Please use this identifier to cite or link to this item:
DC FieldValueLanguage
dc.contributor.authorTsai, Hsin-Rueyen_US
dc.identifier.citation[1] C. Berbain, O. Billet, J. Etrog, and H. Gilbert. “An efficient forward private RFID protocol,” In Proceedings of the 16th ACM conference on Computer and communications security (CCS '09), pp. 43-53, 2009. [2] S. Cai, Y. Li, T. Li, R. Deng, “Attacks and improvements to an RFID mutual authentication protocol and its extensions,” in: Second ACM Conference on Wireless Network Security - WiSec'09, ACM Press, Zurich, Switzerland, pp. 51-58, 2009. [3] H.-Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, October-December 2007. [4] P. D'Arco and A. De Santis, “On ultralightweight RFID authentication protocols,” IEEE Transactions Dependable and Secure Computing, vol. 8, no. 4, pp. 548-563, July-August 2011. [5] I. Erguler, E. Anarim, “Security flaws in a recent RFID delegation protocol” in Springer-Verlag London Limited 2011. [6] X.L.Jia, Q.Y.Feng and C.Z.Ma, “An efficient anti-collision protocol for RFID tag identification,” IEEE Communications Letters, vol.14, no.11, pp.1014-1016, 2010. [7] G. Kapoor and S. Piramuthu, “Vulnerabilities in some recently proposed rfid ownership transfer protocols,” IEEE Communications Letters, vol. 14, no. 3, pp.260-262, March 2010. [8] G. Kapoor, W. Zhou, S. Piramuthu, “Multi-item and multi-owner RFID ownership transfer in supply chains,” Decision Support Systems 52 (1) 258-270, 2011. [9] K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer,” in Computational Intelligence and Security, International Conference on vol. 2, pp.1090-1095, 2006. [10] P, Peris-Lopez, J.C, Hernandez-Castro, J.M., Estevez-Tapiador, and A., Ribagorda, “Vulnerability analysis of RFID protocols for tag ownership transfer”, Computer Networks, vol. 54, issue 9, pp.1502-1508, June 2010. [11] P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, “Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags,” IEEE Communications Letters, vol. 13, no. 4, pp.274-276, April 2009. [12] B. Song, “RFID Tag Ownership Transfer.” 4th Workshop on RFID Security (RFIDsec 08). Budaperst, Hungary, July 2008. [13] B. Song and C. J. Mitchell, “RFID authentication protocol for low-cost tags.” WiSec, pp.140-147, 2008. [14] B. Song and C. J. Mitchell, “Scalable RFID Security Protocols supporting Tag Ownership Transfer.” Computer Communications, vol. 34, issue 4, pp.556-566, April 2011. [15] E.-J, Yoon, K.-Y, Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer.” IFIP International Conference on Network and Parallel Computing, pp.68-73, 2008.zh_TW
dc.description.abstractRadio Frequency Identification (RFID)技術已經被廣泛的應用於我們的日常生活當中。安全性、效率和擴充性是一個RFID系統中的三大主要元素,而已經有許多學者提出了一個所謂安全的RFID系統所必須擁有的條件。隨著RFID系統日漸發展,人們所需要的功能也越來越多。尤其是當兩家不同的公司打算合作時,他們所用有的RFID標籤該如何做結合,更是一大問題。在這篇論文之中,我們所提出的RFID協定不只是達到了傳統所要求的一些安全需求,我們更提出了一個全新的所有權分享概念來解決這個問題。因此,藉著執行我們的RFID協定,讓一個RFID標籤同時屬於多個不同的擁有者是可行的。我們所提出的協定不只是有好個安全性,更平衡了效率和擴充性。zh_TW
dc.description.abstractRadio Frequency Identification (RFID) technology has been used widely in our lives. Security, efficiency and scalability become three major factors of an RFID protocol. As RFID technology evolving, more and more functions are needed in RFID protocols. Especially when two companies intend to cooperate with each other, combining two companies' RFID tags is a problem. In this thesis, we propose a protocol which not only achieves traditional security requirements but also solves this problem through a novel concept of ownership sharing. Therefore, by implementing the proposed protocol, a tag with multi-owner is feasible. Furthermore, the proposed protocol not only has good security but also balances between efficiency and scalability.en_US
dc.description.tableofcontents摘要 i Abstract ii Index iii Figure Index iv Table Index v 1. Introduction 1 2. Preliminaries 4 2.1 Assumptions 4 2.2 Requirements of RFID Systems 5 2.3 Multi-Owner for each RFID tag 8 3. Review of RFID Security Protocols 10 4. The Proposed Protocol. 13 4.1 Initialization phase 13 4.2 Authentication phase 15 4.3 Ownership transfer phase 19 4.4 Ownership sharing phase 23 5. Security Analysis and Performance Comparison 25 5.1 Security Analysis 25 5.2 Performance Comparison 30 6. Conclusion 35 Reference 36zh_TW
dc.titleA Secure Multi-Owner RFID Protocol with Ownership Transferen_US
dc.typeThesis and Dissertationzh_TW
item.openairetypeThesis and Dissertation-
item.fulltextno fulltext-
Appears in Collections:資訊科學與工程學系所
Show simple item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.