透過您的圖書館登入
IP:18.116.239.195
  • 學位論文

適用於RFID之被動式電子標籤的鑑別技術

The authentication technology for the passive tag in RFID

指導教授 : 黃仁俊

摘要


本論文研究並提出一個適用於無線射頻辨識系統(RFID)應用環境中安全且有效率的鑑別技術,此方法適用於計算能力弱、記憶體容量小且不需附加電池之RFID被動式電子標籤,我們提出之安全鑑別技術運用Hash函數與互斥或運算並具備安全防護及雙向鑑別的功能,可以有效的防止電子標籤遭到分析追蹤與複製,可確實提供一個具安全功能的RFID應用模式,這項鑑別技術不但可以運用在RFID行動付費機制中,也同時具備防止偽造、雙重消費及追蹤等功能,以確保行動交易過程中的安全性與隱私性。

關鍵字

RFID 安全防護 雙向鑑別 用戶隱私

並列摘要


This paper we propose a security and efficient authentication technology that is suitable for Radio Frequency Identification (RFID) application environment. This technology is proper when the passive tag has weak computing ability, memory limitation and no on-board battery. Based on Hash function and exclusive-or operation, this technology not only offers data protection and mutual authentication, but also can protect the tag from analysis, tracing, or cloning. In the application to RFID mobile payment, this technology can prevent masquerade, double spending and tracing, ensuring the security during the transaction process.

參考文獻


[2] G. Avoine and P. OecGJJS04hslin, “A scalable and Provably Secure Hash-Based RFID Protocol”, Proceedings of IEEE PerSec 2005, Kauai Island, Hawail, March, 2005.
[3] E. Choi, S. Lee, and D. Lee, “Efficient RFID Authentication Protocol for Ubiquitous Computing Environment”, Proceedings of EUC Workshops 2005, LNCS 3823, Springer-Verlag, pp. 945-954, 2005.
[5] H. Chien and C. Chen, “Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards”, Proceedings of Computer Standards & Interfaces 29, pp. 254-259, 2007.
[6] T. Dimitriou, “A Lightweight RFID Protocol to protect against Traceability and Cloning attacks”, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 59-66, 2005.
[8] D. Henrici and P. Muller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers”, Proceedings of 2nd IEEE Annual Conference on Pervasive Computing andCommunications Workshops, pp. 149-153, 2004.

延伸閱讀