Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19427
標題: 無所不在運算環境中位置驗證之研究
A Study of Location Authentication in Ubiquitous Computing Environments
作者: 陳世育
Chen, Shih-Yu
關鍵字: ubiquitous computing
無所不在運算
RFID
Mobile RFID
location authentication
RFID
Mobile RFID
位置驗證
出版社: 資訊科學系所
引用: [1] F. Stajano, “Security for Ubiquitous Computing,” 2002. [2] S. Brands and D. Chaum, “Distance-bounding protocols,” In proceedings of Advances in Cryptology-EUROCRYPT'93, Lecture Notes in Computer Science, Vol.765, Springer-Verlag Berlin Heidel berg, 1994, pp.344-359. [3] S. Capkun, L. Buttyan, and J. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” In proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003, pp.21-32. [4] D. Denning and P. MacDoran, “Location-Based Authentication: Grounding Cyberspace for better Security,” In Computer Fraud and Security, Elsevier, 1996, pp.12-16. [5] M. Fujii, “Secure Positioning of Mobile Terminals with Simplex Radio Communication,” http://arxiv.org/PS_cache/cs/pdf/0608/0608031.pdf. [6] S. Knappe, V. Gerginov, P.D.D. Schwindt, V. Shah, H.G. Robinson, L. Hollberg, and J. Kitching, “Atomic vapor cells for chip-scale atomic clocks with improved long-term frequency stability,” Optics Letters, Vol.30, no.18, Sep.2005, pp.2351-2353. [7] H. Lee and J. Kim, “Privacy threats and issues in Mobile RFID,” In proceedings of the First International Conference on Availability, Reliability and Security, 2006, pp.510-514. [8] T.S.E. Ng and H. Zhang, “Predicting Internet Network Distance with Coordinates-Based Approached,” IEEE INFOCOM, Vol.1, 2002, pp.170-179. [9] D. Singelee and B. Preneel, “Location verification using secure distance bounding protocols,” IEEE Mobile Adhoc and Sensor Systems Conference, Nov.2005, pp.834-840. [10] N. Sastry, U. Shankar and D. Wagner, “Secure verification of location claims,” In proceedings of the ACM workshop on Wireless security, Sep.2003, pp.1-10. [11] A. Vora and M. Nesterenko, “Secure location verification using radio broadcast,” In proceedings of OPODIS 2004, Lecture Notes in Computer Science, Vol.3544, Springer-Verlag Berlin Heidelberg, 2005, pp.369. [12] M. Weiser, “The Computer for the Twenty-First Century,” Scientific American, Sep. 1991, pp.94-100. [13] RFID Journal, “Merloni unveils RFID appliance,” http://www.rfidjournal.com/article/articleview/369/1/1, April, 2003. [14] RFID Journal, “Nokia unveils RFID Phone Reader,” http://www.rfidjournal.com/article/articleview/834/1/1, March, 2004. [15] A. Shamir. How to share a secret, Communication ACM, Vol.22, 1979, pp.612-613. [16] S. Sarma, D. Brock, D. Engels, “Radio frequency identification and the electronic product code,” IEEE Micro, Vol.21, Issue 6, Nov./Dec.2001, pp.50-54. [17] K.V.S. Rao, “An overview of backscattered radio frequency identification system(RFID),” IEEE Asia Pacific Microwave Conference, Vol.3, 1999, pp.746-749. [18] G. Marrocco, “Gain-optimized self-resonant meander line antennas for RFID applications,” IEEE Antennas and Propagation Letters, Vol.2, 2003, pp.302-305. [19] S. Molesa, D.R. Redinger, D.C. Huang, and V. Subramanian, “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications,” In proceedings of Materials Re-search Society Spring Meet, H8.3.1-6, Vol.769, 2003. [20] G. Marrocco, A. Fonte, F. Bardati, “Evolutionary design of miniaturized meander-line antennas for RFID applications,” IEEE Trans. Antennas and Propagation, Vol.2, 2002, pp.362-365. [21] M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” presented at 4th International Conference on Ubiquitous Computing, 2002. [22] L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Pervasive Computing Environment,” IEEE Computer, 2001.
摘要: 由於整個資訊網路的發展,將形成一個無所不在運算環境。而在此環境底下,將會出現許多憑藉著使用者的位置資訊來提供服務的服務。因此位置資訊在無所不在運算環境中可當作存取權限的一種驗證方式。但在此環境中,由於使用者具有移動性,使得驗證使用者的位置也變的越來越困難。而先前的文獻中,大多採用相對距離的觀念來達成位置驗證的工作。因此我們提出了使用RFID的一種新應用架構-Mobile RFID來建構整個環境並採用絕對距離的觀念來達成位置驗證的目的。而且我們的方式確保了使用者在等待驗證的期間仍在伺服器所能驗證的距離範圍內,同時在建構整個環境時只需耗費較少的資源,也較不受環境限制的影響更加的實用。
Ubiquitous computing environments result from the development of information network. Plenty of services which offer services by means of the locations of users appear in this environment. Therefore, location information can serve as an authentication means in ubiquitous computing environments. However, it is harder and harder to authenticate users' locations because users are movable in this environment. According to previous technical literature, many previous studies were done by using the concept of relative distance to achieve location authentication. We offer a new applied framework using RFID, Mobile RFID, to build the whole environment and make use of the concept of absolute distance to achieve the goal of location authentication. In addition, our method ensures that users are still in the distance for servers to authenticate when waiting for authentication. Moreover, building the whole environment consumes fewer resources, and is less influenced by environment limitations and hence more practical.
URI: http://hdl.handle.net/11455/19427
其他識別: U0005-1107200718214200
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-1107200718214200
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.