跳到主要內容

臺灣博碩士論文加值系統

(44.201.97.0) 您好!臺灣時間:2024/04/24 10:56
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳彥儒
研究生(外文):Yen-Ju Chen
論文名稱:基於CDMA上的RFIDTAG零碰撞搜尋機制
論文名稱(外文):An Efficient RFID Tag Search Protocol based on CDMA
指導教授:伍麗樵伍麗樵引用關係
指導教授(外文):Lih-Chyau Wuu
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:中文
論文頁數:48
中文關鍵詞:安全性認證性私密性無線射頻辨識系統碰撞分碼多重存取
外文關鍵詞:Authentication.PrivacySecurityCollisionCDMARFID
相關次數:
  • 被引用被引用:0
  • 點閱點閱:224
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
RFID-「無線射頻辨識系統」為近幾年來迅速發展技術之一,應用於製程管理、物流系統、防止竊盜等方面。RFID與條碼(Barcode)相比的優點有:具有較大記憶容量、可讀寫記憶體、抗污性高、可大量讀取等優點,故RFID將逐漸取代條碼做為物品識別之主流。RFID讀取器(Reader)雖宣稱可同時讀取多個RFID標籤(Tag),但實際上仍是逐一讀取的,這是因為若多個Tag同時回傳資訊予Reader,會有碰撞(Collision)問題,造成Reader無法辨識有那些Tags回應;故RFID讀取速率仍是受限於碰撞問題而無法有效地提昇。本論文提供一基於CDMA上的多個RFID Tags零碰撞搜尋機制,利用CDMA之正交碼特性,將讀取大量RFID Tag時造成的碰撞數降至為零,並結合hash-chain技術,實現Reader與Tag之間所需要的安全性(如相互認證性、私密性、不可分辨性、強健性與向前安全性)及抵禦RFID系統常見之惡意攻擊,如重送、偽造、竄改、追蹤、中間人與非同步化攻擊等。
Recently, numerous applications (supply chains, asset tracking, manufacturing, etc.) have used Radio Frequency Identification (RFID) technology to identify physical objects automatically. In comparison with barcode system, the RFID tags can hold more data, have the ability of read/write data, be accessed by a reader without contact. However, collisions occur when multiple tags send signals simultaneously to a reader. In this dissertation, a zero-collision RFID tags search based on CDMA is proposed, and the hash-chain method is applied to provide a secure channel between tags and reader (for example, mutual authentication, confidence, indistinctness, robustness and forward secrecy). Furthermore, the proposed scheme can resist against replay attack, track attack, forgery and tamper attack, man-in-the-middle attack and de-synchronization attack on RFID systems.
中 文 摘 要 i
Abstract ii
誌謝 iii
目 錄 iv
表 目 錄vi
圖 目 錄vii
一、緒論 1
1.1.研究動機 1
1.2.無線射頻技術(RFID)簡介 1
1.3.研究目的 6
1.4.論文架構 8
二、相關文獻 9
2.1.防碰撞機制 9
2.2.Hash-Chain 13
2.3.CDMA技術 14
三、基於CDMA上的多個RFID Tags零碰撞搜尋機制 16
3.1.符號說明及假設 16
3.1.1.符號說明 16
3.1.2.機制假設 17
3.2.機制流程 18
3.2.1.資料架構 18
3.2.2.標籤搜尋(Tag Search)1 9
3.2.3.標籤認證 24
3.2.4.金匙更新 25
四、安全性與攻擊分析 28
4.1.安全性分析 28
4.1.1.相互認證性 (Mutual Authentication) 28
4.1.2.私密性 (Confidence) 28
4.1.3.不可分辨性 (Indistinguishability) 28
4.1.4.強健性 (Robustness) 28
4.1.5.向前安全性 (Forward Secrecy) 29
4.2.攻擊分析 29
4.2.1. 重送攻擊 (Replay attack) 29
4.2.2. 偽造攻擊 (Forgery attack) 31
4.2.3. 竄改攻擊 (Tamper attack) 31
4.2.4. 追蹤攻擊 (Track attack) 32
4.2.5. 中間人攻擊 (Man-in-the-Middle attack) 32
4.2.6. 非同步化攻擊 (De-synchronization Attack) 32
五、結論與未來研究方向 34
5.1. 結論 34
5.2. 未來之研究方向 34
參考文獻 35
簡歷 38
[1]Michael Ollivier, "RFID enhances materials handling," Sensor Review 15:1 (1995), pp.36-39.
[2]Stream Cipher Project Web Page, ECRYPT (European network for excellence in cryptology). (2005). [Online]. Available: http://www.ecrypt.eu.org/stream/
[3]S. Prodromou, CEO of Alien Technology Corporation at the RFID World 2005 Conf., 2005.
