跳到主要內容

臺灣博碩士論文加值系統

(44.200.101.84) 您好!臺灣時間:2023/10/05 10:29
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳世育
研究生(外文):Shih-Yu Chen
論文名稱:無所不在運算環境中位置驗證之研究
論文名稱(外文):A Study of Location Authentication in Ubiquitous Computing Environments
指導教授:洪國寶洪國寶引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:38
中文關鍵詞:無所不在運算RFIDMobile RFID位置驗證
外文關鍵詞:ubiquitous computingRFIDMobile RFIDlocation authentication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:98
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
由於整個資訊網路的發展,將形成一個無所不在運算環境。而在此環境底下,將會出現許多憑藉著使用者的位置資訊來提供服務的服務。因此位置資訊在無所不在運算環境中可當作存取權限的一種驗證方式。但在此環境中,由於使用者具有移動性,使得驗證使用者的位置也變的越來越困難。而先前的文獻中,大多採用相對距離的觀念來達成位置驗證的工作。因此我們提出了使用RFID的一種新應用架構-Mobile RFID來建構整個環境並採用絕對距離的觀念來達成位置驗證的目的。而且我們的方式確保了使用者在等待驗證的期間仍在伺服器所能驗證的距離範圍內,同時在建構整個環境時只需耗費較少的資源,也較不受環境限制的影響更加的實用。
Ubiquitous computing environments result from the development of information network. Plenty of services which offer services by means of the locations of users appear in this environment. Therefore, location information can serve as an authentication means in ubiquitous computing environments. However, it is harder and harder to authenticate users’ locations because users are movable in this environment. According to previous technical literature, many previous studies were done by using the concept of relative distance to achieve location authentication. We offer a new applied framework using RFID, Mobile RFID, to build the whole environment and make use of the concept of absolute distance to achieve the goal of location authentication. In addition, our method ensures that users are still in the distance for servers to authenticate when waiting for authentication. Moreover, building the whole environment consumes fewer resources, and is less influenced by environment limitations and hence more practical.
第一章 緒論 1
1.1簡介 1
1.2研究動機 3
1.3貢獻 5
1.4論文架構 6
第二章 背景知識 7
2.1 Mobile RFID 7
2.1.1 RFID組成元件 7
2.1.2 RFID運作原理 8
2.1.3 RFID分類 8
2.1.4 RFID與接觸式系統之比較 9
2.1.5 RFID的應用-Mobile RFID 10
2.2幾何空間 12
2.3 Secret Sharing(秘密分享) 14
第三章 相關研究 17
3.1 Distance Bounding Protocol 18
3.1.1動機及基本元件 18
3.1.2工作原理 18
3.1.3協定描述 18
3.2 Echo Protocol 22
3.2.1動機 22
3.2.2工作原理 22
3.2.3協定描述 22
3.3 GPS(全球定位系統,Global Positioning System) 25
第四章 我們的方法 26
4.1環境架構及基本理論 27
4.2基本假設以及參數說明 29
4.3驗證過程 30
第五章 安全性分析及比較 32
第六章 結論 35
參考文獻 36
[1] F. Stajano, “Security for Ubiquitous Computing,” 2002.
[2] S. Brands and D. Chaum, “Distance-bounding protocols,” In proceedings of Advances in Cryptology-EUROCRYPT’93, Lecture Notes in Computer Science, Vol.765, Springer-Verlag Berlin Heidel berg, 1994, pp.344-359.
[3] S. Capkun, L. Buttyan, and J. Hubaux, “SECTOR:Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” In proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003, pp.21-32.
[4] D. Denning and P. MacDoran, “Location-Based Authentication:Grounding Cyberspace for better Security,” In Computer Fraud and Security, Elsevier, 1996, pp.12-16.
[5] M. Fujii, “Secure Positioning of Mobile Terminals with Simplex Radio Communication,” http://arxiv.org/PS_cache/cs/pdf/0608/0608031.pdf.
[6] S. Knappe, V. Gerginov, P.D.D. Schwindt, V. Shah, H.G. Robinson, L. Hollberg, and J. Kitching, “Atomic vapor cells for chip-scale atomic clocks with improved long-term frequency stability,” Optics Letters, Vol.30, no.18, Sep.2005, pp.2351-2353.
[7] H. Lee and J. Kim, “Privacy threats and issues in Mobile RFID,” In proceedings of the First International Conference on Availability, Reliability and Security, 2006, pp.510-514.
[8] T.S.E. Ng and H. Zhang, “Predicting Internet Network Distance with Coordinates-Based Approached,” IEEE INFOCOM, Vol.1, 2002, pp.170-179.
[9] D. Singelee and B. Preneel, “Location verification using secure distance bounding protocols,” IEEE Mobile Adhoc and Sensor Systems Conference, Nov.2005, pp.834-840.
[10] N. Sastry, U. Shankar and D. Wagner, “Secure verification of location claims,” In proceedings of the ACM workshop on Wireless security, Sep.2003, pp.1-10.
[11] A. Vora and M. Nesterenko, “Secure location verification using radio broadcast,” In proceedings of OPODIS 2004, Lecture Notes in Computer Science, Vol.3544, Springer-Verlag Berlin Heidelberg, 2005, pp.369.
[12] M. Weiser, “The Computer for the Twenty-First Century,” Scientific American, Sep. 1991, pp.94-100.
[13] RFID Journal, “Merloni unveils RFID appliance,” http://www.rfidjournal.com/article/articleview/369/1/1, April, 2003.
[14] RFID Journal, “Nokia unveils RFID Phone Reader,” http://www.rfidjournal.com/article/articleview/834/1/1, March, 2004.
[15] A. Shamir. How to share a secret, Communication ACM, Vol.22, 1979, pp.612-613.
[16] S. Sarma, D. Brock, D. Engels, “Radio frequency identification and the electronic product code,” IEEE Micro, Vol.21, Issue 6, Nov./Dec.2001, pp.50-54.
[17] K.V.S. Rao, “An overview of backscattered radio frequency identification system(RFID),” IEEE Asia Pacific Microwave Conference, Vol.3, 1999, pp.746-749.
[18] G. Marrocco, “Gain-optimized self-resonant meander line antennas for RFID applications,” IEEE Antennas and Propagation Letters, Vol.2, 2003, pp.302-305.
[19] S. Molesa, D.R. Redinger, D.C. Huang, and V. Subramanian, “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications,” In proceedings of Materials Re-search Society Spring Meet, H8.3.1-6, Vol.769, 2003.
[20] G. Marrocco, A. Fonte, F. Bardati, “Evolutionary design of miniaturized meander-line antennas for RFID applications,” IEEE Trans. Antennas and Propagation, Vol.2, 2002, pp.362-365.
[21] M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” presented at 4th International Conference on Ubiquitous Computing, 2002.
[22] L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Pervasive Computing Environment,” IEEE Computer, 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top