(34.204.185.54) 您好!臺灣時間:2021/04/16 19:28
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:魏仕賢
研究生(外文):Shih-hsien Wei
論文名稱:RFID應用於雲端運算身分驗證之研究
論文名稱(外文):A Study on Authentication Mechanism with RFID for Cloud Computing
指導教授:廖鴻圖廖鴻圖引用關係郭明煌郭明煌引用關係
學位類別:碩士
校院名稱:世新大學
系所名稱:資訊管理學研究所(含碩專班)
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:77
中文關鍵詞:無線射頻辨識雲端運算身分驗證
外文關鍵詞:Radio Frequency IdentificationCloud ComputingAuthentication
相關次數:
  • 被引用被引用:1
  • 點閱點閱:231
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
隨著雲端運算(Cloud Computing)的快速發展,透過網路即可方便的存取雲端服務,應用也愈來愈廣,使用者在雲端上的資料安全就成了大家所關心議題,尤其是對雲端服務進行資料存取前的身分驗證更形重要,其中應用無線射頻辨識(Radio Frequency Identification, RFID)的安全驗證機制,用以識別個人身分的技術,已廣泛地應用於日常生活中,所以以雲端運算為基礎的RFID身分驗證之應用亦成為熱門的研究項目之一。
本研究將結合RFID技術於雲端運算中做身分驗證之研究,提出一個於雲端運算環境中,使用簡單的運算達成低運算負載的安全身分驗證機制,本機制在驗證過程中,採用了雜湊運算、XOR及時間戳記的加解密技術,來防範目前常見的安全攻擊手法,保證RFID標籤資料與傳輸的訊息之正確性及完整性,讓使用者透過安全的 RFID身分驗證機制,對分佈在各種不同雲中的雲端運算服務能安全及便利的進行使用。
As the cloud computing grows up rapidly, its applications are more flourishing and attractive. When there are more and more users in the cloud, the security issues become significant; especially, the identification to users while accessing to personal information is more important. Recently, RFID (Radio Frequency Identification) technology is deployed in many fields, and some of them are focused on user identification. In order to identify the numerous users in the cloud correctly, it will be a good idea to use RFID in authentication.
In this study, RFID technology is applied to identification with simple operations and lower computation loading in the cloud computing environment. The Hash, XOR, time stamp, and encryption technologies are also deployed in the proposed authenticating processes. They prevent some security threats and attacks from data delivering, and protect the information stored in the RFID Tag. Through the experiments evaluation and analysis, the proposal not only provides a secure RFID authentication mechanism, but also improves the services convenience in the cloud environment.
目錄
摘要................................................................................................................................I
Abstract ......................................................................................................................... II
目錄..............................................................................................................................III
圖目錄..........................................................................................................................IV
表目錄...........................................................................................................................V
第一章緒論..................................................................................................................1
1.1 研究背景與動機.............................................................................................1
1.2 研究目的.........................................................................................................2
1.3 研究範圍與假設.............................................................................................3
1.4 論文架構.........................................................................................................4
第二章文獻探討..........................................................................................................5
2.1 二次剩餘的基礎上改進的RFID 驗證協定.................................................5
2.2 具位置隱私保護的RFID 驗證機制.............................................................8
2.3 雲端環境下結合 RFID 之身分驗證機制.................................................11
2.4 RFID 安全機制應用於雲端運算身份認證之研究....................................16
2.5 基於雲端運算之時限票據相互驗證機制...................................................21
2.6 小結...............................................................................................................25
第三章相關理論與技術............................................................................................27
3.1 無線射頻辨識技術介紹...............................................................................27
3.2 雲端運算介紹...............................................................................................33
3.3 相關技術介紹...............................................................................................35
第四章 RFID 應用於雲端運算身分驗證之研究.....................................................37
4.1 系統簡介.......................................................................................................37
4.2 系統架構.......................................................................................................38
4.3 系統假設與機制符號表...............................................................................39
4.4 機制流程介紹...............................................................................................40
第五章分析與討論....................................................................................................48
5.1 安全性分析...................................................................................................48
5.2 功能性分析...................................................................................................52
5.3 效能分析.......................................................................................................55
5.4 小結...............................................................................................................59
第六章結論與未來研究............................................................................................60
6.1 結論...............................................................................................................60
6.2 未來研究.......................................................................................................63
