Please use this identifier to cite or link to this item:
標題: 一種RFID的標籤擁有者轉換之安全協定-適用於零售通路商品與售後服務
A Tagged Product's Ownership Transfer Mechanism used in Retailer and Post-sales Service
作者: 陳昱潭
Chen, Yu-Tan
關鍵字: RFID;無線射頻識別認證;Ownership Transfer;Tag;擁有者轉換;電子標籤
出版社: 資訊科學與工程學系所
引用: [1]Alexander Ilic, Florian Michahelles, Elgar Fleisch,“Access Management for Shared Item Information in RFID-enabled Supply Chains”, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007. [2]C.M. Roberts, “Radio frequency identification (RFID), “Computers & Security, vol.25, pp.18-26, 2006. [3]Doo Ho Choi, Tae Sung Kim, Ho Won Kim, “Privacy Protection for Secure Mobile Service”, 2006 1st International Symposium on Wireless Pervasive Computing, 16-18 Jan. 2006. [4]Hyangjin Lee and Jeeyeon Kim, “Privacy threats and issues in mobile RFID”, The First International Conference on Availability, Reliability and Security, 20-22 April 2006. [5]Hong Lei and Tianjie Cao, “RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks”, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), 1-3 Nov. 2007, pp.508 - 510. [6]H.G Lee and J.Y Kim, “Privacy threats and issues in mobile RFID”, Proceedings of the First International Conference on Availability, Reliability and Security, 2006. [7]Juels, “RFID Security and Privacy: A Research Survey”, IEEE -Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006. [8]M.J.B Robshaw, “An overview of RFID tags and new cryptographic developments”, information security technical report II, 2006, pp.82-88 [9]Yingjiu Li and Xuhua Ding, “Protecting RFID Communications in Supply Chains”, Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS ''07) , 2007 , pp.234-241. [10]Youngjoon Seo, Tomoyuki Asano, Hyunrok Lee, Kwangjo Kim, “A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags”, The 2007 Symposium on Cryptography and Information Security, 2007. [11]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki and Osamu Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, 2006 International Conference on Computational Intelligence and Security, Volume 2, 3-6 Nov. 2006, pp.1090-1095. [12]K.H.S. Sabaragamu Koralalage, S. Mohammed Reza, J. Miura, Y. Goto, and J. Cheng, “POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism”, Proceedings of the 2007 ACM symposium on Applied computing(SAC ''07), 2007, pp.270-275. [13]Kim, Il Jung, Choi, Eun Young; Lee, Dong Hoon, “Secure Mobile RFID system against privacy and security problems”, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007, pp.67-72 [14]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, International Conference on Computational Intelligence and Security, 2006. [15]Soo-CheolKim, Sang-Soo Yeo and Sung Kwon Kim, “MARP:Mobile Agent for RFID Privacy Protection”, 7th Smart Card Research and Advanced Application IFIP Conference, 2006. [16]S.Shepard, “RFID-Radio Frequency Identification”, The McGraw-Hill companies, 2005. [17]S.Garfinkel,“An RFID Bill of Rights”, Technology Review, pp.35,October, 2002. [18]N.C. Wu, M.A. Nystrom, T.R. Lin, H.C. Yu, “ Challenges to global RFID adoption” , Technology Management for the Global Future, 2006. [19]EPCglobal , [20]EPCglobal TAIWAN, [21]EPCglobal, ,“EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.1.0” , Tech.Rep., January 2007 [21]White Paper: RFID Basics for Retailers,
在本篇論文中我們提出適用於零售通路商品的無線射頻識別認證(RFID)電子標籤擁有者轉換(Ownership Transfer)協定,我們的設計是參考2006年Choi等人提出的商品電子標籤擁有者轉換協定[3],choi的協定是適用在零售商販賣商品到消費者的電子標籤擁有者轉換,然而在他們的設計無法完全保障消費者隱私,因此我們提出一個全新的設計來達成更安全的商品電子標籤擁有者轉換。我們的協定不但可適用於零售商通路,更擴展至消費者售後服務。

In 2007, choi et al.'s has proposed a ownership transfer mechanism [3]. We find that the privacy of customers cannot be guaranteed in their scheme. Therefore, we propose a new design to overcome the privacy problem. Our ownership transfer mechanism is not only used in transaction but also extended for post-sale service. Our proposal contributes a practical protocol that meets all important issues: anonymity, secure ownership transfer, tag's access control, tag's untraceability, simplicity.
其他識別: U0005-0707200821290700
Appears in Collections:資訊科學與工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.