跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.87) 您好!臺灣時間:2025/01/17 19:37
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:邱書舫
研究生(外文):Shu-Fang Chiu
論文名稱:GroupProofforMultipleRFIDTags
論文名稱(外文):Group Proof for Multiple RFID Tags
指導教授:古政元古政元引用關係
指導教授(外文):Cooper Ku
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
畢業學年度:94
語文別:英文
論文頁數:65
中文關鍵詞:RFID tag cloninggroup proofHF RFIDUHFRFIDSATCtree-walking
外文關鍵詞:HF RFIDgroup proofRFID tag cloningUHFRFIDSATCtree-walking
相關次數:
  • 被引用被引用:0
  • 點閱點閱:432
  • 評分評分:
  • 下載下載:82
  • 收藏至我的研究室書目清單書目收藏:4
RFID, radio frequency identification, is a technology whose time has come for creating a lot of applications. There are currently many RFID applications which bring numerous benefits to organizations and society, such as aviation companies and drug manufacturers.
In this paper, we will propose an architecture which can protect RFID from cloning. We believe our proposed architecture has two main advantages. First, this architecture is a robust system to prevent RFID tags from cloning. Second, our architecture can be applied in various contexts such as pharmacy and aviation.
Basically, our architecture can be presented in two parts, given different operating frequency band. RFID tags which we employ are complied with EPCglobal proposed specifications.
RFID, radio frequency identification, is a technology whose time has come for creating a lot of applications. There are currently many RFID applications which bring numerous benefits to organizations and society, such as aviation companies and drug manufacturers.
In this paper, we will propose an architecture which can protect RFID from cloning. We believe our proposed architecture has two main advantages. First, this architecture is a robust system to prevent RFID tags from cloning. Second, our architecture can be applied in various contexts such as pharmacy and aviation.
Basically, our architecture can be presented in two parts, given different operating frequency band. RFID tags which we employ are complied with EPCglobal proposed specifications.
1. INTRODUCTION 1
1.1 BACKGROUND 1
1.2 MOTIVATION 3
1.3 RESEARCH PROBLEM AND OBJECTIVE 5
1.4 ORGANIZATION 6
1.5 RESEARCH PROCESS 6
2. LITERATURE REVIEW 7
2.1 RFID SYSTEM 7
2.2 RFID TAG 9
2.3 EPC NETWORK 17
2.4 RFID SECURITY PROBLEM 19
2.5 YOKING PROOF AND GROUPING PROOF 23
3. PROPOSED ARCHITECTURE 27
3.1 ASSUMPTION 27
3.2 PRIMARY PROTOCOL FOR 13.56 MHz (HF) RFID 28
3.3 PRIMARY PROTOCOL FOR 900 MHz (UHF )RFID 32
3.4 ENHANCED PROTOCOL FOR 13.56 MHz (HF) RFID 34
3.5 ENHANCED PROTOCOL FOR 900 MHz (UHF)RFID 37
4. IMPLEMENTATION AND SECURITY ANALYSIS 38
4.1. IMPLEMENTATION FOR 13.56 MHz(HF) RFID 38
4.2. IMPLEMENTATION FOR 900 MHz(UHF) RFID 43
4.3. SECURITY ANALYSIS 45
4.4. APPLICATION SCENARIO 47
5. CONCLUSION AND FUTURE WORK 49
5.1. CONSLUSION 49
5.2. FUTURE WORK 52
[1]Ari Juels, “Yoking-Proofs” for RFID Tags, Workshop on Pervasive Computing and Communications Security - PerSec, March 2004
[2]Junichiro Saito and Kouichi Sakurai, “Grouping proof for RFID tags”, Conference on Advanced Information Networking and Applications, Volume 2, Page 621 - 624 , March 2005,
[3]Steven Shepard, “ RFID-Radio Frequency Identification”, McGraw Hill, 2005
[4]“Radio Frequency Identification White paper”, accenture,2001
[5]“Radio Frequency Identification(RFID) Strategy Paper”, Comter, 2004
[6]Air Juels, “Strengthening EPC Tags Against Cloning”, Proceedings of the 4th ACM workshop on Wireless security WiSe '05, September 2005
