跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/05 12:21
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:孫珮文
研究生(外文):Sun Pei-Wen
論文名稱:適用於多元服務環境之改良式indefinite-index RFID認證機制
論文名稱(外文):An RFID authentication scheme using improved indefinite-index for multi-services
指導教授:李添福李添福引用關係
指導教授(外文):Tian-Fu Lee
口試委員:劉傳銘李國彰李添福
口試委員(外文):Chuan-Ming LiuKuo-Chang LeeTian-Fu Lee
口試日期:2013-07-25
學位類別:碩士
校院名稱:慈濟大學
系所名稱:醫學資訊學系碩士班
學門:醫藥衛生學門
學類:醫學技術及檢驗學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:38
中文關鍵詞:認證RFID網路安全
外文關鍵詞:authenticationRFIDsecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:148
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:1
RFID(Radio Frequency Identification)無線射頻辨識系統是透過無線電波讀取特定目標資料的技術,具有低運算、低成本、攜帶方便、非接觸式等特性,因此常被應用到器材管理、人員管制、物品辨識上,在交通、物流、保全、醫療等領域中都被廣泛的應用。但若RFID系統缺少使用者認證和資料保護之機制,將導致資訊傳輸的過程中可能會遭到攻擊者竊取資料和假冒身份,造成使用者的資料外洩和損失。所以需要透過建置具有存取控制的認證機制來驗證持有人身份,來保護使用者的責任性和匿名性。
目前RFID的認證機制多是針對單一服務,但隨著網路的發展,單一服務可能無法滿足消費者的需求,所以人們希望發展利用單一tag存取多種不同服務,然而要達到多元服務需要儲存更多資訊,會造成運算效率和儲存上的負擔。在2011年Chen-Tsai-Jan提出一個使用indefinite-index的技術之RFID的認證機制,但隨後被發現有安全上的問題,所以本論文將提出一個基於Chen-Tsai-Jan的認證機制改良式的認證機制,仍使用indefinite-index的技術,利用每次index都不相同,使得攻擊者無法追蹤的特性去設計,同時改善前人機制安全上的問題和保有低運算量之特性,設計出安全、低運算量的RFID認證機制,並參考其他多元服務環境的相關研究,將改進的機制更進一步推廣應用到多元服務環境,與其他文獻相比也達到安全有效率的要求。

Radio Frequency Identification (RFID) is a popular technology that used radio wave to access target item. Because the RFID system is low computing, low cost, portability, contactless, it can be widely applied on the inventory management, personnel control, item identify and medical systems. However, the RFID systems may have security problems. For example, the users’ privacy may be threat by attackers, eavesdroppers or impersonators. Therefore, developing an access control authentication mechanism to protect users’ privacy is very important.
Chen et al. in 2011 design an efficient RFID authentication scheme using indefinite-index to protect users’ information. Later, Safkhani et al. stated that the RFID scheme of Chen et al. violated users’ location privacy and could not resist impersonating attacks and denial-of-service attacks. Therefore, this thesis uses indefinite-index to develop an improved RFID authentication scheme based on the scheme of Chen et al. The proposed scheme can avoid the weaknesses in the original scheme and reduces the computational cost.
With development of internet, most RFID schemes cannot be applied on the multi-services environment since these schemes are designed for single service. That is, in these schemes, one user tries to access multiple independent services, and requires keeping many different RFID tags. It is very inconvenient for users. Hence, we extend the improved RFID scheme and propose a RFID authentication scheme using indefinite-index for multi-services.

目錄
第一章 緒論……………………………………………1
1.1 研究背景……………………………………………1
1.2 背景知識……………………………………………2
1.3 研究動機與目的……………………………………5
1.4 研究架構……………………………………………7
第二章 文獻探討………………………………………8
2.1 Chen-Tsai-Jan的RFID認證機制…………………8
2.2 Chen-Tsai-Jan認證機制安全探討………………11
第三章 適用於單一服務RFID認證機制………………15
3.1 研究方法………………………………………………15
3.2 所提認證機制安全探討………………………………18
第四章 適用於多元服務RFID認證機制…………………23
4.1 研究方法………………………………………………23
4.2 所提認證機制安全探討……………………………26
第五章 安全與效能分析……..………………………28
5.1 時間複雜度比較………………………………….. 28
5.2 安全性比較……………………………………….. 35
第六章 結論……..………………………………………36
參考文獻………………..………………………………37

參考文獻
[1]A. Juels, RFID security and privacy: A research survey. In IEEE Journal on Selected Areas in Communications, (2006), 28.
[2]M.L. Das, A. Saxena, V.P. Gulati, A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50 (2) (May 2004), 629–631.
[3] Y.-C. Lee, A New Dynamic ID-based User Authentication Scheme to Resist smart-Card-Theft Attack, Applied Mathematics & Information Sciences, 6 (2012) 355S-361S.
[4] M. Misbahuddin1, C. S. Bindu, Cryptanalysis of Liao-Lee-Hwang’s Dynamic ID Scheme, International Journal of Network Security, Vol.6, No.2, Mar. 2008 , pp. 211–213.
[5] Y.-Y. Chen, M.-L. Tsai, J.-K. Jan, The design of RFID access control protocol using the strategy of indefinite-index and challenge-response, Computer Communications 34 (2011) 250–256.
[6]M. Safkhani, N. Bagheri, M. Naderi, Cryptanalysis of Chen et al.'s RFID Access Control Protocol. IACR Crypotology ePrint Archive 2011, 194 (2011).
[7] B.-L. Chen, W.-C. Kuo, L.-C. Wuu , Security on the Design of RFID Access Control Protocol using the Strategy of Indefinite-index and Challenge-response, the Fifth International Conference on Genetic and Evolutionary Computing(ICGEC2011), 2011, pp. 9-12.
[8] Z.Y. Wu, L. Chen, J.C. Wu, A Reliable RFID Mutual Authentication Scheme for Healthcare Environments, J Med Syst (2013) 37:9917.
[9] Z.-Y. Cheng, Y. Liu, C.-C. Chang, S.-C. Chang, Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index, ICIC Vol. 8, No. 12, 2012, pp. 8341-8354.
[10] J.L. Tsai, Efficient Multi-server Authentication Scheme Based on One-way Hash Function Without Verification Table, Compute & Security, Vol.27, No.3-4, 2008, pp. 115-121.
[11] Y.-P. Liao, S.-S. Wang, A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, Vol.31, No.1, 2009, pp. 24–33.
[12] S.K. Sood, A.K. Sarje, K. Singh, A secure dynamic identity based authentication protocol for multi-server architecture, Journal of Network and Computer Applications, Vol.34, No.2, 2011,pp. 609-627.
[13] X. Li, Y. Xiong, J. Ma, W. Wang , An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards, Journal of Network and Computer Applications 35 , 2012, pp. 763–769.
[14] C.M. Roberts, Radio frequency identification (RFID), computers & security, Vol. 25, 2006, pp. 18-26.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