(3.238.174.50) 您好!臺灣時間:2021/04/18 02:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:農至剛
研究生(外文):Chih-Kang Nong
論文名稱:使用防噪群組證明改進巡房用藥安全
論文名稱(外文):An Anti-Noise Multiple Grouping Proof to Improve Medication Safety in a Medicine Round
指導教授:羅嘉寧羅嘉寧引用關係楊明豪楊明豪引用關係
指導教授(外文):Jia-Ning LuoMing-Hour Yang
學位類別:碩士
校院名稱:中原大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:31
中文關鍵詞:安全巡房群組證明RFID隱私
外文關鍵詞:medicine roundsimultaneous grouping-proofsRFIDprivacysecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:111
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
群組證明是證明複數RFID 標籤存在於相同時間區段的方法。在傳統的群組證明中,對於汙染攻擊毫無抵抗能力,而且相當局限於環境,不能混入其他多餘的標籤,需要連網,沒有匿名。經過多年的改進,目前的許多研究,已經可以匿名且離線使用,並且可抵抗絕大部分的重送攻擊,但仍然沒有研究可以選擇性的挑選標籤;當環境中混有其他標籤的情況,群組認證將會包含無關的標籤,甚至會導致群組證明失敗。而效能方面,由於群組認證是採取循序的方式來讀取,必須等待前一個標籤讀取完後,才能繼續下一個標籤的作業。是故在量大的標籤群組證明上,循序式的讀取將成為效能瓶頸,大大的不利於物流等應用。在本文中,我們提出一個具有匿名性、離線、能抵抗重送攻擊、交叉攻擊、避免污染標籤且可以同時讀取的高效率群組認證。我們的方法將會包含其他研究的優點,且可以避免混入無關標籤、只讀某些標籤,而且可以同時對大量標籤做讀取以改進效能。也因為引入了屬性加密,我們的方法將會比其他研究安全性更高。


Grouping proof is a way to prove that multiple RFID tags exist in the same time zone. The traditional methods of grouping proof are vulnerable to illegitimate tag attacks; they are unable to include extra tags in their operating environment; they require Internet access; and they cannot achieve anonymity. Although current studies have seen the possibility in anonymous and offline grouping proof, they are still unable to target their tags. If other groups of tags appear in their read range, these grouping proofs will read the tags too and consequently cause failure. Another disadvantage of these proofs is their one-by-one read sequence. So bigger groups of tags will take more time and become a bottleneck of performance. This may not be a practical method for logistics services. For these reasons, we propose an efficient offline grouping proof protocol that can achieve anonymity, and can resist replay attacks, cross attacks and illegitimate tag attacks. Apart from the advantages of current grouping proofs, our protocol can target specific tags and is also capable of group reading. Besides, our attribute-based encryption helps enhance the security strength of our protocol.


摘要 I
ABSTRACT II
CONTENTS III
LIST OF FIGURES IV
LIST OF TABLES V
1. INTRODUCTION 1
2. ANTI-NOISE MULTIPLE GROUPING PROOF 4
2.1 INITIALIZATION 6
2.2 PROOF GENERATION 9
2.3 VERIFICATION OF PROOF CORRECTNESS 13
3. SECURITY ANALYSIS 14
3.1 SECURITY COMPARISON 17
4. PERFORMANCE 18
5. OUR PROOF IN GNY LOGIC 23
6. CONCLUSION AND FUTURE WORK 26
7. REFERENCES 26

[1]Epctm Radio-Frequency Identity Protocols Class-1 Generation-2 Uhf RFID Protocol for Communications at 860 Mhz - 960 Mhz, ver 2.0.0, November, 2013.
[2]Waleed Abo-Hamad, John Crowe, and Amr Arisha, "Towards Leaner Healthcare Facility: Application of Simulation Modelling and Value Stream Mapping," September, 2012.
[3]Mohammad Reza Sohizadeh Abyaneh, "Colluding Tags Attack on the ECC-Based Grouping Proofs for Rfids," in Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on, 2011, pp. 293-299, July, 2011.
[4]Carlisle Adams and Stephen Farrell, Internet X.509 Public Key Infrastructure Certificate Management Protocols, IETF RFC 2510, March, 1999, [http://www.ietf.org/rfc/rfc2510.txt].
