跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.90) 您好!臺灣時間:2025/01/22 13:28
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳正豪
研究生(外文):Cheng-Hao Chen
論文名稱:NFC電子錢包之研究
論文名稱(外文):The study of NFC wallet
指導教授:林詠章林詠章引用關係
指導教授(外文):Iuon-Chang Lin
口試委員:林珮瑜張雅芬楊仁和
口試委員(外文):Pei-Yu LinYa-Fen ChangJen-Ho Yang
口試日期:2014-07-04
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊管理學系所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:46
中文關鍵詞:NFCNFC安全電子錢包橢圓曲線密碼系統卡片模擬模式
外文關鍵詞:NFCNFC securitywalletElliptic Curve CryptosystemCard Emulation Mode
相關次數:
  • 被引用被引用:1
  • 點閱點閱:821
  • 評分評分:
  • 下載下載:115
  • 收藏至我的研究室書目清單書目收藏:0
近場距離通訊(Near Field Communication, NFC)技術能在一秒鐘之內就能將通訊雙方的連結建立好,其便利性與實用性使其成為一種相當火紅的通訊技術,但是在短短幾秒鐘的通訊過程中,卻暗藏著許多危險,因此本研究整理了七種NFC相關的攻擊行為與威脅,其中有六種安全議題尚待解決。
我們發現NFC三種模式當中,唯獨點對點模式具備安全通訊標準,而「卡片模擬模式」與「讀取/寫入模式」則仰賴於使用者自行設計安全機制,故本研究使用Diffie-Hellman金鑰交換法與橢圓曲線密碼系統,針對「卡片模擬模式」提出一套NFC電子錢包的安全通訊機制,並透過安全性分析來證明我們的方法滿足五點安全需求,達到「交易資料的機密性」、「資料的一致性」、「不可觀察性」、「不可連結性」、「可追蹤性」,因此所提出的方法具有相當程度的安全性。
在未來的研究中,可加強手機內部安全元件對於應用程式的身分辯識程度,防止非法程式癱瘓手機晶片卡功能,也須針對NFC標籤內容的正確性著手,藉此防範惡意程式碼滲入手機,侵犯使用者隱私。
The Near Field Communication (NFC)Technology can connect each other within one second. It is a very convenient and populartechnology now. However, there are many threats in transfer process. We discuss seven attacks about NFC technology. It has six unsolved problems.
The Peer-to-Peer Modehas a secure communication standard butCard Emulation Mode and Reader/Writer Mode do not have a secure protocol. Users should to design the protective protocolby themselves when they use the NFC technology in these modes. In our method,we use the Diffie-Hellman Key Exchange and Elliptic Curve Cryptosystem to design a secure communication protocol on NFC wallet. Our methodachievesfive security requirements which are Data Confidentiality, Data Integrity, Unobservability, Unlinkability and Traceability. It is aquitesecure method.
It should to enhance security in verifying identification of application in card emulation mode.It will prevent the illegal application to disable the function of secure chip. The identification of NFC tag should be careful, or it will infringe the privacy of user.
第一章 緒論 1
1.1. 前言 1
1.2. 研究動機與目的 2
1.3. 論文架構 3
第二章 文獻探討 4
2.1. NFC主要通訊標準 4
2.1.1. ISO/IEC 18092標準 4
2.1.2. ISO/IEC 14443標準 9
2.1.2.1. ISO/IEC 14443標準初始化流程 11
2.1.2.2. ISO/IEC 14443規範四種NFC標籤類別 14
2.1.3. ECMA International 385標準與ECMA International 386標準 15
2.2. NFC運作模式 17
2.2.1. Peer-to-Peer Mode(點對點模式) 17
2.2.2. Card Emulation Mode(卡片模擬模式) 18
2.2.3. Reader/Writer Mode(讀取/寫入模式) 18
第三章 NFC安全議題分析 21
第四章 NFC電子錢包安全通訊機制 26
4.1. 相關系統介紹 26
4.1.1. Diffie-Hellman Key Exchange方法介紹 26
4.1.2. Elliptic Curve Cryptosystem方法介紹 28
4.2. NFC電子錢包安全通訊機制 31
4.3. 本機制與Hasoo等學者所提出方法之比較 37
4.4. 本機制之安全性分析 39
第五章 結論與未來展望 42
參考文獻 44
[1] 黃明祥,林詠章。《資訊與網路安全概論:建構雲端運算安全(第四版)》。台北:美商麥格羅.希爾國際股份有限公司台灣分公司出版,2011。
[2] ISO/IEC 14443-3 Identification cards — Contactless integrated circuit(s) cards - Proximity cards — Part 3: Initialization and anticollision (2008).
