跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.176) 您好!臺灣時間:2025/09/08 19:21
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:王嶢仁
研究生(外文):Yao-Jen Wang
論文名稱:一個使用於2G-RFID-Sys的安全基礎架構設計
論文名稱(外文):The design of a secure infrastructure for 2G-RFID-Sys
指導教授:詹進科詹進科引用關係陳育毅
指導教授(外文):Jinn-Ke JanYu-Yi Chen
口試委員:張真誠林祝興顧維祺曾育民陳金鈴
口試日期:2014-01-14
學位類別:博士
校院名稱:國立中興大學
系所名稱:資訊工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:76
中文關鍵詞:無線射頻辨識2G-RFID數位簽章醫療緊急救護系統救護車派遣冷凍鏈溫度監控感測器標籤食品追溯食品安全證書驗證
外文關鍵詞:2G-RFIDDigital SignatureMedical Emergency SystemAmbulance DispatchRFID SecurityFood TraceabilityCold ChainSensor TagTemperature MonitoringCertificate Verification
相關次數:
  • 被引用被引用:0
  • 點閱點閱:723
  • 評分評分:
  • 下載下載:15
  • 收藏至我的研究室書目清單書目收藏:0
無線射頻辨識(Radio Frequency Identification, RFID)在各產業的應用上已是一項成熟的技術。不過,傳統的RFID系統在可用性及擴展性上有其先天的限制與不足。一種新型態的第二世代RFID系統(Second-Generation RFID systems, 2G-RFID-Sys)不再侷限於中央管理方式,即使在後台停止運作或網路斷線的情形下仍能繼續提供服務,因此在應用上將更具效能。然而,在原始的2G-RFID-Sys設計之中,儲存於標籤內的執行資料其合法性與正統性並未受到重視與解決。除此之外,也缺乏一個可將2G-RFID-Sys應用到實際環境之中的基礎架構,這樣的架構在面對不同環境時,將必須作不同的調整。
在本論文中,我們為2G-RFID-Sys提出一個三層角色 (3-role-layer)的安全基礎架構,詳細定義了系統中每層參與角色該負有的責任。在此架構下,將之應用於廣域範圍的RFID系統,例如救護車派遣、冷凍鏈系統(Cold Chain System, CCS)、證書驗證。在醫療緊急救護系統(Medical Emergency System, MES)中,將本架構應用於救護車派遣的交通號誌控制上,將可確保救護車行進間暢行無阻以增加病人生存的機會,此外,也可防止有心人士的竄改或複製標籤的內容,進行惡意的使用。在第二個應用中,改良的自動冷凍鏈系統(Refined Smart Cold Chain System, RSCCS)將內含的半被動式(semi-passive)標籤換成被動式(passive)標籤,縮減了溫度感測器的需求,大幅降低系統建置的成本,另外也可避免因同業惡性競爭而發生貨物標籤內容被竄改的風險。在不用隨時連線回後台管理的情況下,不但食品供應商可以確保運送途中食材新鮮,消費者也可以買得更安心。在第三個應用中,一個採用RFID嵌入式技術的全球性證書驗證系統被提出來解決國際化人才徵人與求職時的需求,本機制不但可以確認證書的真偽,也可以證明持有人與證書的關係。由於少了區域性的限制因素,這個以2G-RFID-Sys為基礎的解決方案將更具彈性、更能符合跨國需求。
2G-RFID使得系統針對不同的對象在不同的情況下更方便執行不同的操作,並且提高了可擴展性。總之,本研究針對2G-RFID-Sys所提出之安全的基礎架構不但保有原始設計之優點,更可以進一步確保系統執行之正確性與安全。
RFID is a mature technology in identification application based on Internet of Things (IoT). On the other hand, the traditional RFID system may suffer from the availability and scalability. Without the disadvantage of centralized management, a new type of RFID application named 2G-RFID-Sys will be more efficient. It can continue to provide services, even if the backend system is disconnected or unavailable. However, the validity and legitimacy of the executed data in the tag are not addressed in the original design of 2G-RFID-Sys. Besides, it lacks an infrastructure if it will be applied to an environment. The infrastructure has to be adjusted when it faces different environments.
