跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.174) 您好!臺灣時間:2024/12/03 20:52
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:謝俊宏
研究生(外文):Jun-Hong Xie
論文名稱:安全多擁有者共有群組標籤之所有權轉移協定
論文名稱(外文):A Secure Multi-owner Multi-tag Ownership Transfer Protocol
指導教授:楊明豪楊明豪引用關係羅嘉寧羅嘉寧引用關係
指導教授(外文):Ming-Hour YangJia-Ning Luo
學位類別:碩士
校院名稱:中原大學
系所名稱:資訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:108
語文別:中文
論文頁數:34
中文關鍵詞:Mobile RFID跨領域多擁有者群組標籤指定對象所有權轉移安全協定
外文關鍵詞:Mobile RFIDAcross AuthorityMulti-ownerMulti-tagOwnership Transfer
相關次數:
  • 被引用被引用:0
  • 點閱點閱:1
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
行動無線射頻識別(Mobile Radio Frequency Identification, Mobile RFID)已廣泛應用於多個領域中,在供應鏈管理中藉由RFID來管理貨物與貨物之所有權轉移使流程更有效率。不過在供應鏈上游產業常需進行多擁有者轉移群組標籤的情況,但目前的多擁有者所有權轉移方法效率不佳,而且還容易遭受到重送、追蹤標籤、非同步癱瘓服務等攻擊。因此我們提出一個安全高效能的多擁有者部份群組標籤所有權轉移協定,我們提出的協定支援Mobile RFID環境、跨越不同管轄領域、指定所有權轉移對象、轉移群組標籤所有權等支援現有所有權轉移環境所需的能力,且能夠抵禦目前大部分RFID上已知類型的攻擊。最後我們將與其它多擁有者所有權轉移方法進行效能與安全比較,證明我們所提出的方法是安全有效率的。
Mobile Radio Frequency Identification (Mobile RFID) has been widely used in many domains. Using RFID technologies in the supply chains makes the transferring of the ownership of the cargos more efficient. In a supply chain, group tags often have more than one owner. However, the current multi-owner ownership transfer methods in other studies are not efficient, and are vulnerable to attacks such as replay, tracking tags, and desynchronized denial of service. For this reason, we propose a high-performance secure multi-owner partial group tags ownership transfer protocol. Our protocol can specific the RFID tags that need to be transferred in a multi-domain mobile RFID environment. Besides, it is able to secure against most current Mobile RFID attacks. Finally, we compare the performance and security with other methods to prove that our proposed method is safe and efficient.
目錄
摘要I
AbstractII
誌謝III
目錄IV
圖目錄V
表目錄VI
一、前言1
二、多擁有者轉移共有群組標籤所有權方法5
2.1系統架構5
2.2轉移多個群組標籤10
三、多擁有者共有群組標籤所有權轉移協定 10
3.1確認多數同意方法11
3.2詢問多擁有者與取得標籤資訊12
3.3認證標籤與移交所有權14
3.4更新群組與平衡金鑰樹16
四、安全性分析17
五、效能分析比較20
六、結論25
七、參考文獻25




圖目錄
圖 1多擁有者群組所有權轉換架構5
圖 2標籤群組金鑰樹7
圖 3標籤群組轉移編號範例9
圖 4詢問多擁有者與取得標籤資訊12
圖 5認證標籤與移交所有權14
圖 6第(1)種情況轉移標籤21
圖 7第(2)種情況轉移標籤21
圖 8第(3)種情況轉移標籤22
圖 9標籤計算量比較23
圖 10讀取器計算量比較24
圖 11伺服器計算量比較24













表目錄
表 1符號定義10
表 2安全性比較表19
表 3效能比較表22
[1]M. H. Yang, K. P. Xie, “TTP-Based Group Ownership Transfer in A Mobile RFID Environment,” In International Journal of Digital Content Technology & its Applications, Vol. 7, No. 2, pp 51-69, 2013.
