跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.59) 您好!臺灣時間:2025/10/12 06:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:洪斐瑤
研究生(外文):Fei-Yau Hung
論文名稱:RFID系統之讀取裝置確認與標籤碰撞避免之研究
論文名稱(外文):On RFID Reader Authentication and Tag Anti-Collision
指導教授:洪國寶洪國寶引用關係
指導教授(外文):Gwo-Boa Horng
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:46
中文關鍵詞:無線射頻識別身份認證碰撞避免
外文關鍵詞:RFID (Radio Frequency Identification)Authenticationanti-collision
相關次數:
  • 被引用被引用:0
  • 點閱點閱:196
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:4
無線射頻識別 (Radio Frequency Identification),一個存在將近已50年的技術,在近幾年被大家熱烈的討論。在幾乎所有的文獻當中,對於標籤的隱私以及安全性的問題,通常針對於探討資料庫與標籤之間的認證。而隨著標籤的發展,亦使其越來越方便得以寫入訊息。但直至目前為止,在重複寫入標籤的方面似乎還有許多新的想法。在此我們提出了對於讀取裝置的認證並考慮到標籤的資源限制來提出適用於無線射頻識別系統中的認證方式。另外,在目前無線射頻識別系統運作的無線環境中,尚有標籤回應時發生碰撞以致於讀取裝置無法正確無誤確認標籤身分的問題。目前許多的解決方式似乎都還有許多改進的空間。我們在此篇論文中不延續改進先前的解決方式,而是提出了另一種方法來解決此類的問題。我們利用亂數均勻分布且無法預測的性質去達到對讀取裝置的認證以及防止標籤在回應時發生碰撞的目的,並且碰撞機率來分析我們提出的方法。
RFID (Radio Frequency Identification) technique, which has been existed over 50 years, is discussed extensively at present. Regarding to the privacy and security problem of tags, most schemes discuss the authentication issue between the backend system and tags. In addition, collisions may happen when tags respond to the reader simultaneously so that the reader can not identify tags correctly. There seems to be a lot of places can be improved in the present solutions. In this thesis we take into account the resource constrained of tags and propose a new way to resolve these issues. We achieve the goal of authenticating the reader and preventing the tags collisions by using the uniformed distributed and unpredictable properties of random numbers, and then we analyze our scheme by calculating the probability of the collisions.
1Introduction……………………………………………………1
1.1Background andMotivation………………………………1
1.2Contributions……………………………………………3
1.3Thesis Organization……………………………………4
2Preliminary……………………………………………………5
2.1Evolution…………………………………………………5
2.1.1Product-identification…………………………5
2.1.2Specification of RFIDs…………………………6
2.1.3Secrecy in RFID systems………………………8
2.1.4Applications of RFID systems…………………9
2.2Collisions………………………………………………10
2.2.1Collisions in RFID systems……………………10
2.2.2Solutions to the collision problem in RFID systems…10
2.3Authentication……………………………………………12
2.4Hash chain techniques……………………………………14
2.4.1Description…………………………………………14
2.4.2Secrecy………………………………………………15
2.4.3Benefits……………………………………………15
3Related Work……………………………………………………16
3.1Cryptographic Approach to “Privacy-Friendly” Tags...17
3.2Lightweight Authentication protocols for Low-cost RFID tags …21
3.3Efficient Memory less protocol for tag identification………25
3.4An Adaptive Memory less tag Anti-Collision Protocol for RFID Networks .28
4The proposed scheme…………………………………………31
4.1System model and assumptions………………………31
4.2Protocol description…………………………………33
4.3Collision Analysis……………………………………39
4.4Security analysis……………………………………41
5Conclusion……………………………………………………42
Bibliography…………………………………………………43
[1]Jihoon Myung and Wonjun Lee, “An Adaptive Memoryless Tag Anti-Collision Protocol for RFID Networks.”, the 24th IEEE Annual Conference on Computer Communications (INFOCOM 2005), Poster Session, Miami, USA, March 2005.
