Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19641
標題: RFID交互驗證機制之改善
An Improved Mutual Authentication Scheme for RFID Systems
作者: 張軫益
Chang, Chen-Yi
關鍵字: Authentication
驗證
RFID
security
privacy
hash
RFID
安全
隱私
赫序
出版社: 資訊科學與工程學系所
引用: 1. 日經BP社。2004。RFID技術與應用。初版,190-194。台北:旗標。 2. 電子工程專輯。2005。RFID將成為最21世紀流行的電子智慧技術。網址:http:// www.eettaiwan.com/。上網日期:2001-02-12。 3. 國立台灣大學計算機及資訊網路中心。2007。RFID原理與應用。網址: http://www.cc.ntu.edu.tw/chinese/epaper/0002/20070920_2005.htm。上網日期:2007-09-20。 4. 賴溪松,韓亮,張真誠, “近代密碼學及其應用”,松崗電腦圖書資料股份有限公司,ISBN: 9572219537。 5. 黃麗芳,2005,RFID訊息安全傳送之研究,碩士論文,台北:國防大學國防管理學院國防資訊所。 6. 李秀香,2007,RFID 於交互驗證之安全性及其應用之研究,碩士論文,台中:國立中興大學資訊科學研究所。 7. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography, volume 6 of Discrete Mathematics and Its Applications. CRC Press, 1996. 8. ActiveWAVE. Advantages of RFID.www.activewaveinc.com/technology rfid advantage.html. 9. A. Henrici and P. M¨uller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security — PerSec 2004, pages 149–153, Orlando, Florida, USA, March 2004. IEEE Computer Society. 10. B. Glover and H. Bhatt. RFID Essentials. O’Reilly, 2006. 11. C. Mitchell, B. Song,“RFID authentication protocol for low-cost tags”, “First ACM Conference on Wireless Security”, WiSec 2008, pp.40-147, 2008. 12. C. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security — ICICS ’06, volume 4307 of Lecture Notes in Computer Science, pages 1–20, Raleigh, North Carolina, USA, December 2006. Springer-Verlag. 13. CCS, pages 210–219, Washington, DC, USA, October 2004. ACM Press. 14. D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security — ACM 15. D . Knuth, "The art of computer programming : semi numerical algorithm," vol.2 , Addison-Wesley , 2nd ed., 1981 . 16. D. N. Duc, J. Park, H. Lee, and K. Kim. Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning. In Symposium on Cryptography and Information Security — SCIS 2006, Hiroshima, Japan, January 2006. The Institute of Electronics, Information and Communication Engineers. 17. EPCglobal Inc., http://www.epcglobalinc.org/ 18. EPCglobal class 1 gen 2 RFID specification. Whitepaper, Alien Technology-RFID products & technologyfor new supply chain efficiency, visibility & security,2005.www.alientechnology.com/docs/AT wp EPCGlobal WEB.pdf. 19. EPCGlobal, “Guidelines on EPC for Consumer Products”, http://www.epcglobalinc.org/public/ppsc_guide/. 20. G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography — SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 291–306, Kingston, Canada, August 2005. Springer-Verlag. 21. Hyangjin Lee, Jeeyeon Kim, "Privacy Threats and Issues In Mobile RFID", ares, On page(s): 510-514, First International Conference on Availability, Reliability and Security (ARES''06), 2006. 22. H. Chien and C. Chen. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254–259, February 2007. 23. H. Lee, J. Yang, and K. Kim. Enhanced mutual authentication protocol for low-cost RFID. White Paper WP-HARDWARE-031, Auto-ID Labs, 2006. 24. K. Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. Wiley, 2nd edition, 2003. 25. Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita, “RFID Privacy Issues andTechnical Challenges”, Communications of the ACM, Volume 48 , Issue 9 (September 2005). 26. M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch. From identification to authentication — a review of RFID product authentication techniques. In Printed handout of Workshop on RFID Security — RFIDSec 2006, 2006. 27. M. Ohkubo, K. Suzki, and S. Kinoshita. Cryptographic approach to “privacy-friendly” tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003. http://www.rfidprivacy.us/2003/agenda.php. 28. R. D. Pietro and R. Molva. Information confinement, privacy, and security in RFID systems. In J. Biskup and J. Lopez, editors, European Symposium Research Computer Security — ESORICS 2007, volume 4734 of Lecture Notes in Computer Science, pages 187–202, Dresden, German, September 2007. Springer-Verlag, Berlin. 29. S. Karthikeyan and N. Nesterenko. RFID security without extensive cryptography. In Workshop on Security of Ad Hoc and Sensor Networks — SASN ’05, pages 63–67, Alexandria, Virginia, USA, November 2005. ACM Press. 30. T. Dimitriou. A lightweight RFID protocol to protect against traceability and cloning attacks. In Conference on Security and Privacy for Emerging Areas in Communication Networks — SecureComm, pages 59–66, Athens, Greece, September 2005. IEEE. 31. T. Le, M. Burmester, and B. Medeiros. Forward-secure RFID authentication and key exchange. Cryptology ePrint Archive Report 2007/051, IACR, 2007. 32. William Stallings, Network And Internetwork Security Principles And Practice, Prentice Hall International Edition, pp.1-14, 1995. 33. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum, “The Evolution of RFID Security”, IEEE Pervasive Computing, Volume 5, no. 1, On page(s): 62-69, Jan-Mar, 2006. 34. Stinson, D. R., Cryptography Theory and Practice, CRC Press, 1995. 35. Lan Zhang, Huaibei Zhou, Ruoshan Kong, Fan Yang, “An Improved Approach to Security and Privacy of RFID Application System”, Wireless Communications, Networking and Mobile Computing, 2005. Volume 2, On page(s): 1195- 1198. Digital Object Identifier: 10.1109/WCNM.2005.1544256
摘要: RFID (Radio Frequency Identification,RFID)有著無線辨識的特性,應用層面可包含各行各業,包括美國政府、美國連鎖超市巨擘沃爾瑪(Wal-Mart)、各機場和航空公司,都想利用RFID的方便性來改善作業,RFID的識別標籤目前是愈作愈小,其可發展之潛能是愈來愈大,使得國內外各產業都非常關注RFID的相關運用與發展,現今舉凡物流、零售、運輸、醫療、追蹤、安全等等都可應用RFID,而RFID的鐵三角(Server、Reader、Tag)之間是以無線射頻做為溝通運作,之間的相互驗證是尤其重要,本論文針對Mitchell 和Song 兩位學者(後續簡稱MS)於2008年所提出的驗證機制[11]進行研究和改進。 早期有許多學者研究於RFID驗證機制,但都無法有效的達到安全性的需求。2008年,MS學者提出更新穎的RFID驗證機制,但我們發現MS的方法雖然改進了RFID驗證機制安全性不足的缺點,卻仍然無全面性驗證的機制。因此,本研究基於改善MS安全性上的弱點,提出新的RFID驗證機制,以改善MS安全性上的弱點。
RFID (Radio Frequency Identification) systems, having wireless characteristics, have many applications, including all trades and professions such as Wal-Mart, airports and airlines. The tags of RFID are made at present very small. Domestic and international companies pay very close attention to the relevant applications and development of RFID. The mutual authentication among the iron trigonometry (server, reader, tag) of a RFID system is very important. In 2008, Mitchell and Song put forward a novel RFID authentication mechanism [11]. In this thesis, we improve its efficiency and enhance its function to allow mutual authentication between the server and the reader.
URI: http://hdl.handle.net/11455/19641
其他識別: U0005-2207200914593900
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-2207200914593900
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.