(3.232.129.123) 您好!臺灣時間:2021/02/26 21:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:吳榮軒
研究生(外文):Jung-Hsuan Wu
論文名稱:基於CAGI方案之車用電子裝置防盜機制
論文名稱(外文):The CAGI Anti-Theft Mechanism for In-Vehicle Appliances
指導教授:侯廷偉侯廷偉引用關係
指導教授(外文):Ting-Wei Hou
學位類別:碩士
校院名稱:國立成功大學
系所名稱:工程科學系碩博士班
學門:工程學門
學類:綜合工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:40
中文關鍵詞:防盜系統數位簽章金鑰管理電子控制裝置零件識別技術
外文關鍵詞:signature verificationcomponent identificationkey managementelectric control equipmentanti-theft system
相關次數:
  • 被引用被引用:3
  • 點閱點閱:174
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:28
  • 收藏至我的研究室書目清單書目收藏:0
本研究開發車用電子裝置群體識別技術(CAGI)應用於防盜系統上。它能提昇車用電子裝置的可靠性以避免遭到偷竊。本研究設計在車用電子裝置內,嵌入一個安全模組,當裝置開機時會先偵測車用環境是否合法才決定啟動。若未經授權移至其他車輛上將不能正常運作。本研究亦分別對汽車維修製造廠與汽車用品店設計出一套管理流程,經實驗證明各種流程的處理時間,在實驗平台工作頻率1.66GHz個人電腦和工作頻率933MHz的嵌入平台上,時間皆在0.5秒左右,對使用者不會造成太大的等待時間。
A Car Appliance Component Identification (CAGI) scheme is proposed in this paper to support a mechanism to protect CAGI-based appliances from being stolen. The CAGI approach integrates a security module that provides authentication and controlling for each car appliance. Moving a car appliance with the security module to other vehicles without the permission will lead the one unable to work. The CAGI scheme also provides the management process of the car appliances for the car manufacturers or the car stores. The experimentation platforms are an 1.66GHz PC and a 933MHz embedded platform. The experiments proved that the processing times for various processes all were about 0.5 seconds. This result will not cause too much waiting time for users.
中文摘要........................................................................................................................ i
英文摘要....................................................................................................................... ii
目錄.............................................................................................................................. iii
表目錄.......................................................................................................................... iv
圖目錄............................................................................................................................v
第一章 緒論..................................................................................................................1
1.1 研究動機.........................................................................................................1
1.2 研究背景.........................................................................................................2
1.3 研究目的.........................................................................................................4
1.4 研究貢獻.........................................................................................................5
第二章 情境與需求......................................................................................................6
2.1 供應鏈體系.....................................................................................................7
2.2 情境說明.........................................................................................................9
2.3 系統需求.......................................................................................................11
第三章 相關研究........................................................................................................13
3.1 代理人信任機制與軟體保護方法...............................................................13
3.2 車輛數位簽章協定.......................................................................................15
第四章 系統設計........................................................................................................17
4.1 例行性流程...................................................................................................17
4.2 初始化流程...................................................................................................19
4.3 管理議題.......................................................................................................23
第五章 實作................................................................................................................25
5.1 車用電子裝置架構.......................................................................................25
5.2 流程運作細節...............................................................................................27
5.3 評估...............................................................................................................33
第六章 討論................................................................................................................36
6.1 安全性分析...................................................................................................36
6.2 與其他防盜系統之比較...............................................................................37
第七章 結論與未來工作............................................................................................38
參考資料......................................................................................................................39
[1] National Insurance Crime Bureau (NICB). Available: https://www.nicb.org
[2] K. Lemke, A. R. Sadeghi, and C. Stüble, "An Open Approach for Designing Secure Electronic Immobilizers," in Proc. 1st Information Security Practice and Experience Conference (ISPEC), Singapore, Apr. 2005, pp. 230–242.
[3] G. Jayendra, S. Kumarawadu and L. Meegahapola, "RFID-Based Anti-theft Auto Security System with an Immobilizer," in Proc. 2nd Int. Conf. Industrial and Information Systems (ICIIS), Sri Lanka, Aug. 2007, pp. 441–446.
[4] 磯田直也, 榎吉政彥, 山本雅之, 車用之反竊盜裝置, 中華民國專利第500673號, 2002/09/01.
[5] 程冠華, 概說Immobilizer, ValueParts Inc. 網址:http://www.valueparts.com.tw/articles/Immobilizer.html
[6] A. Weimerskirch, C. Paar, and M. Wolf, "Cryptographic Component Identification: Enabler for Secure Vehicles," in Proc. IEEE 62nd Semiannual Vehicular Technology Conference (VTC), Dallas, Texas, USA, Sept. 2005, pp. 1227–1231.
[7] 童元鍼, 巫金台, 林雲祺, 王文鴻, 廖永盛, 車輛防盜系統及方法, 中華民國專利第I262872號, 2006/10/01.
[8] 鄭玉玲, 賴昌祈, 廖啟業, 張光耀, 張耿豪, 謝東明, 梁若玲, "高安全性硬體密碼加速器研發與應用", 影像與識別, vol. 5, no. 4, pp. 65-73, 民88.12. Available: www.cis.nctu.edu.tw/~ippr/Doc/Dec88/6.doc
[9] M. Howard, P. Powell, and R. Vidgen, "Automotive Industry Information Systems: From Mass Production to Build-to-Order," Journal of Cases on Information Technology, vol. 7, no. 2, pp. 16–30, 2005.
[10] S. Pearson, M. Casassamont, and M. Novoa, "Securing Information Transfer in Distributed Computing Environments," IEEE Security & Privacy, vol. 6, no. 1, pp. 34–42, Jan.-Feb. 2008.
[11] A. Pfitzmann, B. Pfitzmann, M. Schunter, and M. Waidner, "Trusting mobile user devices and security modules," IEEE Computer, pp. 61–68, vol. 30, Feb. 1997.
[12] M. Wolf, A. Weimerskirch, and T. Wollinger, "State of the Art: Embedding Security in Vehicles," EURASIP Journal on Embedded Systems, Article ID 74706, Vol. 2007, Apr. 2007.
[13] B. Arazi, "Vehicular Implementations of Public Key Cryptographic Techniques," IEEE Trans. Vehicular Technology, pp. 646–653, vol. 40, no. 3, Aug. 1991.
[14] W. Rankl and W. Effing, Smart Card Handbook, 3rd Ed., John Wiley & Sons Ltd., Jan. 2004.
[15] Rex Mu, 黃正裕, 顧珀菁, "[愛車防盜]下一個就是你!汽車竊盜反制實戰," Car and Driver人車誌121期, 2007年11月號. Available: http://www.itry.com.tw/forum/viewtopic.php?p=4289
[16] P. C. Wang, T. W. Hou, J. H. Wu, and B. C. Chen, "A Security Module for Car Appliances," International Journal of Mechanical Systems Science and Engineering (IJMSSE), pp.155–160 , vol. 1, no. 3, Summer 2007.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