跳到主要內容

臺灣博碩士論文加值系統

(98.84.18.52) 您好!臺灣時間:2024/10/04 01:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:蕭勝文
研究生(外文):Hsiao Sheng Wen
論文名稱:國軍飛彈管理安全導入RFID之研究
論文名稱(外文):A Study on RFID Security for Military Missile Management
指導教授:陳昱仁陳昱仁引用關係
學位類別:碩士
校院名稱:長庚大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:71
中文關鍵詞:無線射頻識別彈藥庫儲管理安全性飛彈管理EEPROM
外文關鍵詞:Radio Frequency IdentificationAmmunition Inventory ManagementSecurityMissile ManagementEEPROM
相關次數:
  • 被引用被引用:5
  • 點閱點閱:817
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:4
在國軍精實案,人力組織精簡調整與規劃下,為做好彈藥庫儲管理,減輕人力、物力負擔,最有效率方法,就是運用無線射頻識別(Radio Frequency Identification, RFID)技術並適切地導入於軍事裝備的管理,一方面可以結合產業發展現況,提昇生產、運輸及儲管等管理技術,二方面對於爾後庫儲管理清點與管制,也可減少人力、物力的付出。
在國軍彈藥庫儲管理上,可以透過RFID減少清點作業期間,所必需攜帶相關表、簿、冊及帳卡,並可快速記錄清點狀況,縮短人員於危險處、所作業時間,另外不需開、檢視庫房,就可透過RFID之溫、溼度感應器裝置,自動回報相關數據並記錄備查。
然而當國軍導入RFID於飛彈庫儲管理時,就必須首重於飛彈機敏資料的安全性,但是在現階段以市場為導向的RFID,卻是採用大量製作,降低成本為主要考量,對於國防軍事運用上,其安全防護標準並不嚴謹,也尚待克服,為了解決商規 RFID 運用於國軍飛彈管理時,所可能衍生之軍機洩密等安全防護。本研究即針對此一問題,妥善規劃及建立相關安全防護機制及架構,期能有效解決安全性防護之重大問題。
Under the project to simplify and consolidate the military organization of the Republic of China (R.O.C.) and the plan to adjust and reconstruct the structure of military human resources, the best method of achieving ammunition inventory management by the missile factory and reducing the burden of both of human and material resources is to apply the RFID (Radio Frequency Identification) system and to appropriately incorporate this system in administration of the military equipment. This method provides two advantages: one is to raise administrative skill used in production, transportation and warehousing by means of associating the present state of industrial development, and another is to reduce the use of both of human and material resources in ammunition inventory management and control in the future.
Thanks to this new missiles inventory management, it is possible for the personnel in charge of inventory survey to carry fewer tables, books and account statements and to quickly record the inventory condition by means of the RFID system in the course of their operation and also possible for them to reduce the time of their exposing to danger in their work. Besides, it is very important that the personnel with no need of opening and examining the warehouse can complete recording all the necessary data that are automatically reported by the sensors of temperature and humidity fitted in the RFID system.
It is natural that when the military incorporates the RFID system in the missiles inventory management, a stress of the confidentiality of the materials concerning missiles should be placed first. Nevertheless, at the present time, as the RFID system tends to be market-oriented, mass production and reduced cost are two issues taken into first consideration. The application of these materials for military use in national defense and the standard of security protection are relatively not emphasized as much as expected and should be increased. For the divulgement of military confidentiality derived from the application of the RFID system in administration of missiles by the R.O.C. military, this study places a focus on planning and establishment of the security protection mechanism for solving this severe problem.
第一章 緒論
1.1 研究背景
1.2 研究動機
1.3 研究目的
1.4 章節簡介
第二章 文獻回顧
2.1 RFID簡介
2.1.1 RFID系統概述
2.1.2 RFID技術特性
2.1.3 RFID標準組織
2.2 RFID隱私與安全防護方法
2.2.1 Kill標籤(Kill Tag)
2.2.2 遮罩-法拉第籠(Faraday’s Cage)
2.2.3 運用主動干擾技術
2.2.4 智慧型標籤
2.2.5 阻止標籤(Block Tag)
2.2.6 雜湊函數(Hash Function)
2.3 資料加密
2.4 RSA Security系統防護設計簡介
2.4.1 存取權限控制(Access Control)
2.4.2 使用者登入鑑別(Authentication)
2.4.3 安全鏈結機制(Link Security)
2.5 安全層上的鑑別技術
2.6 國軍敵我識別器簡介
2.7 國軍憑證中心架構簡介
2.7.1 申請電子印鑑
2.7.2 核發
2.7.3 線上申報
