Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19394
DC FieldValueLanguage
dc.contributor孫宏民zh_TW
dc.contributorHung-Min Sunen_US
dc.contributor李維斌zh_TW
dc.contributor賈昆芳zh_TW
dc.contributorWei-Bin Leeen_US
dc.contributorKuen-Fang Jeaen_US
dc.contributor.advisor洪國寶zh_TW
dc.contributor.advisorGwo-Boa Horngen_US
dc.contributor.author洪斐瑤zh_TW
dc.contributor.authorHung, Fei-Yauen_US
dc.contributor.other中興大學zh_TW
dc.date2007zh_TW
dc.date.accessioned2014-06-06T07:06:40Z-
dc.date.available2014-06-06T07:06:40Z-
dc.identifierU0005-2806200616063500zh_TW
dc.identifier.citation[1] Jihoon Myung and Wonjun Lee, “An Adaptive Memoryless Tag Anti-Collision Protocol for RFID Networks.”, the 24th IEEE Annual Conference on Computer Communications (INFOCOM 2005), Poster Session, Miami, USA, March 2005. [2] Shang-Wei Wang, Wun-Hwa Chen, Chrng-Shyong Ong, Li Liu, and Yun-Wen Chuang, “RFID applications in hospitals : a case study on a demonstration RFID project in a Taiwan hospital.”, Proceedings of the 38th Hawaii International Conference on System Sciences 2005. [3] Katina Michael, and Luke McCathie, “The pros and Cons of RFID in Supply Chain Management.”, Mobile Business International Conference, 2005. [4] Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee, “An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification.”, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services pp. 166-174, 2005. [5] Ching Law, Kayi Lee, and Kai-Yeung Siu, “Efficient Memoryless Protocol for Tag Identification.”, In Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75-84, Boston, MA, August 2000. [6] Ho-seung Choi, Jae-Ryong Cha, and Jae-Hyun Kim, “Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.”, Vehicular Technology Conference Page(s):4589 - 4592 Vol. 6, 2004. [7] István Vajda and Levente Buttyán, “Lightweight Authentication Protocols for Low-Cost RFID Tags”, Workshop on Security in Ubiquitous Computing, October 2003. [8] L. Lamport, “Password Authentication with Insecure Communication”, Communications of ACM, Vol. 24, pp. 770-772, 1981. [9] Y. C. Chen and L. Y. Yeh, “An Efficient Nonce-Based Authentication Scheme with Key Agreement”, Applied Mathematics and Computation, Available online 12 January 2005. [10] M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to “Privacy-Friendly” Tags.”, In RFID Privacy Workshop, MIT, USA, 2003. [11] Chi Sung Laih, Lein Harn, and Chin Chen Chang, “Contemporary Cryptography and It’s Applications.” 旗標出版有限公司. [12] H. Vogt., “Multiple Object Identification with Passive RFID Tags.”, Proc. Pervasive 2002.. IEEE International Conference on Systems, Man and Cybernetics, pp. 98-113. October 2002. [13] A. Micic, A. Nayak, D. Simplot-Ryl, I. Stojmenović. ”A hybrid randomized protocol for RFID tag identification.”, in: Sensor Review, to appear, 2006. [14] Jihoon Myung, Wonjun Lee, Jaideep Srivastava, “Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification.”, accepted for publication in ACM Mobile Networks and Applications (ACM MONET), 2006. [15] Ho-Seung Choi, Jae-Ryon Cha, Jae-Hyun Kim, ” Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.” , page(s): 4589- 4592 Vol. 6, Vehicular Technology Conference, 2004. [16] J. I. Capetanakis, “Tree algorithms for packet broadcast channels”, IEEE Trans. Inform. Theory, vol. 25, no. 4, pp. 505--515, Sept. 1979. [17] Chandon, Pierre, Wansink Brian, and Laurent Gilles. “A Benefit Congruency Framework of Sales Promotion Effectiveness,” Journal of marketing. Vol. 64 , pp. 65-81 (October), 2000. [18] R. Bucklin and S. Gupta, "Commercial Use of UPC Scanner Data: Industry and Academic Perspectives," Marketing Science, 1999. [19] Jon Hannibal Stokes, “Understanding Moore''s Law”, Http://arstechnica.com/articles/paedia/cpu/moore.ars , 2003. [20] Sarma, S. Brock, D. Engels, D. “Radio frequency identification and the electronic product code.”, IEEE Micro, Volume: 21, Issue: 6, page(s): 50-54, Nov/Dec 2001. [21] Rao, K.V.S., “An overview of backscattered radio frequency identification system (RFID).”, IEEE Asia Pacific Microwave Conference, Volume: 3, page(s): 746-749, 1999. [22] Marrocco, G., “Gain-optimized self-resonant meander line antennas for RFID applications.”, IEEE Antennas and Propagation Letters, Volume: 2, page(s): 302- 305, 2003. [23] Steven Molesa, David R. Redinger, Daniel C. Huang, and Vivek Subramanian. “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications.”, in Proc. Materials Re-search Society Spring Meet., H8.3.1-6 vol. 769, 2003. [24] Marrocco, G., Fonte, A., Bardati, F., “Evolutionary design of