參考文獻......................................................................................................................64

圖目錄
圖 2-1 Yeh 學者等人的RFID 驗證協定流程圖.......................................................7
圖2-2 Chang 學者等人的登入與驗證階段流程圖................................................10
圖2-3 劉學者的使用者註冊流程圖.......................................................................13
圖2-4 劉學者的使用者登入階段流程圖...............................................................14
圖2-5 劉學者的使用者驗證階段流程圖...............................................................15
圖2-6 曾學者的註冊階段流程圖...........................................................................17
圖2-7 曾學者的登入階段流程圖...........................................................................18
圖2-8 曾學者的相互驗證及產生會議金鑰階段流程圖.......................................20
圖2-9 Hao 學者等人的註冊階段流程圖................................................................22
圖2-10 Hao 學者等人的登入與驗證階段流程圖....................................................24
圖3-1 雲端建置關係圖...........................................................................................34
圖3-2 XOR 邏輯閘與真值表..................................................................................36
圖4-1 系統架構圖...................................................................................................38
圖4-2 使用者註冊流程圖.......................................................................................41
圖4-3 使用者登入與驗證流程圖...........................................................................45
圖4-4 使用者通行碼變更流程圖...........................................................................47

表目錄
表 2-1 Yeh 學者等人的RFID 驗證協定符號表.......................................................5
表2-2 Chang 學者等人的身份驗證機制符號表......................................................8
表2-3 劉學者的RFID 驗證機制符號表................................................................11
表2-4 曾學者的身分驗證機制符號表...................................................................16
表2-5 Hao 學者等人的身份驗證機制符號表........................................................21
表2-6 各機制安全性與功能性分析比較表...........................................................25
表3-1 RFID 與條碼比較表.....................................................................................30
表4-1 本機制符號表...............................................................................................39
表5-1 各機制安全性分析表...................................................................................51
表5-2 各機制功能性分析表...................................................................................54
表5-3 時間複雜度符號表.......................................................................................55
表5-4 各機制時間複雜度分析表...........................................................................55
表5-5 各機制訊息交換次數分析表.......................................................................56
表5-6 儲存空間內容符號表...................................................................................57
表5-7 各機制儲存空間內容分析表.......................................................................58
[1]Ben Niu, Hui Li, Xiaoyan Zhu and Chao Lv, "Security Analysis of Some Recent Authentication Protocols for RFID", International Conference on Computational Intelligence and Security, pp. 665-669, 2011.
[2]Chia-Hui Wei, Min-Shiang Hwang and Yeh-hao Chin, "A Mutual Authentication Protocol for RFID", IT Professional, Vol. 13, No. 2 , pp. 20-24, 2011.
[3]Dang Nguyen Duc and Kwangjo Kim, "Defending RFID Authentication Protocols Against DoS Attacks", Computer Communications, Vol. 34, Issue 3, pp. 384-390, 2011.
[4]Han Zhu, Yiming Zhao, Shenglong Ding and Bo Jin, "An Improved Forward-Secure Anonymous RFID Authentication Protocol", International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-5, 2011.
[5]Iuon-Chang Lin, and Chin-Chen Chang, "A Countable and Time-bound Password-based User Authentication Scheme for the Applications of Electronic Commerce", Information Sciences, Vol. 179, No. 9, pp. 1269-1277, 2009.
[6]Jian Shen, Dongmin Choi, Sangman Moh and Ilyong Chung, "A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security", International Conference on Multimedia Information Networking and Security, pp. 584-588, 2010.
[7]Jung-Sik Cho, Sang-Soo Yeo and Sung Kwon Kim, "Securing Against Brute-force Attack: A Hash-based RFID Mutual Authentication Using A Secret Value", Computer Communications, Vol. 34, Issue 3, pp. 391-397, 2011.
[8]Jung-Sik Cho, Soo-Cheol Kim and Sung Kwon Kim, "Hash-Based RFID Tag Mutual Authentication Scheme with Retrieval Efficiency", International Symposium on Parallel and Distributed Processing with Applications, pp. 324-328, 2011.
[9]Lei-An Liu, Xiao-Zheng Lai, Da-Shun Yan, Zhi-Qiang Chen and Ling Yang, "Mutual Authentication Protocol Based on Hash Function of RFID Systems", International Conference on Machine Learning and Cybernetics, pp. 501-506, 2011.
[10]Li Huixian, Yin Ping, Wang Xuan and Pang Liaojun, "A Novel Hash-based RFID Mutual Authentication Protocol", International Conference on Computational Intelligence and Security , pp. 774-778, 2011.
[11]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Yiyuan Luo and Qi Chai, "Tag Impersonation Attack on Two RFID Mutual Authentication Protocols", International Conference on Availability, Reliability and Security, pp. 581-584,2011.
[12]Md. Monzur Morshed, Anthony Atkins and Hongnian Yu, "An Efficient and Secure Authentication Protocol for RFID Systems", International Conference on Automation and Computing, pp. 51-56, 2011.
[13]Minghui Wang, Yongzheng Tang, Fang Shi and Junhua Pan, "An Effective RFID Authentication Protocol", International Conference on Consumer Electronics, Communications and Networks, pp. 141-144, 2012.
[14]Selwyn Piramuthu, "RFID Mutual Authentication Protocols", Decision Support Systems, Vol. 50, Issue 2, pp. 387-393, 2011.