[5]Jeffrey Aronson, "Medication Errors: What They Are, How They Happen, and How to Avoid Them," QJM, vol. 102, pp. 513-521, August, 2009.
[6]Philip Aspden, Julie Wolcott, J. Lyle Bootman, and Linda R. Cronenwett, Preventing Medication Errors: Quality Chasm Series: The National Academies Press, 2007.
[7]Lejla Batina, YongKi Lee, Stefaan Seys, Dave Singelée, and Ingrid Verbauwhede, "Extending ECC-Based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs," Personal and Ubiquitous Computing, vol. 16, pp. 323-335, March, 2012.
[8]John Bethencourt, Amit Sahai, and Brent Waters, "Ciphertext-Policy Attribute-Based Encryption," presented at the Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
[9]Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, MattJ B. Robshaw, and Yannick Seurin, "Hash Functions and RFID Tags: Mind the Gap," in Cryptographic Hardware and Embedded Systems – Ches 2008. vol. 5154, E. Oswald and P. Rohatgi, Eds., ed: Springer Berlin Heidelberg, pp. 283-299, 2008.
[10]Leonid Bolotnyy and Gabriel Robins, "Generalized "Yoking-Proofs" for a Group of RFID Tags," in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, 2006, pp. 1-4, July, 2006.
[11]Mike Burmester and Jorge Munilla, "Distributed Group Authentication for RFID Supply Management," IACR Cryptology ePrint Archive, vol. 2013, p. 779, November, 2013.
[12]Rick Daniels, Nursing Fundamentals: Caring and Clinical Decision Making: New York: Thomson Delmar Learning, 2004.
[13]Cunsheng Ding, Dingyi Pei, and Arto Salomaa, Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography: World Scientific Publishing Company, Incorporated, 1996.
[14]Martin Feldhofer and Christian Rechberger, "A Case against Currently Used Hash Functions in RFID Protocols," in On the Move to Meaningful Internet Systems 2006: Otm 2006 Workshops. vol. 4277, R. Meersman, Z. Tari, and P. Herrero, Eds., ed: Springer Berlin Heidelberg, pp. 372-381, 2006.
[15]Li Gong, Roger Needham, and Raphael Yahalom, "Reasoning About Belief in Cryptographic Protocols," in Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on, 1990, pp. 234-248, May, 1990.
[16]Andrea Höller, Norbert Druml, Christian Kreiner, Christian Steger, and Tomaz Felicijan, "Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications," presented at the The 51st Annual Design Automation Conference 2014, pp. 1-6, 2014.
[17]Jens Hermans and Roel Peeters, "Private Yoking Proofs: Attacks, Models and New Provable Constructions," in Radio Frequency Identification. Security and Privacy Issues. vol. 7739, J.-H. Hoepman and I. Verbauwhede, Eds., ed: Springer Berlin Heidelberg, pp. 96-108, 2013.
[18]Hsieh-Hong Huang and Cheng-Yuan Ku, "A RFID Grouping Proof Protocol for Medication Safety of Inpatient," Journal of Medical Systems, vol. 33, pp. 467-474, December, 2009.
[19]Seo Hwajeong, Choi Jongseok, Kim Hyunjin, Park Taehwan, and Kim Howon, "Pseudo Random Number Generator and Hash Function for Embedded Microprocessors," in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 2014, pp. 37-40, March, 2014.
[20]Ari Juels, ""Yoking-Proofs" for RFID Tags," in Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on, 2004, pp. 138-143, March, 2004.
[21]John Kohl and Clifford Neuman, The Kerberos Network Authentication Service (V5), IETF RFC 1510, September, 1993, [http://www.ietf.org/rfc/rfc1510.txt].
[22]Yuanhung Lien, Xuefei Leng, Keith Mayes, and Jung-Hui Chiu, "Reading Order Independent Grouping Proof for RFID Tags," in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. 128-136, June, 2008.
[23]Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, and Chi-Lung Chiang, "Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags," in Advances in Web and Network Technologies, and Information Management. vol. 4537, K.-C. Chang, W. Wang, L. Chen, C. Ellis, C.-H. Hsu, A. Tsoi, et al., Eds., ed: Springer Berlin Heidelberg, pp. 634-643, 2007.
