跳到主要內容

臺灣博碩士論文加值系統

(44.221.66.130) 您好!臺灣時間:2024/06/24 05:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳柏宇
研究生(外文):Bo-Yu Chen
論文名稱:以時間為基礎的RFID加密傳輸演算法
論文名稱(外文):A Time based Encoding Algorithm towards Secure RFID Transmission
指導教授:許慶賢
指導教授(外文):Ching-Hsien Hsu
學位類別:碩士
校院名稱:中華大學
系所名稱:資訊工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:34
中文關鍵詞:無線射頻辨識傳輸協定加密安全
外文關鍵詞:RFIDtransmission protocolencodingsecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:395
  • 評分評分:
  • 下載下載:73
  • 收藏至我的研究室書目清單書目收藏:1
無線射頻辨識系統RFID(Radio Frequency IDentification),主要是由RFID Tag以及RFID Reader構成,RFID Reader能夠利用無線電波讀取存在Tag中的數位資訊,並加以識別。與傳統條碼相比,RFID Reader不需要接觸就可以識別Tag資訊,因此已經在各個應用系統中被採用,例如物流管理、門禁系統管理等等。
由於RFID系統採用無線電波來傳遞資料,任何人只要能夠監視無線電波傳輸便可得知傳輸內容並用來刺探商業機密,或是利用攔截到的傳輸資訊複製出另一個一模一樣的RFID Tag藉以躲避門禁檢查,因此如何保護傳輸內容,不被有心人士複製或監視是一項重要的安全議題。
在這篇論文中,我們提出了一個加密傳輸資料的演算法,首先在Tag以及Reader中建立一個以特定公式產生的編碼表,當傳輸發生時,先利用經過MD5演算法編碼過的Unix Time來查詢編碼表,再送到Tag進行驗證。Tag收到資料後會驗證資料是否正確,當驗證通過後Tag會與傳輸資料交互運算,最後送出加密過後的訊息。由於時間只會往前前進,所以我們可以確保每次參與運算的Unix Time變數都是獨一無二不會重複,如此一來攻擊者就沒有辦法藉由分析傳輸封包的方式來監視傳輸內容,也沒有辦法複製Tag。

RFID(Radio Frequency IDentification) system is based on RFID tag and RFID reader. The reader can read and identify the data from tags by using radio frequency technology. Compared with traditional barcode, the reader can identify without contact to the tag, therefore it has been used in various system, such as supply chain management system, entrance control system, etc.
Because the RFID system use radio wave to transmit data, anyone can monitor the transmission of radio wave to get transmit content, or they can duplicate another tag by using the transmit data to cheat the entrance control system. Consequently, to protect the transmit data from duplicating or monitoring has become an important secure issue.
In this thesis, we proposed a time based data encoding algorithm to prevent transmit data from monitoring or duplicating. First, we create a specific encoding table which generated by expression, and we put the encoding table into the reader and the tag. When transmission initiate, we will use the MD5 to encode Unix time and query the encoding table by using encoded Unix Time, then send the result to the tag. The tag will verify the data to ensure it was sent by the trust reader, and send back the tag data by doing some expression if the reader can be trust. As time will only move forward, so we can ensure that Unix time is unique and won't repeat. In this way, the attacker can't monitor transmit data or duplicate the tag.
摘要 i
Abstract ii
致謝 iii
目錄 iv
表目錄 v
圖目錄 vi
第一章 緒論 1
1.1. 研究動機 1
1.2. 研究目的 2
1.3. 論文架構 3
第二章 相關技術與研究 4
第三章 以時間為基礎的RFID加密傳輸演算法 9
3.1. Unix Time 9
3.2. MD5演算法 10
3.3. 編碼表 10
3.4. TBE演算法 11
3.5. 例子 14
第四章 實驗與分析 19
第五章 結論與未來研究方向 23
References 24
1. “Unix Time”, http://en.wikipedia.org/wiki/Unix_time.