2.7.4 線上稽核
第三章 研究方法
3.1 需求分析
3.2 問題及限制定義
3.3 標籤-讀取器之設計架構
3.4 資料庫存取控制架構
3.5 國軍飛彈安全管理導入RFID安全規劃整體架構
第四章 系統設計及運作流程
4.1 標籤─讀取器端加密架構
4.1.1 加密步驟
4.1.2 解密步驟
4.2 使用者讀取資料時之加密
4.3 研究產出
4.4 使用設備
4.5 安全性分析
4.5.1 密碼破解攻擊法
4.5.2 中間人攻擊法
4.5.3 網路竊聽與竄改攻擊法
4.5.4 偽冒攻擊法
4.5.5 無線電阻斷服務攻擊法
4.5.6 重送式攻擊法
4.6 綜合討論
第五章 結論與未來展望
5.1 結論
5.2 未來展望
參考文獻
英文部分
[1] Auto-ID Center, 2005, http://www.autoidcenter.com.
[2] Auto-ID Center, 2005, “Technology Guide”,
http://www.autoidcenter.com/aboutthetech.asp.
[3] Auto-ID Labs, 2005, “EPCTM Radio-Frequency Identity Protocols
Class-1 Generation-2 UHF RFID Protocol for Communications at
860 MHz - 960 MHz Version 1.0.8”, //www.autoid.org/2005docs/
SG3 200501 435 UHFGen2 v1.0.8.pdf.
[4] EPCglobal, 2005, http://www.epcglobalinc.org,.
[5] Electronic Product Code Global Inc, 2005,
http://www.epcglobalinc.org.
[6] Feldhofer, Martin, May 2004, “An Authentication Protocol in a
Security Layer for RFID Smart Tags”, The 12th IEEE
Mediterranean Electrotechnical Conference (MELECON 2004), IEEE
Proceedings, PP. 759-762.
[7] Finkenzeller, Klaus, October 2002, “RFID-Handbuch”, Hanser
Fachbuchverlag, Third Edition.
[8] Finkenzeller, Klaus, May 2003, “RFID Handbook: Fundamentals and
Applications on Tactless Smart Cards and Identification”, 2nd
Edition, John Wiley and Sons Ltd.
[9] Henrici, Dirk and Muller, Paul, March 2004, “Hash-Based
Enhancement of Location Privacy for Radio-Frequency
Identification Devices Using Varying Identifiers”.
International Workshop on Pervasive Computing and Communication
Security (PerSec 2004), PP. 149–153.
[10] Henrici, Dirk and Müllerirk, Paul, April 2004, “Tackling
Security and Privacy Issues in Radio Frequency Identification
Devices”, http://www.icsy.de/~archiv/DPArchiv.0086.pdf.
[11] Hellman, Martin, July 1980, “A Cryptanalytic Time-Memory Trade-
O”, IEEE Transactions on Information Theory, Vol. IT-26, No.
4 ,PP. 401-406.
[12] International Organization for Standardization, March 2003, “
RFID for Item Management–Air Interface, Part 1 – Generic
Parameters for Air Interface Communication for Globally
Accepted Frequencies”, ISO/IEC 18000-1.
[13] International Organization for Standardization, March 2003,
“Information Technology AIDC Techniques - RFID for Item
Management”, ISO/IEC 18000-3.
[14] International Organization for Standardization,
1993, "Information Technology – Security Techniques – Entity
authentication mechanisms – Part 3: Entity Authentication Using
a Public Key Algorithm”, ISO/IEC 9798-3.
[15] Kaiser, Ulrich, 2004 , “Universal Immobilizer Crypto Engine”,
The Fourth Conference on the Advanced Encryption Standard
(AES), http://www.aes4.org/english/events/aes4/program.html.
[16] Massachusetts Institute of Technology Computer Science and
Artificial Intelligence Laboratory, 2004, “RFID Security and
Privacy”, http://ieeexplore.ieee.org/iel5/
35/29269/01321406.pdf.
[17] RSA Security Lab, 2004, “Thoughts on RFID Security and
Privacy”, ITAA RFID Forum, http://www.rsasecurity.com.
[18] Sullivan, Laurie, 17 June 2004, “Wal-Mart Outlines RFID
Expansion Plans”, InformationWeek.
http://www.informationweek.com/story/showArticle.jhtml
[19] Web-based bibliography, 2005, “Security and Privacy in RFID
systems”, http://lasecwww.epfl.ch/˜gavoine/rfid/.


中文部分
[20] RFiD無線射頻識別技術網站,2005年,http://www.RFiD.org.hk/。
[21] 陳宏宇,2004年10月,「RFID無線射頻辨識系統系統入門」,文魁資訊股份有限公
司。
[22] 普諾瑪集團網站,2005年,「RFID應用系統-安全防範」,
Http: //www.promatic.com.cn/chinese/Channels/Products/
Product_RFID_Product_Label.asp。
[23] 鄭同伯,2004年5月,「發展已超過一甲子的RFID正逐漸貼近我們的日常生常」,
通信雜誌,第121期。
[24] 鄭同伯,2004年11月,「RFID EPC無線射頻辨識完全剖析」,博碩文化資訊股份有
限公司。
[25] 國防部陸軍通信電子資訊學校,2005年修訂版,「通資安全基礎課程教材」。
[26] 國防部聯合後勤司令部,2005年,「國軍彈藥作業安全宣教講習教案」。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top