[2]Shang-Wei Wang, Wun-Hwa Chen, Chrng-Shyong Ong, Li Liu, and Yun-Wen Chuang, “RFID applications in hospitals : a case study on a demonstration RFID project in a Taiwan hospital.”, Proceedings of the 38th Hawaii International Conference on System Sciences 2005.
[3]Katina Michael, and Luke McCathie, “The pros and Cons of RFID in Supply Chain Management.”, Mobile Business International Conference, 2005.
[4]Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee, “An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification.”, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services pp. 166-174, 2005.
[5]Ching Law, Kayi Lee, and Kai-Yeung Siu, “Efficient Memoryless Protocol for Tag Identification.”, In Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75-84, Boston, MA, August 2000.
[6]Ho-seung Choi, Jae-Ryong Cha, and Jae-Hyun Kim, “Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.”, Vehicular Technology Conference Page(s):4589 - 4592 Vol. 6, 2004.
[7]István Vajda and Levente Buttyán, “Lightweight Authentication Protocols for Low-Cost RFID Tags”, Workshop on Security in Ubiquitous Computing, October 2003.
[8]L. Lamport, “Password Authentication with Insecure Communication”, Communications of ACM, Vol. 24, pp. 770-772, 1981.
[9]Y. C. Chen and L. Y. Yeh, “An Efficient Nonce-Based Authentication Scheme with Key Agreement”, Applied Mathematics and Computation, Available online 12 January 2005.
[10]M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to “Privacy-Friendly” Tags.”, In RFID Privacy Workshop, MIT, USA, 2003.
[11]Chi Sung Laih, Lein Harn, and Chin Chen Chang, “Contemporary Cryptography and It’s Applications.” 旗標出版有限公司.
[12]H. Vogt., “Multiple Object Identification with Passive RFID Tags.”, Proc. Pervasive 2002.. IEEE International Conference on Systems, Man and Cybernetics, pp. 98-113. October 2002.
[13]A. Micic, A. Nayak, D. Simplot-Ryl, I. Stojmenović. ”A hybrid randomized protocol for RFID tag identification.”, in: Sensor Review, to appear, 2006.
[14]Jihoon Myung, Wonjun Lee, Jaideep Srivastava, “Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification.”, accepted for publication in ACM Mobile Networks and Applications (ACM MONET), 2006.
[15]Ho-Seung Choi, Jae-Ryon Cha, Jae-Hyun Kim, ” Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.” , page(s): 4589- 4592 Vol. 6, Vehicular Technology Conference, 2004.
[16]J. I. Capetanakis, “Tree algorithms for packet broadcast channels”, IEEE Trans. Inform. Theory, vol. 25, no. 4, pp. 505--515, Sept. 1979.
[17]Chandon, Pierre, Wansink Brian, and Laurent Gilles. “A Benefit Congruency Framework of Sales Promotion Effectiveness,” Journal of marketing. Vol. 64 , pp. 65-81 (October), 2000.
[18]R. Bucklin and S. Gupta, "Commercial Use of UPC Scanner Data: Industry and Academic Perspectives," Marketing Science, 1999.
[19]Jon Hannibal Stokes, “Understanding Moore''s Law”, Http://arstechnica.com/articles/paedia/cpu/moore.ars , 2003.
[20]Sarma, S. Brock, D. Engels, D. “Radio frequency identification and the electronic product code.”, IEEE Micro, Volume: 21, Issue: 6, page(s): 50-54, Nov/Dec 2001.
[21]Rao, K.V.S., “An overview of backscattered radio frequency identification system (RFID).”, IEEE Asia Pacific Microwave Conference, Volume: 3, page(s): 746-749, 1999.
[22]Marrocco, G., “Gain-optimized self-resonant meander line antennas for RFID applications.”, IEEE Antennas and Propagation Letters, Volume: 2, page(s): 302- 305, 2003.
