Please use this identifier to cite or link to this item:
標題: 一個安全且有多個擁有者的RFID協定並提供所有權轉移的功能
A Secure Multi-Owner RFID Protocol with Ownership Transfer
作者: 蔡欣叡 
Tsai, Hsin-Ruey 
關鍵字: RFID;安全;有權轉移
出版社: 資訊科學與工程學系所
引用: [1] C. Berbain, O. Billet, J. Etrog, and H. Gilbert. “An efficient forward private RFID protocol,” In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), pp. 43-53, 2009. [2] S. Cai, Y. Li, T. Li, R. Deng, “Attacks and improvements to an RFID mutual authentication protocol and its extensions,” in: Second ACM Conference on Wireless Network Security - WiSec'09, ACM Press, Zurich, Switzerland, pp. 51-58, 2009. [3] H.-Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, October-December 2007. [4] P. D'Arco and A. De Santis, “On ultralightweight RFID authentication protocols,” IEEE Transactions Dependable and Secure Computing, vol. 8, no. 4, pp. 548-563, July-August 2011. [5] I. Erguler, E. Anarim, “Security flaws in a recent RFID delegation protocol” in Springer-Verlag London Limited 2011. [6] X.L.Jia, Q.Y.Feng and C.Z.Ma, “An efficient anti-collision protocol for RFID tag identification,” IEEE Communications Letters, vol.14, no.11, pp.1014-1016, 2010. [7] G. Kapoor and S. Piramuthu, “Vulnerabilities in some recently proposed rfid ownership transfer protocols,” IEEE Communications Letters, vol. 14, no. 3, pp.260-262, March 2010. [8] G. Kapoor, W. Zhou, S. Piramuthu, “Multi-item and multi-owner RFID ownership transfer in supply chains,” Decision Support Systems 52 (1) 258-270, 2011. [9] K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer,” in Computational Intelligence and Security, International Conference on vol. 2, pp.1090-1095, 2006. [10] P, Peris-Lopez, J.C, Hernandez-Castro, J.M., Estevez-Tapiador, and A., Ribagorda, “Vulnerability analysis of RFID protocols for tag ownership transfer”, Computer Networks, vol. 54, issue 9, pp.1502-1508, June 2010. [11] P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, “Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags,” IEEE Communications Letters, vol. 13, no. 4, pp.274-276, April 2009. [12] B. Song, “RFID Tag Ownership Transfer.” 4th Workshop on RFID Security (RFIDsec 08). Budaperst, Hungary, July 2008. [13] B. Song and C. J. Mitchell, “RFID authentication protocol for low-cost tags.” WiSec, pp.140-147, 2008. [14] B. Song and C. J. Mitchell, “Scalable RFID Security Protocols supporting Tag Ownership Transfer.” Computer Communications, vol. 34, issue 4, pp.556-566, April 2011. [15] E.-J, Yoon, K.-Y, Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer.” IFIP International Conference on Network and Parallel Computing, pp.68-73, 2008.
Radio Frequency Identification (RFID)技術已經被廣泛的應用於我們的日常生活當中。安全性、效率和擴充性是一個RFID系統中的三大主要元素,而已經有許多學者提出了一個所謂安全的RFID系統所必須擁有的條件。隨著RFID系統日漸發展,人們所需要的功能也越來越多。尤其是當兩家不同的公司打算合作時,他們所用有的RFID標籤該如何做結合,更是一大問題。在這篇論文之中,我們所提出的RFID協定不只是達到了傳統所要求的一些安全需求,我們更提出了一個全新的所有權分享概念來解決這個問題。因此,藉著執行我們的RFID協定,讓一個RFID標籤同時屬於多個不同的擁有者是可行的。我們所提出的協定不只是有好個安全性,更平衡了效率和擴充性。

Radio Frequency Identification (RFID) technology has been used widely in our lives. Security, efficiency and scalability become three major factors of an RFID protocol. As RFID technology evolving, more and more functions are needed in RFID protocols. Especially when two companies intend to cooperate with each other, combining two companies' RFID tags is a problem. In this thesis, we propose a protocol which not only achieves traditional security requirements but also solves this problem through a novel concept of ownership sharing. Therefore, by implementing the proposed protocol, a tag with multi-owner is feasible. Furthermore, the proposed protocol not only has good security but also balances between efficiency and scalability.
Appears in Collections:資訊科學與工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.