跳到主要內容

臺灣博碩士論文加值系統

(44.211.34.178) 您好!臺灣時間:2024/11/02 23:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:呂天龍
研究生(外文):Tian-Lung Lu
論文名稱:擁有高度安全與隱私的新RFID協定
論文名稱(外文):A New RFID Protocol with Strong Security and Privacy
指導教授:張仁俊張仁俊引用關係吳信龍
指導教授(外文):Jen-Chun ChangHsin-Lung Wu
學位類別:碩士
校院名稱:國立臺北大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:60
中文關鍵詞:RFID安全與隱私所有權轉移資料同步前向式安全資料庫搜尋
外文關鍵詞:RFID Security and PrivacyOwnership TransferData SynchronizationForward SecurityDatabase Search
相關次數:
  • 被引用被引用:3
  • 點閱點閱:347
  • 評分評分:
  • 下載下載:41
  • 收藏至我的研究室書目清單書目收藏:2
RFID的發明,使許多產業在管理方面變得更加地有效率,而隨著RFID應用越來越廣泛的時候,我們可以發現在我們的日常生活中已經隨處可見到RFID的蹤影,像是供應鏈管理、電子證件、電子收費系統等應用,在RFID的崛起的同時,也讓人們開始注意到使用RFID時,所必須面臨的安全性與隱私的問題,我們可以發現在RFID有限的能力與資源當中,傳統的安全機制已經不適合用於RFID,因此如何設計出一個新的適合RFID的安全機制將是本篇論文所要探討的重點。

目前已經有許多的學者針對RFID的安全和隱私議題提出他們研究的安全機制,然而還是存在著許多的問題尚未解決。而在RFID常見的應用中,在供應鏈管理方面,常常為了節省標籤成本,必須重複使用標籤,而在重複使用標籤的同時也產生了標籤所有權轉移的問題。在2007年時,Osaka等人提出了他們的RFID安全協定,並且也針對RFID標籤的所有權轉移做研究探討,然而我們還是發現了在Osaka的安全協定中,依然存在著幾個安全性和隱私的問題尚未解決。

因此本篇論文將針對RFID的安全性與隱私問題提出一個新的RFID安全機制,在我們所提出的RFID安全協定中,足以抵擋大部分常見的RFID攻擊,大幅地增強了RFID的安全性和隱私性,並且也改良提升了以往後端資料庫在搜尋速度效率慢的缺點,讓使用者在使用RFID的同時,利用我們所設計的安全協定來更加有效地保障使用者的安全和隱私。
Many industries used RFID for more efficient management. We can see RFID everywhere in our daily lives such as Supply Chain Management(SCM), electronic identity card and Electronic Toll Collection system(ETC). When the RFID applica-tions become more widely, then the security and privacy of RFID systems become the important concerns because they are vulnerable to a number of malicious attacks. But for low-cost RFID systems, many traditional security mechanisms are inefficient due to the resource constraints. So our research we concern on design a new RFID proto-col with strong security and privacy.

Supply chain management is a common RFID application. In many situations we have to re-use the tags to save cost. However, the tag ownership becomes another is-sue for the re-use tags. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki and Osamu Takahashi presented their RFID ownership transfer protocol in 2007. However, we found there still have some security and privacy issues in Osaka et al. protocol remain unsolved.

In this thesis, we focus on designing a new RFID protocol with strong security and privacy. Our protocol can against most of the common RFID attacks and greatly enhanced the RFID security and privacy protection. In addition, it also improved the efficiency of the back-end database search. Our protocol can provide more effective protection of the security and privacy of users.
誌謝 I
中文摘要 II
Abstract III
目錄 IV
圖目錄 VII
表目錄 VIII

第一章 緒論 01
1.1 研究背景與動機 01
1.2 研究範圍 03
1.3 論文貢獻 04
1.4 論文架構 05

第二章 無線射頻辨識 06
2.1 RFID的發展歷史 06
2.2 RFID系統 07
2.2.1 RFID標籤 07
2.2.2 RFID讀取器 09
2.2.3 後端資料庫 10
2.3 RFID的應用 11
2.4 EPCglobal網路 12
2.4.1 EPC Class 1 Generation 2標準 14
2.5 RFID的安全與隱私 16
2.5.1 RFID的安全問題 16
2.5.2 RFID的隱私保護 18

