透過您的圖書館登入
IP:18.217.194.39

並列摘要


Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protocol cannot resist replay attacks, and there- fore an adversary can impersonate a legal tag. Next, we present a full-disclosure attack on the CWH protocol. By sending malicious queries to a tag and collecting the response messages emitted by the tag, the full-disclosure attack allows an adversary to extract the secret information from the tag.

並列關鍵字

Authentication privacy RFID

被引用紀錄


蘇冠賓(2009)。回收補貼下綠色產品的營收管理〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200900025
楊欣怡(2011)。探討RFID科技化服務創新:任務 ─ 科技配適度觀點〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-1511201215471935

延伸閱讀