In this study, a 3-role-layer infrastructure of 2G-RFID-Sys is proposed. The prototype of 2G-RFID-Sys and the responsibility of each participant are refined. We apply it to manage the tagged objects in a huge range such as ambulance dispatch, cold chain system and certificate verification. In Medical Emergency System, we apply the infrastructure to the ambulance dispatch. The proposed protocol will ensure the traffic condition of the ambulance and increase a patient’s chance of survival. In the cold chain system, a Refined Smart Cold Chain System (RSCCS) was proposed in which the semi-passive tags are replaced with the passive tags to reduce the cost. The number of temperature sensors can be reduced to a minimum with a reader locally. In order to avoid vicious competition on business, our design can prevent the food information from being tampered. Not only the food producer can ensure the food freshness but also the consumer can safely purchase the products via RSCCS without accessing the backend system. For the demand of international talent, a global certificate verification mechanism with RFID-embedded technology is proposed. Without the factor of localization, it is a more flexible solution based on 2G-RFID-Sys to meet the transnational demand.
2G-RFID-Sys facilitates the system’s operations to perform actions on demand for different objects in different situations, and improves scalability. In summary, our proposal keeps the advantage of the original 2G-RFID-Sys and further ensures the correctness of the system execution.
Table of Contents
誌 謝 辭 I
中 文 摘 要 II
ABSTRACT IV
TABLE OF CONTENTS VI
LIST OF FIGURES VIII
LIST OF TABLES IX
CHAPTER 1. INTRODUCTION 1
1.1 MOTIVATION 3
1.2 OBJECTIVES 4
1.3 ORGANIZATION 6
CHAPTER 2. RELATED RESEARCH 7
2.1 ARCHITECTURE OF 2G-RFID-SYS 8
2.2 RISKS OF ORIGINAL 2G-RFID-SYS 9
CHAPTER 3. A SECURE 2G-RFID-SYS MECHANISM FOR APPLYING TO THE MEDICAL EMERGENCY SYSTEM 11
3.1 PRELIMINARY 11
3.2 AN OVERVIEW OF 2G-RFID-SYS 15
3.2.1 Architecture 17
3.2.2 Risks 18
3.3 PROPOSED PROTOCOL 19
3.3.1 The participating parties and notations 21
3.3.2 Initial phase 22
3.3.3 Issuing phase 24
3.3.4 Execution phase 24
3.4 ANALYSIS 26
3.5 SUMMARY 30
CHAPTER 4. A NOVEL DEPLOYMENT OF SMART COLD CHAIN SYSTEM USING 2G-RFID-SYS 31
4.1 PRELIMINARY 31
4.2 PROPOSED PROTOCOL 35
4.2.1 The participating parties and notations 37
4.2.2 RSCCS_Initial phase 38
4.2.3 RSCCS_Issuing phase 40
4.2.4 RSCCS_Execution phase 41
4.3 DISCUSSION AND ANALYSIS 42
4.3.1 Scenarios of RSCCS 42
4.3.2 Analysis 44
4.4 SUMMARY 47
CHAPTER 5. TWO INNOVATIVE RFID-EMBEDDED CERTIFICATE MECHANISMS FOR JOB APPLYING AND RECRUITING 48
5.1 PRELIMINARY 48
5.2 PROPOSED PROTOCOL 50
5.2.1 The participating parties and notations 51
5.2.2 Issuing phase 52
5.2.3 On-line verifying & uploading phase 53
5.2.4 Off-line verifying phase 55
5.3 DISCUSSION AND ANALYSIS 57
5.3.1 Issue of counterfeiting certificate 57
5.3.2 Issue of tag data tempering 58
5.3.3 Issue of privacy 59
5.3.4 Practicability 59
5.4 A 2G-RFID CERTIFICATE VERIFICATION SOLUTION FOR GLOBAL SCENARIO 60
5.4.1 The participating parties and notations 62
5.4.2 Initial phase of 2G-RFID global solution 63
5.4.3 Issuing phase of 2G-RFID global solution 64
5.4.4 Execution phase of 2G-RFID global solution 65
5.4.5 Scenarios of the global certificate verification 67
5.5 SUMMARY 68
CHAPTER 6. CONCLUSIONS AND FUTURE WORKS 70
BIBLIOGRAPHY 73
Bibliography
[1]R. Y. Zhong, Q. Y. Dai, T. Qu, G. J. Hu, and G. Q. Huang, “RFID-enabled real-time manufacturing execution system for mass-customization production,” Robotics and Computer-Integrated Manufacturing, vol. 29, no. 2, pp. 283–292, 2013.
