跳到主要內容

臺灣博碩士論文加值系統

(44.200.77.92) 您好!臺灣時間:2024/03/01 09:59
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:趙惠敏
研究生(外文):Hui-Ming Chao
論文名稱:使用智慧卡保護RFID消費者隱私權
論文名稱(外文):Using Smart Card in RFID Infrastructure to Protect Consumer Privacy
指導教授:古政元古政元引用關係
指導教授(外文):Cheng-Yuan Ku
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:52
中文關鍵詞:電子產品碼(EPC)隱私權無線射頻身分辨識(RFID)智慧卡智慧家庭對稱式加密
外文關鍵詞:smart cardsmart homeprivacyRFIDEPC codesymmetrical encryption
相關次數:
  • 被引用被引用:0
  • 點閱點閱:277
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:3
近年來,隨著RFID技術在供應鏈上面的應用和發展,未來我們在超市買的商品都會附上一個RFID標籤,這讓我們對於智慧家庭的願景更加地明確了。只要讓RFID的作用延伸到智慧家庭中,就能讓智慧家電運作地更聰明,提供更便利的服務。然而,消費者購買商品之後攜帶著RFID標籤在身上,如果被持有RFID讀取器的人讀取到,就會造成隱私權的問題。隱私權團體非常關注這個問題,也曾發動拒買活動。為了解決消費者可能會遇到的這種隱私權威脅的問題,我們提出了一個使用智慧卡的架構,考慮到供應鏈上使用的RFID標籤有限的運算能力,同時希望能保留RFID標籤的弁鄖黕撮z家庭之中。
構架中,超市的會員卡是一張智慧卡,裡面儲存有一把金鑰。消費者在結帳時用智慧卡將商品上RFID標籤中的EPC碼加密,在智慧家庭中也能夠使用同一張會員卡解密回EPC碼,供智慧家電使用。
As the application of RFID in supply chain matures in the near future, goods we buy from a supermarket will carry RFID tags. By exploiting RFID tags in garments and packages of food, home appliances could operate more cleverly. However, the use of RFID technology has engendered considerable controversy, product boycotts were started by privacy advocates. In order to eliminate the possible threat of clandestine inventorying of low-cost RFID tags started form purchasing, and still retain RFID tag function after user return home, the architecture is designed by using symmetrical encryption with smart card. EPC code on the tag can be encrypted with the key on the smart card (member card) and decrypted with the same key at home.
CHAPTER 1 INTRODUCTION - 1 -
1.1. RESEARCH BACKGROUND - 1 -
1.2. RESEARCH MOTIVATION - 5 -
1.3. RESEARCH QUESTIONS - 6 -
1.4. RESEARCH PROCEDURE - 7 -
CHAPTER 2 RELATED LITERATURES - 9 -
2.1. RFID - 9 -
2.1.1. Introduction - 9 -
2.1.2. EPCglobal Network - 10 -
2.1.3. Low-cost tags - 12 -
2.2. SMART CARD - 13 -
2.2.1. Introduction - 13 -
2.2.2. Security - 15 -
2.3. SMART HOME - 16 -
2.4. PROTECTION OF CONSUMER PRIVACY IN LOW-COST RFID TAGS - 18 -
2.4.1. RFID Privacy problem - 18 -
2.4.2. Killing - 20 -
2.4.3. Distance measurement - 20 -
2.4.4. Blocking - 21 -
2.4.5. Minimalist cryptography - 21 -
2.4.6. Others - 21 -
CHAPTER 3 PROPOSED SYSTEM ARCHITECTURE - 23 -
3.1. SCENARIO - 23 -
3.2. MAIN CONCEPT - 25 -
3.3. DESIGN OF SYSTEM ARCHITECTURE - 26 -
3.3.1. System architecture at the retailer or supermarket - 26 -
3.3.2. System architecture at smart home - 28 -
3.4. HANDLING PROCESS - 31 -
3.4.1. Handling processes at the retailer or supermarket - 31 -
3.4.2. Handling processes at smart home - 32 -
3.5. DATA FLOW - 34 -
3.5.1. Data flow at the retailer or supermarket - 34 -
3.5.2. Data flow at home - 36 -
CHAPTER 4 IMPLEMENTATION AND ANALYSIS - 38 -
4.1. IMPLEMENTATION - 38 -
4.1.1. System environment - 38 -
4.1.2. System demonstration - 41 -
4.2. SECURITY ANALYSIS - 43 -
4.3. FEASIBILITY ANALYSIS - 45 -
CHAPTER 5 CONCLUSIONS AND FUTURE WORK - 46 -
5.1. CONCLUSIONS - 46 -
5.2. FUTURE WORK - 47 -
1.Juels, A., RFID Security and Privacy: A Research Survey. IEEE, 2006.
2.IDTechEx, RFID Market to Reach $7.26Bn in 2008: New RFID Market Analysis. 2005.
3.Radio Frequency Identification (RFID) Policy. 30 July 2004 [cited 2005 10 Dec.]; Available from: http://www.acq.osd.mil/log/rfid/rfid_policy.htm.
4.Welcome to EPCglobal Inc™. 2005 Dec.17 2005 [cited; Available from: http://www.epcglobalinc.org/index.html.
