透過您的圖書館登入
IP:18.217.73.187
  • 學位論文

RFID發展私密性應用之研究

A Study on Development of RFID Security Application

指導教授 : 蕭進松
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在RFID的應用上,其電子標籤是採用電子數據的方式,可以反覆的覆寫並且回收使用,因此在新增、修改、刪除儲存資料的功能,沒有使用次數的限制,可以使用數十萬次甚至數百萬次以上。此外,不需要透過接觸即可利用讀取器(Reader)讀取電子標籤(Tag)的訊號資訊,針對讀取一至多個標籤,選擇處理資料是否寫入標籤。然而這些卻可能使RFID的安全性備受爭議。因為Tag具有重覆讀取的特性,因此如果處理不當,客戶的隱私可能遭受到侵犯,故隱私與安全已經成為RFID技術發展的重點。所以如何在公眾中建立對該項技術的理解和信任感,並讓消費者確信資料和交易是可靠的,已是無法迴避的問題。因此本文的研究目的在於探討RFID的有效認證機制,防止企業在導入RFID的過程中,造成使用者在資訊傳輸或是標籤使用後個人隱私遭受侵犯,以保護個人隱私資料外露及防止個人遭到追蹤,達到RFID資訊安全的目標。

並列摘要


The application of Radio Frequency Identification (RFID) systems utilizes labels which are equipped with a small tag containing an electronic product code that allows the embedded data to be transmitted. The RFID tag can be read by a RFID reader from a distance, and it can be used repetitively. Once the data is read, it allows the stored data in the tag to be transmitted and processed in various ways such as add, modify or delete at a host computer.The characteristic of unlimited access to the tag by the readers leads to potential security and privacy issues. If such technology is misused, it may cause violation to consumer right and privacy. Due to the lack of security and unlimited access by RFID readers, the privacy of the consumer might be violated.Thus, developing better security systems and protecting user privacy has become a research focus in RFID technology.How to establish both understanding and trust among consumers regarding the use of such technology,and how to convince consumers that each transaction is secured? These are inevitable concerns from all.Therefore,the purpose of this research is to discuss an effective implementation of RFID systems in a corporation focusing on preventing data loss during transmission processes, avoiding violation of personal privacy,protecting personal information from being stolen or tracked,and achieve a secured information process in RFID systems.

參考文獻


[16] 廖啟男, “淺談無線射頻辨識系統技術,”產經資訊, 2007.
[3] [Online].Available:
[18] D. Henrici and P. Müller, “Tackling Security and Privacy Issues in Radio Frequency Identification Devices,” Security in Pervasive Computing, LNCS 3001, pp. 219-224, 2004.
[20] H.Y. Chien and C. H. Chen,“Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards,” Computers Standards & Interfaces. Vol.29, pp. 254-259, 2007.
參考文獻

延伸閱讀