[2]D. H. Williams, “The Strategic Implications of Wal-Mart’s RFID Mandate,” Directions, July 2004.
[3]Y. Y. Chen, D. C. Huang, M. L. Tsai, and J. K. Jan, “A Design of Tamper Resistant Prescription RFID Access Control System,” Journal of Medical Systems, vol. 36, no. 5, pp. 2795–2801, 2012.
[4]S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science, pp. 201–212, 2004.
[5]H. Y. Chien, ”Secure Access Control Schemes for RFID Systems with Anonymity,” International Conference On Mobile Data Management, pp. 96–99, 2006.
[6]Y. Y. Chen, M. L. Tsai, and J. K. Jan, “The Design of RFID Access Control Protocol using the Strategy of Indefinite-Index and Challenge-Response,” Computer Communications, vol. 34, no. 3, pp. 250–256, 2011.
[7]A. R. Sadeghi, I. Visconti, and C. Wachsmann, “User Privacy in Transport Systems Based on RFID E-Tickets,” In Workshop on Privacy in Location-Based Applications (PiLBA), October 2008.
[8]K. Peng and F. Bao, “A Secure RFID Ticket System for Public Transport,” In DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, vol. 6166, pp. 350–357, 2010.
[9]K. C. Tan, “A Framework of Supply Chain Management Literature,” European Journal of Purchasing & Supply Management, vol. 7, no. 1, pp. 39–48, 2001.
[10]M. Chen, S. Gonzalez, V. Leung, Q. Zhang, and M. Li, ”A 2G-RFID-BASED E-HEALTHCARE SYSTEM,” IEEE Wireless Communications, vol. 17, no. 1, pp. 37–43, 2010.
[11]M. Chen, “Towards smart city: M2M communications with software agent intelligence. Multimedia Tools and Applications,” Multimedia Tools and Applications, pp. 1–12, 22 February 2012.
[12]L. Boquete, R. Cambralla, J. M. Rodriguez-Ascariz, J. M. Miguel-Jimenez, J. J. Cantos-Frontela, and J. Dongil, “Portable system for temperature monitoring in all phases of wine production,” ISA Transactions, vol. 49, no. 3, pp. 270–276, 2010.
[13]Samuel Fosso Wamba, “Guest Editorial for the Special Issue on RFID-enabled Healthcare: Applications, Issues and Benefits,” Journal of Medical Systems, vol. 36, no. 6, pp. 3389–3392, 2012.
[14]Robert G. Fichman, Rajiv Kohli and Ranjani Krishnan, “Editorial Overview-The Role of Information Systems in Healthcare: Current Research and Future Trends,” Information Systems Research, vol. 22, no. 3, pp. 419–428, 2011.
[15]E.W.T. Ngai, Karen K.L. Moon, Frederick J. Riggins and Candace Y. Yi, “RFID research: An academic literature review (1995–2005) and future research directions,” International Journal of Production Economics, vol. 112, no. 2, pp. 510–520, 2008.
