. 2, and therefore the continuous wave CW transmitted by the tower is encrypted.
The communication between the reader and the tag follows the EPC C C1G2 standard protocol, in the communication between the reader and the tag, the reader continuously sends a Query command to the tag, when only one tag responds in one time slot, the time slot is valid, otherwise, the time slot is discarded. After receiving the Query command, the TAG sends RN16, the reader sends ACK acknowledgement after receiving RN16, and after receiving ACK, the TAG returns its TAG ID to complete reading of the TAG by the reader, and a communication flow time domain diagram is shown in fig. 3. The process then continues to loop. When no RN16 replies, the reader will continue to send Query command, which is detected by the transmitting tower and used to determine whether the area has communication need by receiving the Query command, and then choose whether to send the encrypted continuous wave CW.
The rule flow chart of energy usage is shown in fig. 4:
the transmitting tower is silent and continuously receives the command of the reader or the receiving end in the area;
when receiving a query start command sent by a reader, for example, a transmitting tower starts to send a continuous wave CW with encryption information for the tag for encryption and reflection communication of the tag;
the reader receives the reflected wave from the label and the encrypted information of the continuous wave CW sent by the transmitting tower, and corresponding decoding is carried out at the receiving end.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (5)

1. A base station-like energy supply encryption method based on RFID passive transmission is characterized by comprising the following steps
The transmitting tower is silent and continuously receives the command of the reader/receiving end in the area;
when a Query command sent by a reader/receiving end is received, the transmitting tower starts to send continuous waves with encryption information to the tag for encryption and reflection communication of the tag;
the reader receives the reflected wave from the label and the encrypted information of the continuous wave sent by the transmitting tower, and corresponding decoding is carried out at the receiving end.
2. The base station-like energy supply encryption method based on RFID passive transmission according to claim 1, wherein the communication between the reader and the tag follows EPC C1G2 standard protocol.
3. The base station-like energy supply encryption method based on RFID passive transmission as claimed in claim 1, wherein in the communication between the reader and the tag, the reader continuously sends Query command to the tag, when only one tag responds in a time slot, the time slot is valid, otherwise the time slot is discarded.
4. The base station-like energy supply encryption method based on RFID passive transmission as claimed in claim 3, wherein the TAG sends RN16 after receiving the Query command, the reader sends ACK acknowledgement after receiving RN16, and the TAG returns its TAG ID after receiving ACK, thereby completing the reading of the TAG by the reader;
and the above process is repeated.
5. The RFID passive transmission-based base station-like energy supply encryption method as claimed in claim 4, wherein when no RN16 replies, the reader continuously sends a Query command, which is detected by the transmitting tower and used for judging whether the area has a communication requirement by receiving the Query command, thereby selecting whether to send the encrypted continuous wave.
CN202110341132.0A 2021-03-30 2021-03-30 Base station-like type energy supply encryption method based on RFID passive transmission Pending CN113225734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110341132.0A CN113225734A (en) 2021-03-30 2021-03-30 Base station-like type energy supply encryption method based on RFID passive transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110341132.0A CN113225734A (en) 2021-03-30 2021-03-30 Base station-like type energy supply encryption method based on RFID passive transmission

Publications (1)

Publication Number Publication Date
CN113225734A true CN113225734A (en) 2021-08-06

Family

ID=77084456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110341132.0A Pending CN113225734A (en) 2021-03-30 2021-03-30 Base station-like type energy supply encryption method based on RFID passive transmission

Country Status (1)