2. “MD5”, http://en.wikipedia.org/wiki/MD5.
3. W-T. Chen, T-W. Ho and Y-C. Chen, “An MAC protocol for wireless ad-hoc networks using smart antennas”, Proceedings of the 11th IEEE International Conference on Parallel and Distributed Systems, pp. 446-452, 2005.
4. T. You, H. Hassanein and C-H. Yeh, “PIDC – towards an ideal mac protocol for multi-hop wireless LANs”, Proceedings of the IEEE International Conference on Wireless Networks, Communications and Mobile Computing, pp.655-660, 2005.
5. Junbong Eom and Tae-Jie Lee, “Framed-Slotted ALOHA with Estimation by Pilot Frame and Identification by Binary Selection for RFID Anti-collision,” Proceedings of the International Symposium on Communications and Information Technologies, pp. 1027-1031, 2007.
6. Su-Ryun Lee, Sung-Don Joo and Chae-Woo Lee, “An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, pp. 166-172, 2005.
7. J. Park, M. Chung, and T.-J. Lee, “Identification of RFID Tags in Framed-Slotted ALOHA with Robust Estimation and Binary Selection,” Proceedings of the IEEE Communications Letters, Vol. 11, no.5, pp. 452-454, 2007.
8. Bo-Yu Chen, Ching-Hsien Hsu, Kuan-Ching Li, “An Adaptive Anti-Collision Algorithm towards Efficient RFID Tag Identification,” Proceedings of the Ubiquitous, Autonomic and Trusted Computing, 2009.
9. Bo Feng, Jin-Tao Li, Jun-Bo Guo, and Zhen-Hua Ding, “ID-binary tree stack anti-collision algorithm for RFID,” Proceedings of the Computers and Communications, ISCC '06, pp. 207-212, 2006.
10. J. Myung, W. Lee, T. K. Shih, “An adaptive memoryless protocol for RFID tag collision arbitration,” Proceedings of the Multimedia, IEEE Transactions on Vol. 8, Issue 5, pp. 1096-1101, 2006.
11. Jiho Ryu, Hojin Lee, Yongho Seok, Taekyoung Kwon and Yanghee Choi, “A Hybrid Query Tree Protocol for Tag Collision Arbitration in RFID systems,” Proceedings of the IEEE International Conference on Communications, pp. 5981 - 5986, 2007.
12. Tsan-Pin, Wang, “Enhanced Binary Search with Cut-Through Operation for Anti-Collision in RFID Systems,” Proceedings of the IEEE COMMUNICATIONS LETTERS, Vol. 10, No. 4, pp. 236-238, 2006.
13. Qi Yao, Seng-Kee Tan, Yu Ge, Boon-Sain Yeo, Qinghe Yin, “An Area Localization Scheme for Large Wireless Sensor Networks,” Proceedings of the Vehicular Technology Conference, 2005.
14. Xun Chen, Peng Han, Qiusheng He, and Shiliang Tu, “A Viable Localization Scheme for Dynamic Wireless Sensor Networks,” Proceedings of the International Multi-Symposiums on Computer and Computational Sciences, 2006.
15. EPCglobal, EPC Radio-Frequency Identify Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.2.0
16. B. Feng, J.T. Li, J.B. Guo, and Z.H. Ding, “ID-binary tree stack anticollision algorithm for RFID,” Proceedings of the 11th IEEE Symposium on Computers and Communications, pp. 207-212, 2006.
17. D. Henrici, P. Muller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,” Proceedings of the Second IEEE Annual Conference, pp. 149-153, 2004.
18. Xiao-hua Wang, Xiao-guang Zhou, Bai-sheng Sun, “An Improved Security Solution of RFID system,” Proceedings of the Wireless Communications, Networking and Mobile Computing, pp. 2081-2084, 2007.