[16]Samir El-Masri and Basema Saddik, “An Emergency System to Improve Ambulance Dispatching, Ambulance Diversion and Clinical Handover Communication—A Proposed Model,” Journal of Medical Systems, vol. 36, no. 6, pp. 3917–3923, 2012.
[17]E. Abad, F. Palacio, M. Nuin, A. Gonzalez de Zarate, A. Juarros, J. M. Gomez, and S. Marco, “RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain,” Journal of Food Engineering, vol. 93, no. 4, pp. 394–399, 2009.
[18]R. Jedermann, L. Ruiz-Garcia, and W. Lang, “Spatial temperature profiling by semi-passive RFID loggers for perishable food transportation,” Computers and Electronics in Agriculture, vol. 65, no. 2, pp. 145–154, 2009.
[19]Y. S. Kang, H. Jin, O. Ryou, and Y. H. Lee, “A simulation approach for optimal design of RFID sensor tag-based cold chain systems,” Journal of Food Engineering, vol. 113, no. 1, pp. 1–10, 2012.
[20]Wan Tang, Jin Ni, Min Chen and Ximin Yang, “Contextual Role-based Security Enhancement Mechanism for 2G-RFID Systems,” The First International Workshop on Security in Computers, Networking and Communications, pp. 959–963, 2011.
[21]FDA Food Safety Modernization Act (FSMA), Available from: < http://www.fda.gov/Food/GuidanceRegulation/FSMA/default.htm >, Accessed 1 July 2013.
[22]S. Q. Luo, “The model and assessment of produce traceability system over the cloud in America,” Available from: < http://www.twfoodtrace.org.tw/expert_detail.php?info_id=227 >, Accessed 1 July 2013.
[23]A. Regattieri, M. Gamberi, and R. Manzini, “Traceability of food products: General framework and experimental evidence,” Journal of Food Engineering, vol. 81, no. 2, pp. 347–356, 2007.
[24]J. P. Munoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, and J. C. Sanchez-Aarnoutse, “Implementation of traceability using a distributed RFID-based mechanism,” Computers in Industry, vol. 61, no. 5, pp. 480–496, 2010.
[25]T. Bosona and G. Gebresenbet, “Food traceability as an integral part of logistics management in food and agricultural supply chain,” Food Control, vol. 33, no. 1, pp. 32–48, 2013.
[26]I H. Hong, J. F. Dang, Y. H. Tsai, C. S. Liu, W. T. Lee, M. L. Wang, and P. C. Chen, “An RFID application in the food supply chain: A case study of convenience stores in Taiwan,” Journal of Food Engineering, vol. 106, no. 2, pp. 119–126, 2011.
[27]J. Feng, Z. Fu, Z. Wang, M. Xu, and X. Zhang, “Development and evaluation on a RFID-based traceability system for cattle/beef quality safety in China,” Food Control, vol. 31, no. 2, pp. 314–325, 2013.
[28]J. P. Qian, X. T. Yang, X. M. Wu, L. Zhao, B. L. Fan, and B. Xing, “A traceability system incorporating 2D barcode and RFID technology for wheat flour mills,” Computers and Electronics in Agriculture, vol. 89, pp. 76–85, 2012.
[29]L. Atzori, A. lera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[30]D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Personal Communications, vol. 58, no. 1, pp. 49–69, 2011.
[31]Y. Y. Chen, Y. J. Wang, and J. K. Jan, “A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System,” Journal of Medical Systems, vol. 37, no. 3, pp. 1–10, 2013.
[32]D. M. Dobkin and T. Wandinger, “A Radio-Oriented Introduction to Radio Frequency Identification,” High Frequency Electronics, pp. 46–54, 2005.
[33]“Jet pilot busted for flying with a fake license,” Available from: < http://www.cnn.com/2010/WORLD/europe/03/04/netherlands.pilot.fake.license/index.html >, Accessed 26 Dec 2013.
