跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/06 05:49
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:賴意利
研究生(外文):Yi-Li Lai
論文名稱:高安全性RFID應用之研究
論文名稱(外文):Study of Secure RFID Applications
指導教授:陳俊良陳俊良引用關係
指導教授(外文):Jiann-Liang Chen
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:75
中文關鍵詞:監聽偽造無線射頻識別系統指紋交互驗證中介軟體
外文關鍵詞:AuthenticationFingerprintsSymmetric keyXORAES
相關次數:
  • 被引用被引用:5
  • 點閱點閱:350
  • 評分評分:
  • 下載下載:77
  • 收藏至我的研究室書目清單書目收藏:3
隨著現今科技的發展及應用端之研發,無線射頻識別系統 (Radio Frequency Identification,RFID),應用日漸廣泛,尤其是在各業界產品銷售管理之運用層面,但由於RFID為利用無線電射頻傳輸識別碼,因此保密安全,為其中一項重要課題,未來如能克服當前一些安全機制問題,朝向結合後端各應用系統、資料庫系統,並配合既有之通訊產業競爭優勢與研究發展,建構整個產業之環境基礎,將促使RFID能更多元化應用,強化企業之貨品管理,無形中也為電子商務增加使
用者信心降低保密資料被竊取的疑慮。
RFID 系統中的Tag 及Reader 透過射頻訊號以無線通訊方式進行資料傳輸,在無線的環境中容易因監聽、掃描這些攻擊行為而引起如:破壞資料隱私、位置隱私及偽造(假冒身份)等安全問題。因此,如何確保RFID 系統與傳輸資料的安全為在建置RFID 環境時一個重要考量。另外,在RFID 系統中,Tag 本身的資源與計算能力是相當受到限制。在有限的成本考量下,如何達到雙方認證功能及防止資料洩露為一項挑戰。在本論文中,我們提出一套 以 RFID Middleware ALE 為
基準的安全機制,包含下列四項安全功能:
1) 使用指紋作驗證與授權:
2) 資料傳輸使用高階加密法(AES)的方式:
3) 使用指紋作存取控制:
4) Reader 與 Tag 作交互驗證:

驗證方式採用XOR功能與對稱式的金鑰作加解密。雙向的認證機 制,此機制能夠有效的達到雙方認證並防止敏感資料外洩。避免攻擊者利用監聽、後重送資訊進行RFID Tag 偽造的問題,使用此機制也可以達到某些程度下Tag ID 保密的效果,此外由於不需密碼元件如:Hash、AES 等,因此在製作RFID Tag 的成本也會相對的降低許多,而讓這套系統的應用能達到安全及低成本的目的。
因為目前大量佈署的中介軟體不作安全的要求及安全的提供能力,有鑑於此本研究所提議的方法不僅提供高安全、高效率,更提供高可靠度的安全功能。
In recent years Radio Frequency Identification (RFID) technology is quickly evolving in the supply chain because it increases visibility of the movement of supplies providing opportunities for increased efficiency. RFID tags can uniquely encode the individual identity of a particular product. Because many tags can be read at a distance (often measured in feet) by readers at known locations, they also provide information on location at time of read, and this information can be used to track tagged items. Manufacturers, suppliers, and retailers stand to benefit from RFID by knowing where
goods are within and between businesses in the supply chain. (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged goods, and
promises cost reductions.

RFID system is no-contact, non-line-of-sight and invisible identification, which is different from ubiquitous barcode identification system . Hence, it is difficult to completely stop the signals from being emitted from the tags. Tags are placed on pallets, cases, and individual items and can be scanned from between inches to meters, revealing the EPC number. The EPC number is the key to a database entry that contains information about the product and its owner. This has the potential to reduce purchase
anonymity and privacy advocates are worried about disclosing such information.

Our proposal is compliant with EPCglobal ALE (Application Level Events), which is standard interface for middleware and its clients. We show how to provide strengthened security and trust by protecting transported data between middleware and stored data in
middleware. Moreover, we achieve the identification and service access control against illegal service abuse. So the following functions are urgently needed for providing trust
services based on RFID.
1) Identification and Authentication with Fingerprints:
The ALE service provider must identify the clients and authenticate to prevent illegal
clients access the service.
2) Data Transport Protection Encryption with AES:
In order to protect the data transported between ALE service provider and clients
ALE service provider build the security and functions for the integrity, confidentiality, freshness and so on.
3) Service Access Control with Fingerprints :
Unauthorized users may try to access the ALE service (e.g., stored tag data ALE service configuration, reader management, middleware resource management, notification report accepter) and it brings the untrusted and confused application
systems.
4) Mutual Authentication Reader and Tags :
With XOR function and symmetric key cryptosystem.