[15]Swimpy Pahuja, Sandeep Negi, Ankit Verma, Pulkit Rathi, Nidhi Narang and Rakesh Chawla, "An Authentication Protocol for Secure Tag-Reader Communication", IEEE Students' Conference on Electrical, Electronics and Computer Science, pp. 1-4, 2012.
[16]Tzu-Chang Yeh, Chien-Hung Wu and Yuh-Min Tseng, "Improvement of the RFID Authentication Scheme Based on Quadratic Residues", Computer Communications, Vol. 34, Issue 3, pp. 337-341, 2011.
[17]Wen-Shenq Juang, Hui-Chin Tseng and Yun-Yu Shue, "An Efficient and Privacy Protection Multi-server Authentication Scheme for Low-cost RFID Tags", International Computer Symposium, pp. 279-283, 2010.
[18]Ya-Fen Chang, Shao-Cian Lin and Pei-Yu Chang, "A Location-privacy-protected RFID Authentication Scheme", IEEE International Conference on Communications, ISSN:1550-3607, pp. 1-4, 2011.
[19]Yalin Chen, Jue-Sam Chou and Hung-Min Sun, "A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems" , Computer Networks, Vol. 52, Issue 12, pp. 2373-2380, 2008.
[20]Yi-Pin Liao and Shuenn-Shyang Wang, "A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment", Computer Standards & Interfaces, Vol. 31, Issue 1, pp. 24-29, 2009.
[21]Young Sil Lee, YoungMi Park, SangHan Lee, TaeYong Kim and Hoon Jae Lee, "RFID Mutual Authentication Protocol with Unclonable RFID-tags", International Conference on Mobile IT Convergence, pp. 74-77, 2011.
[22]Zhuo Hao, Sheng Zhong and Nenghai Yu, "A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing", International Journal of Computers, Communications & Control, Vol. 6, No. 2, pp. 227-235, 2011.
[23]Christy Pettey, "Gartner Says Eight of Ten Dollars Enterprises Spend on IT is ‘Dead Money’", Gartner, http://www.gartner.com/it/page.jsp?id=497088, 2006, Retrieved: 2012,06,18.
[24]Peter Mell and Timothy Grance, "The NIST Definition of Cloud Computing", National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2011, Retrieved: 2012,06,18.
[25]Mona Azama,「防標籤碰撞機制之高效率行動 RFID 網路」,台灣科技大學電機工程學系碩士論文,2010年。
[26]邱仁佑,「雲端運算安全且有效率代理認證機制之研究」,高雄第一科技大學資訊管理學系碩士論文,2011年。
[27]邱博洋,「低成本可保隱私 RFID 認證協定之研究」,中國文化大學資訊管理學系碩士論文,2008年。
[28]洪聖翔,「一個基於低運算量的新的部份盲簽章」,逢甲大學資訊工程學系碩士論文,2008年。
[29]許孝萱,「行動RFID應用私密性研究」,暨南國際大學資訊管理學系碩士論文,2008年。
[30]許沁如,「結合智慧卡之通行碼認證機制研究」,世新大學資訊管理學系碩士論文,2005年。
[31]陳俊甫,「3G-WLAN網路環境下之RFID安全認證機制」,世新大學資訊管理學系碩士論文,2010年。
[32]陳洧漢,「使用晶片卡與射頻標籤的匿名身份驗證協定之安全分析」,真理大學資訊工程學系碩士論文,2011年。
[33]曾冠銘,「RFID安全機制應用於雲端運算身份認證之研究」,開南大學資訊及電子商務學系碩士論文,2011年。
[34]曾惠錦,「結合RFID與DRM於金融機構存款業務運用之研究」,世新大學資訊管理學系碩士論文,2009年。
[35]廖偉志,「安全且快速的RFID雙向認證協定」,交通大學資訊工程學系碩士論文,2011年。
[36]劉冠廷,「雲端環境下結合 RFID 之身分驗證機制」,世新大學資訊管理學系碩士論文,2011年。
[37]林育竹,「雲端運算 Cloud Computing 的概念與應用」,e化部落, http://eblog.cisanet.org.tw/post/Cloud-Computing.aspx,2010年,Retrieved: 2012,06,24。
[38]粘添壽、吳順裕,「雜湊函數簡介」,資訊與網路安全技術,http://www.mis.csu.edu.tw/tsnien/teach_manu/f8745/f8745_html/chap5/chap5-1.htm,2005年,Retrieved: 2012,06,24。
[39]數位時代,「雲端運算風暴來襲」,數位時代,http://www.bnext.com.tw/article/view/cid/0/id/10163,2008年,Retrieved: 2012,06,24。
[40]魏伊伶,「適合僑外商來台投資產業建議-雲端運算產業」,行政院全球招商聯合服務中心,http://investtaiwan.nat.gov.tw/doc/20110119/2-8-2c.pdf,2010年,Retrieved: 2012,06,24。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