[3] ISO/IEC 14443-4:2008 Identification cards — Contactless integrated circuit(s) cards — Proximity cards — Part 4: Transmission protocol (2007).
[4] ISO/IEC 18092:2013 Information technology -- Telecommunications and information exchange between systems -- Near Field Communication -- Interface and Protocol (NFCIP-1)(2013).
[5] NFC Analog Specification Technical Specification(1st Edition, 2012).
[6] Standards ECMA 385 NFC-SEC:NFCIP-1 Security Services and Protocol (3rd Edition, 2013).
[7] Standards ECMA 386 NFC-SEC-01:NFC-SEC Cryptography Standard using ECDH and AES (2rd Edition, 2010).
[8] Alzahrani, A., Alqhtani, A., Elmiligi, H., Gebali, F., Yasein, M. S., “NFC security analysis and vulnerabilities in healthcare applications”, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp.302-305, Victoria, BC, Canada, August 27-29, 2013.
[9] Charl, A. O., Gerhard, P. H., “A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment”, 2011 Third International Workshop on Near Field Communication, pp. 44-49, Hagenberg, Austria, February 22, 2011.
[10] Elbagoury, A., Mohsen, A., Ramadan, M., Youssef, M., “Practical provably secure key sharing for near field communication devices”, 2013 International Conference on Computing, Networking and Communications (ICNC), pp.750-755, San Diego, USA, January 28-31, 2013.
[11] Hasoo, E., Hoonjung, L., Heekuck, O., “Conditional Privacy Preserving Security Protocol for NFC Applications”, 2013 IEEE International Conference on Consumer Electronics (ICCE), pp.153-160, Las Vegas, NV, USA, January 11-14, 2013.
[12] Jara, A. J., Zamora, M. A., Skarmeta, A. F. G., “Secure use of NFC in medical environments”, 2009 5th European Workshop on RFID Systems and Technologies (RFID SysTech), pp.1-8, Blockhaus, Germany, June 16-17, 2009.
[13] Koblitz, N., “Elliptic Curve Cryptosystems”, Mathematics of Computation, Volume 48,Issue 177, pp. 203-209, January 1987.
[14] Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.,” NFC Devices: Security and Privacy”, 2008. ARES 08. Third International Conference on Availability, Reliability and Security, pp.642-647, Barcelona, Spain,March 4-7, 2008.
[15] Menezes, A.J.,Vanstone, S.A., “Elliptic Curve Cryptosystems and Their Implementation”, Journal of Cryptology,Volume 6, Issue4, pp.209-224, September 1993.
[16] Roland, M., Langer, J., Scharinger, J., ”Practical Attack Scenarios on Secure Element-enabled Mobile Devices”, 2012 4th International Workshop on Near Field Communication (NFC), pp.19-24, Helsinki, Finland, March 13, 2012.
[17] Standardized NFC Security Protocols-Mobile Payment and NFC Tutorial
http://mp-nfc.org/nfc_security_standardized_nfc_security_protocols.html(Reference Date: February 2, 2014).
[18] NFC Forum Issues Specifications For Four Tag Types NFC Forum
http://nfc-forum.org/newsroom/nfc-forum-issues-specifications-for-four-tag-types/ (Reference Date: June 24, 2014).
[19] NFC Forum Technical Specifications
http://members.nfc-forum.org/specs/spec_list/
(Reference Date: June 24, 2014).
[20] NFC Analog Specification Technical - Technical Specificationhttp://members.nfc-forum.org/specs/spec_list/
(Reference Date: June24, 2014)
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top