[7]Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engles, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003
[8]Damith C. Ranasinghe, Daniel W. Engels, and Peter H. Cole, “ Low-Cost RFID Systems: Confronting Security and Privacy”, Auto-ID Labs Research Workshop, September 2004
[9]“900 MHz Class 0 Radio Frequency (RF) Identification Tag Specification”, EPCglobal, http://www.epcglobalinc.org/standards _technology/specifications.html
[10]“13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface Specification”, EPCglobal, http://www.epcglobalinc.org/standards _technology/specifications.html
[11]Thorsten Staake, Frederic Thiesse, and Elgar Fleisch, “ Extending the EPC Network-The Potential of RFID in Anti-Counterfeiting”, Symposium on Applied Computing,March 2005
[12]RFID 技術與應用,日經BP RFID技術編輯部編,周湘琪譯,旗標文化,2004年11月
[13]RFID EPC 無線射頻辨識完全剖析,鄭同柏着,博碩文化,2004年11月
[14]蕭榮興,釣|嘉,”無線射頻技術的應用與發展趨勢”, 資策會電子商務研究所,2004,09.01
[15]RFID 技術,工業技術研究院 系統與航太發展中心,http://www.cast.itri.org.tw/research/rfid.htm#title8, 2003
[16]FDA Initiative Promotes RFID Adoption, American Society of Health- System Pharmacist, 2004,11,15, http://www.ashp.org/news/ShowArticle.cfm?id=8654
[17]FDA Endorse RFID Technology, RFID Journal, 2004,2,18, http://www.rfidjournal.com/article/view/801/1/1/
[18]Robin Koh, Emund W. Schuster, Indy Chackrabarti, and Attilio Bellman, “White Paper – Securing the Pharmaceutical Supply Chain”, Auto-ID Center, June 1, 2003
[19]RFID Market Review, the MacLean Group, http://www.mcleanllc.com, January 2004
[20]RFID Tags Fly with Airplane Parts, InformationWeek http://informationweek.com/showArticle.jhtml?articleID=53701369&tid=16031, April 22, 2004
[21]Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels, “RFID systems, Security, & Privacy Implications”, Auto-ID center , November 11, 2002.
[22]Tassos Dimitriou, “A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks”, SecureComm, September 2005
[23]EPCglobal, http://www.epcglobalinc.org/about/about.html
[24]Matthias Lampe, Martin Strassner, and Elgar Fleisch,” A Ubiquitous Computing Environment for Aircraft Maintenance”, ACM Symposium on Applied Computing,, Nicosia, Cyprus, March 14-17, 2004, 1586–1592.
[25]Aviation Today, “RFID: The Future of MRO Supply Chain` Management”, http://www.aviationtoday.com/cgi/am/show_mag.cgi?pub=am&mon=0904&file=rfidthe.htm, September 1, 2004.
[26]Robert W. Moorman, “Airbus and Boeing are driving adoption of RFID in the Aviation Supply Chain”, Air Transport World, June 2005, 52-55.
[27]Matthias Lampe and Martin Strassner, “The Potential of RFID for Moveable Asset Management”, Workshop on Ubiquitous Commerce at Ubicomp, Seattle, Octobe
[28]William Stallings, “ Cryptography and Network Security Principles and Practices”, Pearson Eduction, 3rd edition, 2003
[29]Cheng-Yuan Ku, Yi-Wen Chang, Mi-Cheng Lu, Shu-Fang Chiu, “Building Ubiquitous Computing Environment by Using RFID in Aircraft MRO Process”, ICEB, 2005.
[30]Ken Seong Leong, Mun Leng Ng, and Daniel W. Engels, “EPC Network Architecture”, Auto-ID Labs White Paper Series Edition 1, 2005,
[31]Mark Harrison, “ The EPC Network”, Auto-ID Labs, Cambridge, UK, http://www.autoidlabs.org/Cambridge, 2004
[32]“Auto-ID Savant Specification 1.0”, Auto-ID Center, http://www.epcglobal.org/, Version 1, September, 2003
[33]“Object Name Service (ONS) Version 1.0”, EPCglobal, http://www.epcglobal.org/, October 4, 2005
[34]“ PML Core Specification 1.0” ,Auto-ID Center, http://www.epcglobal.org/, September, 2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top