[2]A. Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006.
[3]C. Seidler, “RFID Opportunities for Mobile Telecommunication Services,” ITU-T Lighthouse Technical Paper, May 2005.(http://www.itu.int/ITU-T/techwatch/rfid.pdf)
[4]H. Lee and J. Kim, “Privacy Threats and Issues in Mobile RFID,” The First International Conference on Availability, Reliability and Security, Apr. 2006, pp. 510-514.
[5]S. Engberg, M. Harning, C. Damsgaard Jensen, “Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID preserving Business Value and Consumer Convenience,” Privacy, Security, and Trust, New Brunswick, Canada, Oct. 2004.
[6]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, and Pim Vullers. “Secure Ownership and Ownership Transfer in RFID Systems” In Proc. 14th European Symposium on Research in Computer Security (ESORICS’09), 2009.
[7]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” International Conference on Computational Intelligence and Security, Nov. 2006, pp. 1090-1095.
[8]S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,” IEEE Security & Privacy, vol. 3 Issue 3, May-June 2005, pp.34-43.
[9]S. Fouladgar and H. Afifi., “An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags,” In First International EURASIP Workshop on RFID Technology, Vienna, Austria, Sept. 2007.
[10]Y. J. Zuo, “Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags,” Hawaii International Conference on System Sciences, pp. 1-10, Jan. 2010.
[11]K. H. S. S. Koralalage, M. R. Selim, J. Miura, Y. Goto, and J. Cheng, “POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism,” Proceedings of the 2007 ACM Symposium on Applied Computing, Mar. 2007, pp. 270-275.
[12]P. Jäppinen, H. Hämäläinen, "Enhanced RFID Security Method with Ownership Transfer", In Proceedings of the International Conference on Computational Intelligence and Security, pp. 382-385, 2008.
[13]G. Kapoor, S. Piramuthu, ‘‘Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols, ’’ Communications Letters, IEEE , vol.14, no.3, pp.260-262, March 2010.
[14]M. H. Yang, Across-authority Lightweight Ownership Transfer Protocol, Electronic Commerce Research and Applications, Volume 10, Issue 4, pp.375-383, 2011.
[15]G. Kapoor, W. Zhou, and S. Piramuthu, ‘‘Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains,’’ Decision Support Systems, vol. 52, no. 1, pp. 258–270, 2011.
[16]S. Sundaresan, R. Doss, W. Zhou, and S. Piramuthu, ‘‘Secure Ownership Transfer for Multi-tag Multi-owner Passive RFID Environment with Individual-owner-privacy,’’ Computer Communications, vol. 55, pp. 112–124, Jan. 2015.
[17]J. Munilla, M. Burmester, and A. Peinado, ‘‘Attacks on Ownership Transfer Scheme for Multi-tag Multi-owner Passive RFID Environments,’’ Computer Communications, vol. 88, pp. 84–88, Aug. 2016.
[18]Eyad Taqieddin‚Hiba Al-Dahoud‚Haifeng Niu‚Jagannathan Sarangapani , ‘‘Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges,’’ IEEE Access‚vol.6‚pp.32117-32155‚June 2018.
[19]X. Yang, C. Xu, and C. Li, “A Privacy Model for RFID Tag Ownership Transfer,” Security and Communication Networks, vol. 2017, Mar. 2017, Art. no. 5084636.
[20]T. Dimitriou, ‘‘Key Evolving RFID Systems: Forward/Backward Privacy and Ownership Transfer of RFID Tags,’’ Ad Hoc Networks, vol. 37, pp. 195–208, Feb. 2016.
[21]C.-C. Lee, C.-L. Cheng, Y.-M. Lai, and C.-T. Li, ‘‘Cryptanalysis of Dimitriou’s Key Evolving RFID Systems,’’ in Proc. 5th International Conference on Network, Communication and Computing, 2016, pp.229–233.