[24]Nai-Wei Lo and Kuo-Hui Yeh, "Anonymous Coexistence Proofs for RFID Tags," Journal of Information Science and Engineering, vol. 26, pp. 1213-1230, July, 2010.
[25]Cunqing Ma, Jingqiang Lin, Yuewu Wang, and Ming Shang, "Offline RFID Grouping Proofs with Trusted Timestamps," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 674-681, June, 2012.
[26]Adam S.W. Man, Edward S. Zhang, Vincent K.N. Lau, C.Y. Tsui, and Howard C. Luong, "Low Power VLSI Design for a RFID Passive Tag Baseband System Enhanced with an Aes Cryptography Engine," in RFID Eurasia, 2007 1st Annual, 2007, pp. 1-6, September, 2007.
[27]Alvisa Palese, Arianna Sartor, Giuliana Costaperaria, and Vittorio Bresadola, "Interruptions During Nurses' Drug Rounds in Surgical Wards: Observational Study," Journal of nursing management, vol. 17, pp. 185-192, 2009.
[28]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda, "Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags," in Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on, 2007, pp. 55-60, July, 2007.
[29]Pedro Peris-Lopez, Agustin Orfila, Aikaterini Mitrokotsa, and Jan CA Van der Lubbe, "A Comprehensive RFID Solution to Enhance Inpatient Medication Safety," international journal of medical informatics, vol. 80, pp. 13-24, Jan, 2011.
[30]Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, and Majid Naderi, "RFID in Ehealth: How to Combat Medication Errors and Strengthen Patient Safety," Journal of Medical and Biological Engineering, vol. 33, pp. 363-372, Auguest, 2013.
[31]Selwyn Piramuthu, "On Existence Proofs for Multiple RFID Tags," in Pervasive Services, 2006 ACS/IEEE International Conference on, 2006, pp. 317-320, June, 2006.
[32]Masoumeh Safkhani, Nasour Bagheri, and Majid Naderi, "A Note on the Security of IS-RFID, an Inpatient Medication Safety," Int J Med Inform, vol. 83, pp. 82-85, January, 2014.
[33]Amit Sahai and Brent Waters, "Fuzzy Identity-Based Encryption," in Advances in Cryptology – Eurocrypt 2005. vol. 3494, R. Cramer, Ed., ed: Springer Berlin Heidelberg, pp. 457-473, 2005.
[34]Junichiro Saito and Kouichi Sakurai, "Grouping Proof for RFID Tags," in Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, 2005, vol. 2, pp. 621-624, March, 2005.
[35]Hung-Min Sun, Wei-Chih Ting, and Shih-Ying Chang, "Offlined Simultaneous Grouping Proof for RFID Tags," in Computer Science and its Applications, 2009. CSA '09. 2nd International Conference on, 2009, pp. 1-6, December, 2009.
[36]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, and Wanlei Zhou, "A Robust Grouping Proof Protocol for RFID Epc C1g2 Tags," Information Forensics and Security, IEEE Transactions on, vol. 9, pp. 961-975, June, 2014.
[37]Katja Taxis, Bryony Dean, and Nick Barber, "Hospital Drug Distribution Systems in the Uk and Germany ‐ a Study of Medication Errors," Pharmacy World and Science, vol. 21, pp. 25-31, February, 1999.
[38]Shuhua Wu, Kefei Chen, and Yuefei Zhu, "A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety," Journal of Medical Systems, vol. 36, pp. 2743-2749, October, 2012.
[39]Wen Yao, Chao-Hsien Chu, and Zang Li, "The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review," Journal of Medical Systems, vol. 36, pp. 3507-3525, December, 2012.
[40]Yi-Chung Yen, Nai-Wei Lo, and Tzong-Chen Wu, "Two RFID-Based Solutions for Secure Inpatient Medication Administration," J. Med. Syst., vol. 36, pp. 2769-2778, October, 2012.
[41]Yao-Chang Yu, Ting-Wei Hou, and Tzu-Chiang Chiang, "Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety," Journal of Medical Systems, vol. 36, pp. 823-828, April, 2012.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