跳到主要內容

臺灣博碩士論文加值系統

(44.220.184.63) 您好!臺灣時間:2024/10/08 07:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李育賢
研究生(外文):Yu-Hsien Li
論文名稱:離線式RFID標籤認證協定之研究
論文名稱(外文):The Study of Off-Line Authentication Protocol for RFID tags
指導教授:李南逸李南逸引用關係
指導教授(外文):Narn-Yih Lee
學位類別:碩士
校院名稱:南台科技大學
系所名稱:資訊管理系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:48
中文關鍵詞:無線射頻識別系統離線隱私授權安全
外文關鍵詞:Radio frequency identification system、Off-Line、Privacy、Delegation、Security
相關次數:
  • 被引用被引用:1
  • 點閱點閱:418
  • 評分評分:
  • 下載下載:71
  • 收藏至我的研究室書目清單書目收藏:2
近年來,RFID的相關研究已被政府列為未來發展重點,基本上RFID具有非接觸式讀取、可快速辨識標籤資訊的方便性,但因為RFID是透過無線通訊的方式來傳遞訊息,因此如何正確辨識標籤資訊、保障使用者的隱私,便成一個重要的議題。許多學者針對這些安全議題,提出了具隱私保護的RFID協定,期望能解決隱私性問題,但是這些協定大都是依靠一個On-Line的後端伺服器作處裡,無法在Off-Line的環境底下運作。在2007年,Fouladgar和Afifi首先提出了離線式SiDES協定,接著Lin也提出了TCD-RP協定,可讓後端伺服器可以授權讀取器辨識標籤的資訊,但Fouladgar和Afifi的SiDES定理,會遭受重送攻擊、偽造攻擊、阻斷服務攻擊以及不具有向前安全性的特性;而Lin的協定雖然使用時戳來做授權的控制,但在相同的時間區段下運作,並不具有向前安全性的特性。因此吾人在本論文裡,設計一個更安全的RFID協定,來改善這一些問題。2007年,Fouladgar和Afifi又提出了一個植基於AES運算和具高效率的標籤所有權轉換的協定EDTOP,但是吾人發現EDTOP協定並不具有向前安全性的特性,所以在本文中提出了一個植基於AES且具有向前安全性的RFID標籤認證協定。
Recently, RFID researches have been considered as the main development by the government. Basically, RFID sends messages through radio wave. Therefore, how to recognize the tag information correctly and protect users’ privacy have become important issues. For solving these security issues, many scholars proposed some RFID protocols. However, most protocols are relying on one on-line backend server and cannot work on an off-line environment. In 2007, Fouladgar and Afifi first proposed the off-line SiDES protocol. Later, Lin proposed a TCD-RP protocol. They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi’s SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin’s protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame. Therefore, this thesis designs a more secure RFID protocol to fix these security flaws. In 2007, Fouladgar and Afifi also proposed EDTOP protocol which is based on AES and keeps higher performance on the operations of tag ownership transform. However, it also fails to achieve the forward security. Therefore, this thesis further proposes an improved protocol which can achieve the forward security.
摘要…………………………………………………………………………………..iv
ABSTRACT……………………………………………………………………….……..v
誌謝…………………………………………………………………………………..vi
目錄………………………………………………………………………………….vii
表目錄…………………………………………………………………...………….. ix
圖目錄………………………………………………………………………………...x
第一章 緒論………………………………………………………………………….1
1.1 研究背景……………………………………………………………………1
1.2 研究動機……………………………………………………………………1
1.3 章節概要……………………………………………………………………3
第二章 RFID相關文獻探討………………………………………………………..4
2.1 RFID的背景與發展介紹…………………………………………………..4
2.1.1 RFID之歷史與背景………………………………………………...4
2.1.2 RFID系統的組成元件……………………………………………...4
2.1.3 RFID的安全性需求………………………………………………...7
2.1.4 RFID的相關應用…………………………………………………...8
2.2非運用密碼學之相關RFID保護機制…………………………………….9
2.3運用密碼學之相關RFID保護機制……………………………………….9
2.3.1符號定義表…………………………………………………….…….9
2.3.2 SiDES協定…………………………………………………………10
2.3.3 TCD-RP協定……………………………………………………… 15
2.3.4 EDTOP協定………………………………………………………..18
第三章植基於HASH之離線式RFID標籤認證協定……………………………24
3.1 協定介紹…………………………………………………………………..24
3.2 安全分析…………………………………………………………………..31
3.3 效能比較…………………………………………………………………..33
第四章植基於AES之離線式RFID標籤認證協定………………………………35
4.1 協定介紹…………………………………………………………………..35
4.2 效能比較…………………………………………………………………..40
4.3 安全分析…………………………………………………………………..41
第五章結論與未來展望…………………………………………………………….44
5.1結論………………………………………………………………………...44
5.2未來展望………………………………………………………………….. 44
參考文獻…………………………………………………………………………… 45
[1]林宗志,具時間限制之RFID認證協定,南台科技大學資訊管理研究所碩士論,2007。
[2]RFID應用推動辦公室,http://www.rfid.org.tw/。
[3]A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, Vol. 24, pp.381-394, 2006.
