透過您的圖書館登入
IP:18.223.160.61
  • 期刊

具隱私保護之RFID雙向鑑別機制

Privacy Protection and Mutual Authentication Scheme for RFID Systems

摘要


無線射頻辨識(RFID)系統已成為製造業、供應鏈管理和零售盤存控制等應用的常見使用工具。不幸地,普遍佈署使用RFID裝置卻可能升高大眾對於隱私與資訊安全的疑慮。本論文利用簡單的互斥或(XOR)運算與雜湊(Hash)函數,提出一個安全的RFID雙向鑑別機制,此方法不僅具備安全防護及個人隱私保護之特性,而且相當有效率,適用於計算能力弱、記憶體容量小的被動式電子標籤。

並列摘要


Radio frequency identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control, et al. Unfortunately, the universal deployment of RFID devices may raise public concern regarding violation of privacy and information security. In this paper, a secure mutual authentication scheme is proposed which is based on XOR operation assisting and hash function. Our proposed scheme is best suited for RFID systems that enforce user privacy and security protections while they cannot afford high computing powers and memory spaces, for example passive tags.

並列關鍵字

Tag RFID Privacy Mutual Authentication

參考文獻


Avoine, G.(2004).Privacy issues in RFID banknote protection schemes.Proceedings of the 6th International Conference on Smart Card Research and Advanced Applications(CARDIS).(Proceedings of the 6th International Conference on Smart Card Research and Advanced Applications(CARDIS)).:
Dimitriou, T.(2005).A lightweight RFID protocol to protect against traceability and cloning attacks.Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks(SECURECOMM 2005).(Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks(SECURECOMM 2005)).
Flores, J.L.M.,Srikant, S.S.,Sareen, B.,Vagga, A.(2005).Performance of RFID tags in near and far field.2005 IEEE Personal Wireless Communications International Conference.(2005 IEEE Personal Wireless Communications International Conference).
Gao, X.,Xiang, Z.,Wang, H.,Shen, J.,Huang, J.,Song, S.(2004).An approach to security and privacy of RFID system for supply chain.Proceedings of IEEE International Conference.(Proceedings of IEEE International Conference).
Henrici, D.,Muller, P.(2004).Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers.Proceedings of 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops.(Proceedings of 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops).

被引用紀錄


陳欣郁(2012)。產業供應鏈下具不可追蹤及雙向鑑別之RFID認證之研究〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2012.00376
賴品卉(2010)。從經營管理觀點與顧客觀點探討服務業應用RFID問題之研究〔碩士論文,崑山科技大學〕。華藝線上圖書館。https://doi.org/10.6828/KSU.2010.00057
楊欣怡(2011)。探討RFID科技化服務創新:任務 ─ 科技配適度觀點〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-1511201215471935

延伸閱讀