Country Link
CN (1) CN113225734A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645577A (en) * 2021-08-25 2021-11-12 国网浙江省电力有限公司双创中心 Wireless communication method, device, equipment and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098500A (en) * 2006-06-30 2008-01-02 联想(北京)有限公司 Communication system and communication method fusing mobile communications network and video broadcasting network
CN103280853A (en) * 2013-05-23 2013-09-04 奇瑞汽车股份有限公司 Transmitting tower type remote automobile charging system and charging method
CN107704791A (en) * 2017-10-24 2018-02-16 太原理工大学 RFID uplink communication links optimization methods can be calculated
CN108320353A (en) * 2017-12-20 2018-07-24 安徽云森物联网科技有限公司 A kind of REID technologies identification positioning system
CN109104420A (en) * 2018-07-30 2018-12-28 太原理工大学 A kind of data rapid transmission method based on EPC communication protocol
CN111343617A (en) * 2020-01-20 2020-06-26 太原理工大学 EPC protocol improvement method for improving CRFID data transmission rate
CN112350742A (en) * 2020-09-30 2021-02-09 西安电子科技大学 FM backscatter amplifier and backscatter system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098500A (en) * 2006-06-30 2008-01-02 联想(北京)有限公司 Communication system and communication method fusing mobile communications network and video broadcasting network
CN103280853A (en) * 2013-05-23 2013-09-04 奇瑞汽车股份有限公司 Transmitting tower type remote automobile charging system and charging method
CN107704791A (en) * 2017-10-24 2018-02-16 太原理工大学 RFID uplink communication links optimization methods can be calculated
CN108320353A (en) * 2017-12-20 2018-07-24 安徽云森物联网科技有限公司 A kind of REID technologies identification positioning system
CN109104420A (en) * 2018-07-30 2018-12-28 太原理工大学 A kind of data rapid transmission method based on EPC communication protocol
CN111343617A (en) * 2020-01-20 2020-06-26 太原理工大学 EPC protocol improvement method for improving CRFID data transmission rate
CN112350742A (en) * 2020-09-30 2021-02-09 西安电子科技大学 FM backscatter amplifier and backscatter system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
CHEN CHEN ECT.: ""Detection of Ambient Backscatter Signals from Multiple-Antenna Tags"", 《2018 IEEE 19TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC)》 *
NGUYEN VAN HUYNH: "Ambient Backscatter Communications: A Contemporary Survey", 《IEEE COMMUNICATIONS SURVEYS & TUTORIALS》 *
孔令平等: "EPC标签的通讯过程研究", 《山东轻工业学院学报(自然科学版)》 *
杨晓东等: "基于物联网技术的信息资源开发利用研究", 《计算机与网络》 *
章文斌等: "基于NAK的WISP数据传输方案", 《计算机科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645577A (en) * 2021-08-25 2021-11-12 国网浙江省电力有限公司双创中心 Wireless communication method, device, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
Namboodiri et al. An extensive study of slotted Aloha-based RFID anti-collision protocols
US9031503B2 (en) Wireless data communications
Issovits et al. Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks
US20180032762A1 (en) Rfid reader discipline
Kang et al. DDC: A novel scheme to directly decode the collisions in UHF RFID systems
Liu et al. Generic composite counting in RFID systems
Nagashree et al. Near field communication
KR101129832B1 (en) Estimation of the cardinality of a set of wireless devices
CN113225734A (en) Base station-like type energy supply encryption method based on RFID passive transmission
Solic et al. Software defined radio based implementation of RFID tag in next generation mobiles
Chen et al. Token-MAC: A fair MAC protocol for passive RFID systems
Chunli et al. Application and development of RFID technique
Yan et al. Evaluating the energy consumption of the RFID tag collision resolution protocols
CN110276423A (en) A kind of RFID Verification System for chip finger print of high encryption
JP2021521537A (en) Self-powered semi-active electronic tag with autonomous processing function and its communication procedure
Mulatu Energy cooperation in communication of energy harvesting tags
Kim et al. Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems
CN102043934B (en) Radio frequency identification system and operating method thereof
Bozdogan et al. Layered model architecture for internet of things
Zhao et al. LILAC: Computable capabilities based high performance protocol for CRFID
Ma et al. Efficient missing tag detection in a large RFID system
JP2013004054A (en) Active rfid communication control method and rfid wireless device
Bonuccelli et al. Exploiting id knowledge for tag identification in rfid networks
Yu et al. Design and Implementation of a Low-Cost Universal RFID Wireless Logistics Terminal in the Process of Logistics Traceability
Grout et al. RFID enabled sensor system design

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210806

RJ01 Rejection of invention patent application after publication