[4]A. Juels, "Strengthening EPC tags against cloning", Proceedings of the 4th ACM workshop on Wireless security, pp.67-76, 2005.
[5]D. Molnar and D. Wagner, "Privacy and Security in Library RFID Issues, Practices, and Architectures", Proceedings of 11th ACM Conference on Computer and Community security, pp.210-219, 2004.
[6]D. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers", Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp.149-153, 2004.
[7]D. Ranasinghe, D. Engels, and P. Cole, "Low-Cost RFID Systems: Confronting Security and Privacy", Auto-ID Labs Research Workshop, 2004.
[8]D. Engels, and S. Sarma, "Standardization Requirements with the RFID Class Structure Framework", MIT Auto-ID Lab Technical Report, 2005.
[9]D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags", Selected Areas in Cryptography, pp.276-290, 2005.
[10]EPCglobal, http://www.epcglobalinc.org/home。
[11]H. Knospe and H. Pohl, "RFID Security", Information Security Technical Report, Vol. 9, pp.39-50, 2004.
[12]J. Saito, J.C Ryou, K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", Embedded and Ubiquitous Computing, pp.879-890, 2004.
[13]K. Finkenzeller, "RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification ", 2nd Edition, 2003.
[14]K. Wong, P. Hui and A. Chan, "Cryptography and authentication on RFID passive tags for apparel products, Computers in Industry", pp.342-349, 2005.
[15]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", Computational Intelligence and Security, pp.1090-1095, 2006.
[16]M. Ohkubo, K. Suzuki and S. Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags", MIT RFID Privacy Workshop, 2003.
[17]M. Ohkubo, K. Suzuki and S, Kinoshita, "RFID Privacy Issues and Technical Challenges", Communications of the ACM , Vol. 48, No. 9, pp.66-71, 2005.
[18]M. Conti, R. D. Pietro, L. V. Mancini, and A. Spognardi, "RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy", International Workshop on Pervasive Computing and Communication Security, pp.229-234, 2007.
[19]M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, "AES Implementationon a grain of sand, Information Security", IEE proceedings, Vol. 152, pp.13-20, 2005.
[20]M. Meingast, J. King and D. K. Mulligan, "Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport", IEEE International Conference on RFID, pp.7-14, 2007.
[21]N. M. Haller, "The S/KEY one-time password system", Proceedings of the Symposium on Network and Distributed System Security, pp. 151-157, 1994.
[22]P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing", Emerging Directions in Embedded and Ubiquitous Computing, pp.7-14, 2006.
[23]S. L. Garfinkel, A. Juels, R. Pappu, "RFID privacy: an overview of problems and proposed solutions", IEEE Security and Privacy, pp.34-43, 2005.
[24]S. A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", The Department of Electrical Engineering and Computer Science of MIT, pp.18, 2003.
[25]S. Inoue and H. Yasuura, "RFID Privacy Using User-controllable Uniqueness", MIT RFID Privacy Workshop, 2003.
[26]S. Fouladgar and H. Afifi , "A Simple Delegation Scheme for RFID Systems (SiDES)", IEEE International Conference on RFID, pp.1-6, 2007.
[27]S. Fouladgar and H. Afifi, "An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags", EURASIP International Workshop on RFID Technology, 2007.
[28]S. Lee, T. Asano and K. Kim, "RFID Mutual Authentication Scheme based on Synchronized Secret Information", Symposium on Cryptography and Information Security, pp.17-20, 2006.
[29]T. Phillips, T. Karygiannis, R. kuhn, "Security Standards for the RFID Market", IEEE Security and Privacy", pp.85-89, 2005.
[30]T. Hassan, and S. Chatterjee, "A Taxonomy for RFID", Proceedings of the 39th Annual Hawaii International Conference, pp.184b-184b, 2006.
[31]Uidcenter , http://www.uidcenter.org/index-en.html。
[32]X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, and S. Song, "An Approach to Security and Privacy of RFID System for Supply Chain", Conference on E-Commerce Technology for Dynamic E-Business, pp.164-168, 2005.
[33]Y. Seo, H. Lee and K. Kim , "A Scalable and Untraceable Authentication Protocol for RFID", International Workshop on Security in Ubiquitous Computing Systems, pp.252-261, 2006.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