[22]D. Molnar, A. Soppera, and D. Wagner, “A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags,” Selected Areas in Cryptography, vol. 3897, Kingston, Canada, Aug. 2005, pp. 276–290.
[23]L. He, Y. Gan, and Y. Yin, ‘‘Secure Group Ownership Transfer Protocol with Independence of Old Owner for RFID Tags,’’ Computer Modelling New Technologies, vol. 18, no. 12B, pp. 209–214, 2014.
[24]N. Bagheri, F. Aghili, and M. Safkhani, ‘‘On the Security of Two Ownership Transfer Protocols and Their Improvements,’’ International Arab Journal of Information Technology, vol. 15, no. 1, pp. 87–93, 2018.
[25]Eun-Jun Yoon, Kee-Young Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer”, Network and Parallel Computing, Oct. 2008, pp. 68-73.
[26]H. B. Chen, W. B. Lee, Y. H. Zhao, Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer,” the 3rd International Conference on Ubiquitous Information Management and Communication, SKKU, Suwon, Korea, Jan. 2009, pp. 251-254.
[27]G. Kapoor and S. Piramuthu, ‘‘Single RFID Tag Ownership Transfer Protocols,’’ IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 42, no. 2, pp. 164–173, Mar. 2012.
[28]H. Jannati, A. Falahati, “Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags,” In International Conference on Global Security, Safety and Sustainability, pp 186-193, 2011.
[29]Wei Tim Liew, Kuo Yu Tsai, Jia Ning Luo, Ming Hour Yang, “Novel Designated Ownership Transfer with Grouping Proof,’’ IEEE Conference on Dependable and Secure Computing,2017, pp.433–440.
[30]M. H. Yang, ‘‘Secure Multiple Group Ownership Transfer Protocol for Mobile RFID,’’ Electron. Commerce Res. Appl., vol. 11, no. 4, pp. 361–373, 2012.
[31]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, “Secure Ownership Transfer in Multi-tag/Multi-owner Passive RFID Systems,’’ IEEE Global Communications Conference (GLOBECOM) ‚ 2013.
[32]NIST, FIPS PUB 197, “Advanced Encryption Standard (AES)”, Nov. 2001.
[33]RSA Data Security Inc. PKCS#1v2.1: RSA Cryptography Standard, Jan.5, 2001.
[34]3GPP;TSG SA, “3G Security; Security Architecture (Release 8),” 3GPP TS 33.102, March 2009.
[35]Institute of Electrical and Electronics Engineers, Inc., “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements,” Std.802.11i-2004, July. 2004.
[36]A. Poschmann, G. Leander, K. Schramm, C. Paar, “New Light-Weight Crypto Algorithms for RFID,” Circuits and Systems, 2007, pp. 1843-1846.
[37]M. Hell, T. Johansson, WilliMeier, “Grain - a stream cipher for constrained environments,” International Journal of Wireless and Mobile Computing, Vol. 2, Issue 1,May 2007, pp. 86-93.
[38]Internet X.509 Public Key Infrastructure Certificate Management Protocols, Retrieved July. 1, 2009, from the World Wide Web: http://www.ietf.org/rfc/rfc2510.txt
[39]J. Kohl and C. Neuman, “The Kerberos Network Authentication Service (V5),”RFC1510, September 1993.
[40]A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 24, no. 11,pp. 612-613, Nov. 1979.
[41]Zhou, J., Ou, Y. H., Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme, Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ISBN:978-3-642-03094-9, 2009.
[42]L. Xu, C. Huang, “Computation-Efficient Multicast Key Distribution,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 5, pp. 577-587, May, 2008.
[43]L. Harn, “Group-oriented (t, n) threshold digital signature scheme and digital multisignature,”IEE Proc.-Comput. Digit. Tech., 141(5), Sept. 1994.
[44]L. Gong, R. Needham and R. Yahalom, “Reasoning about belief in cryptographic protocols,” in Computer Society Symposium on Research in Security and Privacy, 1990, pp. 234-248.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top