miniaturized meander-line antennas for RFID applications.”, IEEE Trans. Antennas &Propagaion, page(s): 362- 365 vol.2, 2002. [25] Cheng-Ju Li, Li Liu, Shi-Zong Chen, Chi Chen Wu, Chun-Huang Huang, Xin-Mei Chen., “Mobile healthcare service system using RFID.”, IEEE International Conference on Networking, Sensing and Control, page(s): 1014- 1019 Vol.2, 2004. [26] Heather Smith, Benn Konsynski, “Developments in practice X: Radio Frequency Identification (RFID) - An internet for physical objects.”, Communications of the Association for Information Systems (Volume 12) pp.301-311, 2003. [27] Zongwei Luo, Terry Chan, Jenny S. Li, “A Lightweight Mutual Authentication Protocol for RFID Networks.”, IEEE International Conference on e-Business Engineering, 18-20, October 2005. [28] Dimitriou, T., “A lightweight RFID protocol to protect against traceability and cloning attacks.” In Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks, 2005. [29] Gene Tsudik., “Ya-trap: Yet another trivial RFID authentication protocol.” International Conference on Pervasive Computing and Communications, PerCom, 2006. [30] Alrabady, A.I.; Mahmud, S.M., “Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs.”, Vehicular Technology, IEEE Transactions on Volume 54, Issue 1, Page(s):41 – 50, Jan. 2005zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/19394-
dc.description.abstract無線射頻識別 (Radio Frequency Identification),一個存在將近已50年的技術,在近幾年被大家熱烈的討論。在幾乎所有的文獻當中,對於標籤的隱私以及安全性的問題,通常針對於探討資料庫與標籤之間的認證。而隨著標籤的發展,亦使其越來越方便得以寫入訊息。但直至目前為止,在重複寫入標籤的方面似乎還有許多新的想法。在此我們提出了對於讀取裝置的認證並考慮到標籤的資源限制來提出適用於無線射頻識別系統中的認證方式。另外,在目前無線射頻識別系統運作的無線環境中,尚有標籤回應時發生碰撞以致於讀取裝置無法正確無誤確認標籤身分的問題。目前許多的解決方式似乎都還有許多改進的空間。我們在此篇論文中不延續改進先前的解決方式,而是提出了另一種方法來解決此類的問題。我們利用亂數均勻分布且無法預測的性質去達到對讀取裝置的認證以及防止標籤在回應時發生碰撞的目的,並且碰撞機率來分析我們提出的方法。zh_TW
dc.description.abstractRFID (Radio Frequency Identification) technique, which has been existed over 50 years, is discussed extensively at present. Regarding to the privacy and security problem of tags, most schemes discuss the authentication issue between the backend system and tags. In addition, collisions may happen when tags respond to the reader simultaneously so that the reader can not identify tags correctly. There seems to be a lot of places can be improved in the present solutions. In this thesis we take into account the resource constrained of tags and propose a new way to resolve these issues. We achieve the goal of authenticating the reader and preventing the tags collisions by using the uniformed distributed and unpredictable properties of random numbers, and then we analyze our scheme by calculating the probability of the collisions.en_US
dc.description.tableofcontents1Introduction……………………………………………………1 1.1Background andMotivation………………………………1 1.2Contributions……………………………………………3 1.3Thesis Organization……………………………………4 2Preliminary……………………………………………………5 2.1Evolution…………………………………………………5 2.1.1Product-identification…………………………5 2.1.2Specification of RFIDs…………………………6 2.1.3Secrecy in RFID systems………………………8 2.1.4Applications of RFID systems…………………9 2.2Collisions………………………………………………10 2.2.1Collisions in RFID systems……………………10 2.2.2Solutions to the collision problem in RFID systems…10 2.3Authentication……………………………………………12 2.4Hash chain techniques……………………………………14 2.4.1Description…………………………………………14 2.4.2Secrecy………………………………………………15 2.4.3Benefits……………………………………………15 3Related Work……………………………………………………16 3.1Cryptographic Approach to “Privacy-Friendly” Tags...17 3.2Lightweight Authentication protocols for Low-cost RFID tags …21 3.3Efficient Memory less protocol for tag identification………25 3.4An Adaptive Memory less tag Anti-Collision Protocol for RFID Networks .28 4The proposed scheme…………………………………………31 4.1System model and assumptions………………………31 4.2Protocol description…………………………………33 4.3Collision Analysis……………………………………39 4.4Security analysis……………………………………41 5Conclusion……………………………………………………42 Bibliography…………………………………………………43zh_TW
dc.language.isoen_USzh_TW
dc.publisher資訊科學系所zh_TW
dc.relation.urihttp://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2806200616063500en_US
dc.subjectRFID (Radio Frequency Identification)en_US
dc.subject無線射頻識別zh_TW
dc.subjectAuthenticationen_US
dc.subjectanti-collisionen_US
dc.subject身份認證zh_TW
dc.subject碰撞避免zh_TW
dc.titleRFID系統之讀取裝置確認與標籤碰撞避免之研究zh_TW
dc.titleOn RFID Reader Authentication and Tag Anti-Collisionen_US
dc.typeThesis and Dissertationzh_TW
Appears in Collections:資訊科學與工程學系所
文件中的檔案:

取得全文請前往華藝線上圖書館

Show simple item record
 
TAIR Related Article
 
Citations:


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.