[34]“Was 'nurse of the year' fake?” Available from: < http://edition.cnn.com/video/data/2.0/video/bestoftv/2009/08/07/pn.nurse.of.year.fake.cnn.html >, Accessed 26 Dec 2013.
[35]“Tens of thousands of forged certificates have been found by the police,” Available from: < http://big5.xinhuanet.com/gate/big5/yn.xinhuanet.com/newscenter/2010-06/27/content_20178437.htm >, Accessed 26 Dec 2013.
[36]“Manila's forgers graduate with honors from 'Recto University',” Available from: < http://www.cnn.com/2012/01/17/world/asia/philippines-recto/index.html >, Accessed 26 Dec 2013.
[37]“The hometown of forged certificates,” Available from: < http://big5.huaxia.com/gd/rdjj/00213993.html >, Accessed 26 Dec 2013.
[38]“To identify fake certificates rely on professional education authentication institution,” Available from: < http://news.sina.com.tw/article/20130114/8763623.html >, Accessed 26 Dec 2013.
[39]Global Credential Verification. Available from: < http://verify.certiport.com/ >, Accessed 26 Dec 2013.
[40]Yu-Ting Yang, ”A study on the anti-counterfeit for applying RFID to the land ownership certificate,” Zhongxing Land Office, Taichung City, 2005.
[41]Chia-Ho Lee, Chih-Yi Lin, Hwong-Wen Ma and Sio-Hang Ng, “The Incentive Mechanism with RFID Technology for Suppliers to Design Environmentally-Friendly Electrical and Electronic Equipment,” Procedia-Social and Behavioral Sciences, vol. 57, pp. 339–345, 2012.
[42]Cosmin Condea, Frederic Thiesse and Elgar Fleisch, “RFID-enabled shelf replenishment with backroom monitoring in retail stores,” Decision Support Systems, vol. 52, no. 4, pp. 839–849, 2012.
[43]Shuai Liu, Dongyong Zhang, Rong Zhang and Bin Liu, “Analysis on RFID operation strategies of organic food retailer,” Food Control, vol. 33, no. 2, pp. 461–466, 2013.
[44]Jiang-Liang Hou and Ting-Gin Chen, “An RFID-based Shopping Service System for retailers,” Advanced Engineering Informatics, vol. 25, no. 1, pp. 103–115, 2011.
[45]Kirk H.M. Wong, Patrick C.L. Hui and Allan C.K. Chan, “Cryptography and authentication on RFID passive tags for apparel products,” Computers in Industry, vol. 57, no. 4, pp. 342–349, 2006.
[46]W.K. Wong, S.Y.S. Leung, Z.X. Guo, X.H. Zeng and P.Y. Mok, “Intelligent product cross-selling system with radio frequency identification technology for retailing,” International Journal of Production Economics, vol. 135, no. 1, pp. 308–319, 2012.
[47]W. Wen, “An intelligent traffic management expert system with RFID technology,” Expert Systems with Applications, vol. 37, no. 4, pp. 3024–3035, 2010.
[48]Keith E. Mayes, Konstantinos Markantonakis and Gerhard Hancke, “Transport ticketing security and fraud controls,” Information Security Technical Report, vol. 14, no. 2, pp. 87–95, 2009.
[49]Ilias P. Vlachos, “A hierarchical model of the impact of RFID practices on retail supply chain performance,” Expert Systems with Applications, vol. 41, no. 1, pp. 5–15, 2013.
[50]Jinpeng Xu, Wei Jiang, Gengzhong Feng and Jun Tian, “Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain,” European Journal of Operational Research, vol. 221, no. 1, pp. 213–221, 2012.
[51]Szu-Min Yang, Yu-Yi Chen and Jinn-Ke Jan, “The study of anti-counterfeiting RFID certificate-The implementation on athletic games,” National Chung Hsing University, 2011.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top