透過您的圖書館登入
IP:18.119.116.43
  • 學位論文

輕量具保護行動無線射頻位置隱私之認證方法

Lightweight Mobile RFID Authentication Protocol for Location Privacy

指導教授 : 楊明豪 羅嘉寧

摘要


無線射頻辨識系統(Radio Frequency Identification,RFID)目前已被普遍應用於供應鏈管理、門禁管理、醫療管理等領域,近年來為擴大其便利性因而有Mobile RFID的發展,透過如PDA、行動電話等通訊裝置與讀取晶片的整合,更可以直接應用在購買物品與小額付費上。但當RFID標籤到處可見之時,由於標籤與讀取器使用無線電波在溝通,低成本的標籤無法提供足夠的安全防護,加上讀取器可能由惡意攻擊者來充當,使得原本存在於RFID的安全問題不只延伸到Mobile RFID,更加大中間人攻擊、追蹤標籤等的可能性,對個人隱私與資訊安全造成重大的威脅。目前使用加密方法的認證機制,不是對低成本標籤的計算與硬體支援造成很大的負擔,就是對標籤的隱私安全防護得不夠完善,故我們在Mobile RFID的環境架構下,提出一個以PIN-test Set為基礎且符合EPC Class-1 Generation-2規範之輕量化安全認證機制,有效地達到向前安全並防止重送攻擊、阻絕服務攻擊、中間人攻擊、偽造標籤等攻擊,期望在低成本的限制下,可以提供標籤資料的安全性,以及防護標籤持有人的位置隱私。

並列摘要


Radio Frequency Identification(RFID) systems is used in various fields such as supply chain management, inventory control, medical management, indoor access control, and so forth. Recently, it is expanding to become the mobile RFID systems for more convenience. Through RFID reader chip is installed to mobile terminal like PDA or cellular phone, which can provide purchasing, verifying and paying for the product directly. However, mobile reader and tag using RF signals to communicate with each other, and low-cost tag can’t provide enough security protection. The malicious attacker can pretend as mobile reader to cause security and privacy problems such as tag’s information leakage and owner traceability. In this paper, we propose a PIN-test Set based scheme suitable to mobile RFID systems and conforming to EPC Class-1 Generation-2 standards. Our scheme is forward-secure and prevent from threats such as reply attack, DOS attack, man-in-the-middle attack, and tag counterfeit.

參考文獻


[3] Ari Juels (2005). “Strengthening EPC Tag against Cloning,” Proceedings of the 4th ACM workshop on Wireless security, pp. 67-76.
[4] Ari Juels, and Ravikanth Pappu (2003). “Squealing Euros: Privacy Protection in RFID-Enabled Banknotes,” Financial Cryptography’03.
[5] Ari Juels, and Stephen A. Weis (2005). “Authenticating Pervasive Devices with Human Protocols,” Advances in Cryptology - Crypto 05, Lecture Notes in Computer Science. Springer-Verlag, 2005.
[7] Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim (2006). “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” The 2006 Symposium on Cryptography and Information Security.
[8] Dirk Henrici, and Paul Müller (2004). “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,” In the Proceedings of PerSec’04 at IEEE PerCom, pp.149-153.

被引用紀錄


朱筑筠(2013)。產業創新條例之實施與電子產業價值攸關性〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201300306

延伸閱讀