5. Prediction – By 2008, RFID and e-tagging technologies will drive broad application innovation. 2003, Gartner, Inc.
6.Sullivan, M. and S. Happek, Demystifying RFID in the Supply Chain. 2005, UPS Supply Chain Solutions.
7.Garfinkel, S.L., A. Juels, and R. Pappu, RFID privacy: an overview of problems and proposed solutions. Security & Privacy Magazine, IEEE, 2005. 3(3): p. 34-43.
8.Research Group on Networking of Digital Household Appliances. 2005, Ministry of Internal Affairs and Communications.
9.Merloni Unveils RFID Appliances. 4 April 2003 [cited 2005 10 Dec.]; Available from: http://www.rfidjournal.com/article/articleprint/369/-1/1/.
10.Finkenzeller, K., RFID Handbook. 1999: John Wiley & Sons.
11.Supply chain RFID:How it works and why it pays. 2004, Intermec.
12.The EPCglobal Network™: Overview of Design, Benefits, & Security. 2004, EPCglobal Inc™.
13.Weis, S.A., Security and Privacy in Radio-Frequency Identification Devices, in Electrical Engineering and Computer Science. 2003, MASSACHUSETTS INSTITUTE OF TECHNOLOGY.
14.Crane, J., Benetton Clothing to Carry Tiny Tracking Transmitters. March 2003.
15.Omega Electronics. RFID Swatch Watch. 2003 [cited 2005 Dec. 27]; Available from: http://www.omega-electronics.ch/rfid/swatch.shtml.
16.Learning from Prada., in RFID Journal. June 24, 2002.
17.Effing, W., Smart Card Handbook. January 2004 John Wiley & Sons.
18.Chen, Z., Java Card™ Technology for Smart Cards: Architecture and Programmer's Guide. 06/06/2000: Addison Wesley Professional.
19.International Organization for Standardization. 1998-2005 [cited 2006 June]; Available from: http://www.iso.org.
20.M'Raihi, D. and M. Yung, E-commerce applications of smart cards. Computer Networks, 2001. 36(4): p. 453-472.
21.Schneier, B. and A. Shostack. Breaking up is hard to do modeling security threats for smart cards. in Proceedings of the USENIX Workshop on Smartcard Technology. 1999.
22.Vaxevanakis, K., T. Zahariadis, and N. Vogiatzis, A review on wireless home network technologies. ACM SIGMOBILE Mobile Computing and Communications Review 2003. 7(2): p. 59 - 68.
23.Lin, Y.-J., et al., A power line communication network infrastructure for the smart home. Wireless Communications, 2002. 9(6): p. 104 - 111.
24.Siegemund, F. and C. Flörkemeier. Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones. in PERCOM. 2003: IEEE Computer Society.
25.Stern, S., Security trumps privacy., in Christian Science Monitor,. 2001.
26.Wagner, D.M.a.D. Privacy and security in library RFID : Issues, practices, and architectures. in ACM Conference on Communications and Computer Security. 2004: ACM press.
27.Document 9303, machine readable travel documents (MRTD), part I: Machine readable passports. 2005, International Civil Aviation Organization ICAO.
28.A. Juels, D.M., and D. Wagner. Security and privacy issues in e-passports. in IEEE/CreateNet SecureComm. IEEE, 2005. 2005.
29.Halamka., J., Straight from the shoulder. The New England Journal of Medicine, 2005. 353: p. 331-333.
30.VeriChip corporation web site. 2005 [cited 2006 June]; Available from: http://www.4verichip.com/.
31.RFID position statement of consumer privacy and civil liberties organizations,. 2003, American Civil Liberties Union (ACLU).
32.Fishkin, K.P., S. Roy, and B. Jiang, Some methods for privacy in RFID communication. 2004, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004).
33.Juels, A., R.L. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. in 8th ACM Conference on Computer and Communications Security. 2003: ACM Press.
34.Rieback, M.R., B. Crispo, and A.S. Tanenbaum. Keep on blockin' in the free world: Personal access control for low-cost RFID tags. in 13th International Workshop on Security Protocols. 2005.
35.Juels, A. Minimalist cryptography for low-cost RFID tags. in The Fourth International Conference on Security in Communication Networks – SCN 2004. 2004: Lecture Notes in Computer Science.
36.S. E. Sarma, S.A.W., and D.W. Engels., RFID systems, security and privacy implications., in MIT-AUTOID-WH-014. 2002, AutoID Center, MIT.
37.Yasuura, S.I.a.H., RFID privacy using user-controllable uniqueness. 2003, RFID Privacy Workshop, MIT, Massachusetts, USA,.
38.Moskowitz., G.K.a.P., Disabling RFID tags with visible confirmation: Clipped tags are silenced, S. De Capitani di Vimercati and R. Dingledine, Editor. 2005, Privacy in the Electronic Society (WPES).
39.Store of the Future. 2005 [cited 2005 Dec. 26]; Available from: http://www.metrogroup.de/servlet/PB/menu/1005402_l2/index.html.
40.Metro Group Future Store Initiative. 2005 [cited 2005 Dec. 27]; Available from: http://www.future-store.org.
41.Coopersmith, D., The Data Encryption Standard (DES) and Its Strength Against Attacks. IBM Journal of Research and Development, 1994.
42.Stallings, W., Cryptography and Network Security Principles and Practices. 3rd ed. 2003: Alan R. apt.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top