Because currently most widely deployed middleware products do not the security
requirements and do not provide capability, proposed method provides not only
high-security but high-efficiency.
誌謝.......................................................I
摘要......................................................II
Abstract..................................................IV
Figures.................................................VIII
Tables.....................................................X
1 Introduction.............................................1
1.1 Motivation ............................................2
1.1.1 Proposed ALE-Based Middleware........................3
1.1.2 Security Requirements................................4
1.2 Organization of thesis.................................9
2 Background Knowledge and Related Work...................10
2.1 EPCglobal RFID Middleware System......................10
2.1.1 EPCglobal Network Architecture......................10
2.1.2 ALE (Application Level Events)......................13
2.1.3 Middleware..........................................14
2.1.4 Backend Database....................................16
2.2 RFID Security Fundamentals and Principlesof protection
..........................................................17
2.3 RFID System Threat and Target Identification..........18
2.3.1 Attack Objectives...................................18
2.3.2 Attacking Middleware with the Air Interface.........20
2.3.3 RFID Data Collection Tool—Backend Communication Attacks.................................................. 21
2.4 Data Security........................................ 22
3 Secure RFID ALE Middleware Infrastructure...............24
3.1 RFID Infrastructures................................. 24
3.1.1 Requirements........................................24
3.1.2 Architecture........................................26
3.2 Threat Model..........................................27
3.2.1 RFID System Model...................................27
3.2.2 Identification of Assets to Protect................ 28
3.2.3 Security Assets and Threat Model....................29
3.2.4 Identification of Entry Points......................30
3.3 Implement RFID Security System........................33
3.3.1 Security Models.....................................33
3.3.2 Authentication with Biometric Fingerprint.......... 34
3.3.3 Access Control......................................35
3.3.4 Data Protection.................................. ..37
3.3.5 A Model for an RFID Authentication system...........41
4 Proposed RFID Security System Implementation........ ...45
4.1 Authentication of Tags and Readers....................46
4.1.1 Proposed Protocol...................................47
4.1.2 Security and Complexity Analysis...................50
4.1.3 A Scenario for Tags and Readers Authentication......51
4.2 Fingerprint Biometric Authentication Security Model...52
4.3 ALE Application Framework Data Stream with AES
Encryption............................................55
5 Conclusion and Future work..............................58
Rferences.................................................59
[1]“An Evaluation of Security Threats and Countermeasures in Distributed RFID”
Infrastructuresinfo.iicm.edu/thesis/sstadlober.pdf,
pp.1-113.
[2]A. Juels “RFID security and privacy: a research survey”, IEEE Journal, Volume 24, Issue 2, Feb. 2006, pp.381 – 394
[3]C, Chatmon, T. V. Le , M. Burmester , “Secure Anonymous RFID Authentication Protocols” http://whitepapers.techrepublic.com pp. 1-10
[4]D. R. Thompson, N. Chaudhry, C. W. Thompson, “RFID SECURITY THREAT MODEL” http://www.csce.uark.edu.
[5]D. C. Ranasinghe , K. S. Leong , M. L. Ng, D. W. Engels, P. H. Cole, ” A Distributed Architecture for a Ubiquitous RFID Sensing Network,” Proceedings of the 2005 International Conference, pp.7- 12, Dec. 2005.
[6]F. Christian , L. Matthias , R. Christof “ Facilitating RFID Development with the Accada Prototyping Platform,” Fifth Annual IEEE International Conference,
pp.495-500, Mar. 2007.
[7] EPCglobal Web site. www.epcglobalinc.org, 2005.
[8] EPCglobal Object Name Service (ONS) 1.0. Technical report, EPCGlobal Inc,April 2004.
[9] F. Thornton, B. Haines, A. M. Das , H. Bhargava, A. Campbell , J. Kleinschmidt , ”RFID Security,” pp. 1-266.
[10] H. Maurer, D. Helic, ” An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures,” pp. 1-113
[11]H. Gilbert , M. Robshaw , H. Sibert. “an active Attack Against HB+ -A Provably Secure Lightweight Authentication Protocol,”eprint.iacr.org/2005/237.pdf
[12]H. Kim , J.H. Oh, J.Y. Choi, “Security Analysis of RFID Authentication for Pervasive Systems using Model Checking,” 30th Annual International Computer
Software and Applications Conference (COMPSAC'06), 2006 compsac,
pp.195-202.
[13]H.S. Kim, J.H. Oh, J.Y. Choi, “Analysis of the RFID Security Protocol for Secure Smart Home Net,” Hybrid Information Technology International Conference, Vol 2. pp.356 – 363, Nov. 2006
[14]L.Bolotnyy , G. Robins, ” Physically Unclonable Function-Based Security and Privacy in RFID Systems,” Fifth Annual IEEE International Conference, pp.211 – 220, Mar. 2007.
[15]J. F. Cui, H. S. Chae, “Agent-Based Design of Load Balancing System for RFID Middlewares”, Future Trends of Distributed Computing Systems, 200711th IEEE International Workshop, pp.21 – 30, Mar. 2007.
[16] J. Song, H. Kim, “The RFID middleware system supporting ontext-aware access
control service,” Advanced Communication Technology, 2006, The 8th International Conference Volume 1, pp. 863-866, Feb. 2006.
[17] J. Song, T. Kim, S. Lee, and H. Kim,” Security Enhanced RFID Middleware System,” Transactions On Engineering, Computing And Technology V10,
pp.79-82, Dec. 2005.
[18] K. S. Leong , M. L. Ng , D.W. Engels ,” EPC Network Architecture,” pp. 1-5
[19] K. An, M. Chung, “ALE Application Framework for Constructing Effective RFID Application,” Korean Ministry of Education & Human Resources Development.
pp. 226 - 233
[20] D. S . Kim , T. H. Shin , J. S. Park, “A Security Framework in RFID Multi-domain System,” Availability, Reliability and Security, 2007 The Second International Conference pp.1227 – 1234, April. 2007
[21]M. Schwan ,” An extended model of security policy for multi-applicative
smart cards”, Conference on Computer and Communications Security, pp.1-6

