透過您的圖書館登入
IP:3.135.195.249
  • 學位論文

RFID相互鑑別及多功能機制之研究

The Study of Mutual Authentication and Multi-Contents Mechanism for RFID System

指導教授 : 曹世昌 林詠章
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


全球最大零售業Wal-Mart,在導入RFID(Radio Frequency Identification)後,全球供應商,皆致力EPC(Electronic Product Code)產品研發。RFID具有壽命長、安全性高、不受環境限制等的優點,藉由導入RFID EPC,可以達到節省人力成本、快速物流管理、降低人為訂單、減少多餘存貨等的好處。此篇論文是要探討在RFID EPC Class 1 Generation 2下的安全問題。由於RFID的資訊是藉由無線來傳輸的,資訊有可被擷取的安全問題。為了保護資料的安全性,許多學者紛紛提出他們的方法來改善。本論文針對Duc、Chien及相關作者所提出的方案,加以延伸,並提出更具效率的協定。 然而,過去的RFID機制都只建構在單一環境下,也就是說只為單一功能而設計,因為過去的方案是將一個功能的驗證金鑰,分別存在tag端及server端。如果要再增加新的功能,必須在tag端及server端再存一把驗證金鑰,這將對tag端造成記憶體空間上的負擔。本篇論文另外針對這個問題,提出一個多功能的RFID解決方案,這個機制可以將tag動態地加入或移除不同功能。Tag可以選擇想要加入的功能,並且當tag端想要將功能移除,或server端想要將使用者移除時,能夠很自由地隨時移除。而且,我們的方案只需在tag端及server端分別存一把驗證金鑰。這將不會造成tag端記憶體空間的不足,或者是server端的大量計算。

並列摘要


After the world’s largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints. RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made orders, and decreasing excess inventory. The thesis is to explore the security issues of the RFID EPC Class 1 Generation 2. RFID transmits information wirelessly, and therefore information can be captured. In order to protect data privacy, many scholars have proposed their own ways to improve. This thesis has extended the scheme of Duc et al., and made a more efficient version. However, previously in radio frequency identification (RFID), a single RFID tag is only one purpose. Since previous scheme to achieve multi-contents needs one purpose stored one key in tag and in server, otherwise there will be security issues. In this thesis, we propose a multi-contents RFID tags scheme and it is can be dynamic join-and-leave. In our scheme, tag can choice adding different proposes in multiple applications. Moreover, just authorized tags can be accessed. Our scheme is capable of applying multi-contents tags, and we just need to store one key in tag. Our approach will not cause the large computations of the server.

參考文獻


[1] S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and privacy, aspects of low-cost radio frequency identification systems,” Lecture Notes in Computer Science - Security in Pervasive Computing 2003, vol. 2802, pp. 50–59, 2004.
[4] G. Avoine, E. Dysli, and P. Oechslin, “Reducing time complexity in RFID systems,” Lecture Notes in Computer Science - Selected Areas in Cryptography 2006, vol. 3897, pp. 291–306, 2006.
[5] Advanced Encryption Standard. FIPS 197, NIST, 2001.
[6] M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong authentication for RFID systems using the AES algorithm,” Lecture Notes in Computer Science - Cryptographic Hardware and Embedded Systems - CHES 2004, vol. 3156, pp. 357–370, 2004.
[7] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. 1997.

延伸閱讀