[4]EPCglobal, “EPCglobal Tag DataStandards Version 1.4, ” 2008 [Online]. Available: http://www.epcglobalinc.org/standards/tds/tds_1_4-standard-20080611.pdf
[5]EPCglobal TAIWAN : http://gs1.eantaiwan.org.tw/
[6]“EPCTM radio-frequency identification protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz version 1.0.9,” EPCglobal, Jan. 2005.
[7]“Information technology automatic identification and data capture techniques - radio frequency identification for item management air interface - part 6: parameters for air interface communications at 860-960 MHz,” ISO/IEC FDIS 18000-6, Nov. 2003.
[8]L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM 24.11 (November 1981), pp 770-772.
[9]Ari Juels“RFID Security and Privacy: A Research Survey”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
[10]Xingxin(Grace) Gao, Zhe(Alex) Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song, “An approach to security and privacy of RFID system for supply chain”, IEEE International Conference, Page 164-168, Setp.,2004
[11]Zongwei Luo, Terry Chan, Jenny S. Li, “A Lightweight Mutual Authentication Protocol for RFID Networks”, e-Business Engineering, 2005. ICEBE 2005. IEEE International Conference, Oct. 2005
[12]Juels, Ari, Rivest, Ronald and Szydlo, Michael (2003), The blocker tag: selective blocking of RFID tags for consumer privacy, ACM Conference on Computer and Communications Security - ACM CCS, October 2003, pp. 103-111.
[13]Vidyasagar Potdar, Elizabeth Chang, “Tamper Detection in RFID tags using Fragile Watermarking,” To Appear in the Proceedings of the IEEE International Conference on Industrial Technology (ICIT06), Mumbai, INDIA, 15-17 Dec, 2006.
[14]D.-H. Shiha, P.-L. Suna, D. C. Yenb, and S.-M. Huangc. Taxonomy and survey of RFID anti-collision protocols. Computer Communications, 29:2150–2166, 2006.
[15]M. Rieback, B. Crispo, and A. Tanenbaum. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags. In Proceedings of the International Workshop on Security Protocols (IWSP), Lecture Notes in Computer Science, Cambridge, England, April 2005. Springer-Verlag.
[16]T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece, September 2005. IEEE.
[17]G. Tsudik. YA-TRAP: Yet another trivial RFID authentication protocol. In International Conference on Pervasive Computing and Communications – PerCom 2006, Pisa,Italy, March 2006. IEEE, IEEE Computer Society Press.
[18]C. C. Tan , B. Sheng and Q. Li “Serverless search and authentication protocols for RFID,” in presented at the, Int. Conf. Pervasive Comput. Commun. (PerCom 2007) New York, 2007.
[19]S.H Lee, T.Y Asano, and K.G Kim, ”RFID Mutual Authentication Scheme based on Synchronized Secret Information”, Symposium on Cryptography and Information Security, January 2006.
[20]H.-Y. Chien, “Secure Access Control Schemes for RFID Systems with Anonymity,” Proc. 2006 Int’l Workshop Future Mobile and UbiquitousInformation Technologies (FMUIT ’06), 2006.
[21]H.-Y. Chien and C.-H. Chen, “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards,” Computers Standards & Interfaces, vol. 29, no. 2, pp 254-259, 2007.
[22]H.-Y. Chien and C.-W. Huang, “Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements,” ACM Operating System Rev., vol. 41, no. 2, pp. 83-86, July 2007.
[23]K. Rhee, J. Kwak, S. Kim, and D. Won, “Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment,” Proc. Int’l Conf. Security in Pervasive Computing (SPC ’05), pp. 70-84, 2005.
[24]S.A. Weis, “Security and Privacy in Radio-Frequency Identification Devices,” master’s thesis, MIT, 2003.
[25]S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Security in Pervasive Computing, pp. 201-212, Springer, 2004.
[26]J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, “Mutual Authentication Protocol for Low-Cost RFID,” Proc. Ecrypt Workshop RFID and Lightweight Crypto, 2005.
[27]J. Yang, K. Ren, and K. Kim, “Security and Privacy on Authentication Protocol for Low-Cost Radio,” Proc. 2005 Symp. Cryptography and Information Security, 2005.
[28]T. Li and G. Wang, “Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols,” Proc. 22nd IFIP TC-11 Int’l Information Security Conf., May 2007.
[29]D. Henrici and P. M�鈉ller, “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", PerSec''04 at IEEE PerCom, pp.149-153, Mar. 2004.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