[22]N. Park , J. Lee, H. Kim, K. Chung , S. Sohn ,
“A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System)”, Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, pp.1-4
[23]K. Osaka , T. Takagi, K. Yamazaki, O. Takahashi, ” An Efficient and Secure RFID Security Method with Ownership Transfer,” Computational Intelligence and Security, 2006 International Conference, Volume 2, pp.1090 – 1095, Nov. 2006
[24] Klaus Finkenzeller, ”RFID Handbook” pp.1-434.
[25]T .Chan , W. Cheung, J.S. Li , V. Ng, W. Cheung, E. Wong, Z. Luo,
“Experimental Analysis of an RFID Security Protocol, “ IEEE International Conference, pp.62 – 70 ,Oct. 2006
[26]T.Phillips, T.Karygiannis, R.Kuhn, “Security standards for the RFID market,” Security & Privacy Magazine, IEEE ,Volume 3, Issue 6, pp.85 – 89, Nov.-Dec. 2005.
[27]M.R.Rieback, B. Crispo, A.S. Tanenbaum,” The evolution of RFID security, “
Pervasive Computing, IEEE Volume 5, Issue 1, pp.62 – 69, Jan.-March 2006
[28]”Securing RFID Data for the Supply Chain” http://www.verisign.com/epc
[29]S. Lee, T. Asano , K. Kim, ”RFID Mutual Authentication Scheme based on Synchronized Secret Information,” Symposium on Cryptography and Information Security, pp 1-6, Jan. 2006.
[30]The Application Level Events (ALE) Specification, Version 1.0,EPCGlobal Inc,
September 2004.
[31]X. Qinghan, B.Cam, G. Thomas,” RFID Security Issues in Military Supply Chains,” Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference , pp.599 – 605, Apr. 2007.
[32]Y. Gil; D. Ahn; S. Pan; Y. Chung, “Access control system with high level security using fingerprints,” Applied Imagery Pattern Recognition Workshop, 2003.Proceedings. Volume 32nd, pp. 238 – 243, Oct. 2003.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top