[23]Steven Molesa, David R. Redinger, Daniel C. Huang, and Vivek Subramanian. “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications.”, in Proc. Materials Re-search Society Spring Meet., H8.3.1-6 vol. 769, 2003.
[24]Marrocco, G., Fonte, A., Bardati, F., “Evolutionary design of miniaturized meander-line antennas for RFID applications.”, IEEE Trans. Antennas &Propagaion, page(s): 362- 365 vol.2, 2002.
[25]Cheng-Ju Li, Li Liu, Shi-Zong Chen, Chi Chen Wu, Chun-Huang Huang, Xin-Mei Chen., “Mobile healthcare service system using RFID.”, IEEE International Conference on Networking, Sensing and Control, page(s): 1014- 1019 Vol.2, 2004.
[26]Heather Smith, Benn Konsynski, “Developments in practice X: Radio Frequency Identification (RFID) - An internet for physical objects.”, Communications of the Association for Information Systems (Volume 12) pp.301-311, 2003.
[27]Zongwei Luo, Terry Chan, Jenny S. Li, “A Lightweight Mutual Authentication Protocol for RFID Networks.”, IEEE International Conference on e-Business Engineering, 18-20, October 2005.
[28]Dimitriou, T., “A lightweight RFID protocol to protect against traceability and cloning attacks.” In Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks, 2005.
[29]Gene Tsudik., “Ya-trap: Yet another trivial RFID authentication protocol.” International Conference on Pervasive Computing and Communications, PerCom, 2006.
[30] Alrabady, A.I.; Mahmud, S.M., “Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs.”, Vehicular Technology, IEEE Transactions on Volume 54, Issue 1, Page(s):41 – 50, Jan. 2005
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 10、黃茂榮,稅捐法定主義(上),植根雜誌第二十卷第四期,二○○四年四月,頁149至208。
2. 01、廖欽福,台灣與中共關於國家財稅體制之定位與轉變(上),稅務旬刊第一九一一期,頁33至35。
3. 09、黃茂榮,稅捐稽徵經濟原則,植根雜誌第二十卷第十期,二○○四年十月,頁400至436。
4. 11、林金源,所得稅稅制改革對所得分配之影響,財稅研究第三十八卷第三期,頁12至44。
5. 12、范錦明、高秋真,從比較經濟制度的角度探討兩岸地方稅制差異之研究,財稅研究第三十八卷第五期,頁191至214。
6. 08、吳煜宗,憲法前言,月旦法學教室第二十九期,二○○五年三月,頁42至43。
7. 07、許育典,多元文化國,月旦法學教室第六期,二○○三年四月,頁39至39。
8. 06、黃茂榮,論稅捐罰則(上),植根雜誌第二十一卷第九期,二○○五年九月,頁23至38。
9. 03、謝耀智、莊子禾,兩岸租稅結構之探討-成長、穩定、公平之實證研究,財稅研究第三十七卷第五期,二○○五年九月,頁19至31。
10. 02、黃茂榮,論稅捐罰則(下),植根雜誌第二十一卷第十期,二○○五年十月,頁1至40。
11. 01、江玉林,近代初期國家的塑造,社會的規訓化與憲法史的論述--論萊因哈德「國家權力的歷史」一書中的權力建構過程,月旦法學第八十二期,二○○三年三月,頁238至247。
12. 03、廖欽福,台灣與中共關於國家財稅體制之定位與轉變(下),稅務旬刊第一九一四期,頁38至40。
13. 26、陳清秀,稅法的基本原則(下),植根雜誌第九卷第十期,一九九三年十月,頁1至6。
14. 25、陳清秀,稅法的基本原則(上),植根雜誌第九卷第九期,一九九三年九月,頁31至40。
15. 24、施慧玲,論我國家庭法之發展與研究──一個家庭法律社會學的觀點,政大法學評論第六十三期,二○○○年六月,頁239至269。