第三章 RFID安全相關研究 20
3.1 雜湊鎖定機制 20
3.2 隨機雜湊鎖定機制 22
3.3 重複加密法 24
3.4 互斥或一次鍵的機制 26
3.5 雜湊鏈的機制 27
3.6 Dimitriou的RFID安全協定 29
3.6.1 C²協定 31

第四章 RFID標籤所有權轉移相關研究 33
4.1 Dimitriou的RFID所有權轉移協定 33
4.2 Osaka等人的協定 36
4.2.1 Jäppinen和Hämäläinen的協定 38
4.2.2 Chen等人的協定 39
4.2.3 Yoon和Yoo的協定 40

第五章 擁有高度安全與隱私的新RFID協定 41
5.1 我們設計的RFID協定 41
5.1.1 符號描述 41
5.1.2 設定階段 42
5.1.3 認證階段 43
5.2 隱私保護分析 46
5.3 安全性分析 48
5.3.1 資料同步 52
5.4 效能評估 56
5.4.1 資料庫搜尋時間分析 56

第六章 結論與未來工作 57

參考文獻 58
[1].T. Haver, “Security and privacy in RFID applications”, Masters thesis, Norewe-gian University of Science and Technology, Trondheim, Norway, June 2006.
[2].A. Juels. “RFID security and privacy: A research survey”, IEEE Journal on Se-lected Areas in Communications, volume 24, Issue 2, pages 381–394, February 2006.
[3].K. Koscher, A. Juels, V. Brajkovic, and T. Kohno, “EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond”, In Proceedings of the 16th ACM conference on Computer and communications security, Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems, pages 33–42. 2009.
[4].EPCGlobal, “Guidelines on EPC for Consumer Products”,
http://www.epcglobalinc.org/public/ppsc_guide/.
[5].S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, In First Interna-tional Conference on Security in Pervasive Computing, 2003.
http://theory.lcs.mit.edu/sweis/spc-rfid.pdf/.
[6].A. Juels, R. Pappu, “Squealing euros: Privacy protection in RFID-enabled bank-notes”, In Proceedings of Financial Cryptography –FC’03, 2003.
[7].M. Rieback, B. Crispo, and A. Tanenbaum, “Uniting legislation with RFID pri-vacy-enhancing technologies”, In Security and Protection of Information, Brno, Czech Republic, 2005.
[8].P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal Re-encryption for Mixnets”, The Cryptographers’ Track at the RSA Conference, 2004.
[9].A. Juels, “Privacy and Authentication in Low-Cost RFID Tags”, submission 2003.
[10].M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic approach to “priva-cy-friendly” tags”, In RFID Privacy Workshop, MIT, USA, 2003.
[11].T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks”, In Secure Comm 2005. IEEE Computer Society Press, 2005.
[12].S. Canard and I. Coisel, “Data Synchronization in Privacy-Preserving RFID Au-thentication Schemes”, In Conference on RFID Security, 2008.
[13].T. Dimitrou, “RFIDDOT: RFID delegation and ownership transfer made simple”, In Proceedings of International Conference on Security and privacy in Commu-nication Networks, Istanbul, Turkey, 2008.
[14].K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, “An efficient and secure RFID security method with ownership transfer”, In Y. Wang, Y. Cheung, and H. Liu, editors, Computational Intelligence and Security — CIS 2006, volume 4456 of Lecture Notes in Computer Science, pages 778–787. Springer, Berlin, Sep-tember 2006.
[15].B. Song, “RFID Tag Ownership Transfer” , In RFIDSec08, 2008.
[16].L. Kulseng, “Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems”, Master of Science Thesis, Electrical & Computer Engineering, Iowa State University, 2009.
[17].P. Jäppinen and H. Hämäläinen, “Enhanced RFID Security Method with Own-ership Transfer”, In Proceedings of the International Conference on Computa-tional Intelligence and Security, pages 382–385. 2008.
[18].G. Kapoor and S. Piramuthu, “Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols”, In First International Conference on Networks & Communications, 2009.
[19].H. B. Chen, W. B. Lee, Y. H. Zhao and Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer”, In Proceedings of the ICUIMC, pages 251–254. 2009.
[20].E. J. Yoon, K. Y. Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer”, In Proceedings of the IFIP International Conference on Network and Parallel Computing, pages 68–73. 2008.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top