19. R. Want, “An Introduction to RFID Technology”, IEEE Pervasive Computing, Vol. 5, No. 1, pp. 25-33, 2006.
20. Chen Qian, Hoilun Ngan, and Yunhao liu, “Cardinality Estimation for Large-scale RFID Systems”, Proceedings of the Sixth Annual IEEE International Conference, pp. 30-39, 2008.
21. Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song, “An approach to security and privacy of RFID system for supply chain”, Proceedings of the E-Commerce Technology for Dynamic E-Business, pp. 164-168, 2004.
22. Qinghan Xiao, Cam Boulet, and Thomas Gibbons, “RFID Security Issues in Military Supply Chains”, Proceedings of the Availability, Reliability and Security conference, pp. 599-605, 2007.
23. Lan Zhang, Huaibei Zhou, Ruoshan Kong, and Fan Yang, “An Improved Approach to Security and Privacy of RFID Application System,” Proceedings of the Wireless Communications, Networking and Mobile Computing, pp. 1195-1198, 2005.
24. Jaemin Park, Junchae Na, and Minjeong Kim, “A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag.” Proceedings of the Future Generation Communication and Networking, pp. 436-441, 2007.
25. Hoon Ko and Carlos Ramos, “A Study on the Encryption Algorithm for RFID tag,” Proceedings of the Convergence and Hybrid Information Technology, pp.672-677, 2008.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 江信男、林旻沛、柯慧貞(2005)。台灣地區老人的生理疾病多寡、自覺生理健康、社會支持度與憂鬱嚴重度。臨床心理學刊,2(1),11-22。
2. 白崇田、陳麗美(1988)。新店市成人居民參加高血壓糖尿病健康篩檢意願之調查研究。公共衛生,15,271-301。
3. 王雪鳳、陳宇嘉、劉波兒、劉麗芳(2009)。第2型糖尿病自我效能相關性之探討。弘光學報,56,1-14。
4. 李秀珍、李素幸、宋瑩珠(2009)。國中生健康促進生活型態及其影響因素之探討-以台南縣四所國中生爲例。學校衛生,54,107-122。
5. 林雅雯、游琇茜、翁政玉、黃于晏、楊琇惠、劉智綱(2003)。醫院員工健康促進生活型態及其決定因素之探討-以新竹某區域教學醫院為例。醫務管理期刊,4(4),77-90。
6. 林勤豐、黃月桂(2000)。成人健康檢查保健評估與最佳產品組合之探討。醫院雜誌,33(2),60-68。
7. 邵榮華、葉湘芬(2010)。自我管理計畫對心臟衰竭老人成效之探討。志為護理-慈濟護理雜誌,9(1),79。
8. 洪麗玲、高淑芬(1997)。護專學生健康行為自我效能與健康促進生活方式之探討。長庚護理,8(3),52-65。
9. 馬作鏹、吳宜玲、邱鈺婷、邵國寧、黃素雲(2006)。應用健康信念模式探討台灣地區影響老年人利用健保成人預防保健服務之相關因素研究。醫務管理期刊,7(4),349-369。
10. 張宏名、董和銳(2008)。中老年人自費健康檢查之利用行為及其相關因素探討。臺灣老人保健學刊,4(2),88-109。
11. 張美娟(2009)。健康素養與健康照護。志為護理-慈濟護理雜誌,8(3),65-69。
12. 張靖梅、林獻鋒(2009)。婦女未曾接受子宮頸抹片檢查之質性研究。護理暨健康照護研究,5(3),211-219。
13. 陳世明、陳柏宗(2009)。都市高層集合住宅社區的老人社區照顧服務據點與老人社會網絡、社會支持之研究:以台南市長榮社區爲例。建築學報,69,99-122。
14. 陳素月、許淑蓮、王東衡、黃明賢(2009)。成人氣喘病患自我效能及自我照顧行為之探討。護理暨健康照護研究,5(1),41。
15. 陳燕禎(2005)。社區老人照顧支持體系及政策之探討。社區發展季刊,110,158-176。