透過您的圖書館登入
IP:3.15.179.121
  • 期刊

具身分鑑別的RFID所有權移轉

RFID Ownership Transfer with User Authentication

摘要


無線射頻識別系統(Radio Frequency Identification;RFID)由於成本低並具有遠距離自動辨識的能力已逐漸取代傳統條碼,然而透過空氣傳輸的訊息容易遭到竊聽、攔截、竄改,產生安全與隱私的問題;隨著RFID的普及,嵌有RFID標籤的物品在其生命週期內可能會進行多次的所有權轉移,更需要考慮到新舊擁有者的隱私保護。既有文獻提出的RFID所有權移轉協定多只鑑別標籤,而未鑑別標籤的持有者是否為其合法的擁有者。本論文將分析既有文獻並針對2011年Song與Mitchell的協定提出改善,避免其假冒攻擊、向前安全性與阻斷服務攻擊問題,並加入擁有者的身分鑑別,使其可應用於高安全需求的環境。

並列摘要


Due to its low cost and remote automatic identification ability, RFID (Radio Frequency Identification) is taking the place of barcodes. However, the information transmitted in the air could easily be eavesdropped, interrupted or modified due to its radio transmission nature. The issues of security and privacy are thus raised. With the popularity of RFID, objects embedded with tags can be transferred to new owners for many times during their life cycle. The privacy protection of the new owner and the old owner should be addressed. Existing RFID ownership transfer protocols usually authenticate the tag, while not verifying whether the holder is the legal owner of the tag.This paper analyzes existing literature and then proposes protocols which free Song and Mitchell's protocols from attacks of spoofing, forward security and denial of service. Furthermore, user authentication is designed to enhance security. Therefore, the improved protocols could be applied in environments that require a high level of security.

並列關鍵字

RFID Security Privacy Ownership Transfer

參考文獻


Cai, S.,Li, Y.,Li, T.,Deng, R.(2009).Attacks and improvements to an RFID mutual authentication protocol and its extensions.Second ACM Conference on Wireless Network Security (WiSec '09).(Second ACM Conference on Wireless Network Security (WiSec '09)).
Chen, C.L.,Chien, C.F.(2013).An ownership transfer scheme using mobile RFIDs.Wireless Personal Communications.68(3),1093-1119.
Chen, C.L.,Lai, Y.L.,Chen, C.C.,Deng, Y. Y.,Hwang, Y.C.(2011).RFID ownership transfer authorization systems conforming EPCglobal Class-1 Generation-2 standards.International Journal of Network Security.12(3),221-228.
Duc, D.N.,Kim, K.(2010).Defending RFID authentication protocols against DoS attacks'.Computer Communications.34(3),384-390.
Erguler, I.,Anarim, E.(2010).Scalability and security conflict for RFID authentication protocols.Wireless Personal Communications.59(1),43-56.

延伸閱讀