透過您的圖書館登入
IP:18.118.0.91
  • 學位論文

基於不同權重之安全多RFID標籤 所有權轉移方法

Secure Multi-RFID Tags Based on Different Weights for Ownership Transfer Protocol

指導教授 : 楊明豪 羅嘉寧
本文將於2027/08/29開放下載。若您希望在開放下載時收到通知,可將文章加入收藏

摘要


無線射頻辨識(Radio Frequency Identification, RFID)技術因具備輕量運算及儲存能力、可同時讀寫多個標籤資訊等優勢,能有效提升管理效率、減省人力、撙節成本等被廣泛應用於供應鏈。由於一件商品可能歸屬多個擁有者,故無法僅在單一所有權人同意下轉移所有權,至少需取得大部分所有權人同意方能轉移,而事實上並非每位擁有者對於該商品是擁有相同的權力,因此可能出現擁有者之間對於商品的所有權權重各不相同。 是以,本文提出了適合大量貨物同時轉移的所有權轉移方法,本方法可在不透過可信任第三方的前提下,安全且高效率的在多擁有者擁有多標籤之情況下透過群組轉移標籤的方式轉移標籤。新舊擁有者之間可分屬不同的伺服器管轄範圍,當舊擁有者任一發起所有權轉移請求時,伺服器透過辨認不同擁有者之間回傳代表該擁有者權重值的子金鑰來恢復出標籤群組金鑰判斷是否有權限轉移,並可以指定轉移一個、部分抑或是全部的標籤,且提供標籤、讀取器以及伺服器之間三者的雙向認證,同時能抵禦秘密洩漏、重送、非同步癱瘓等該領域已知的攻擊,更能防禦轉移過後的舊擁有者可能扮演攻擊者來搶回標籤所有權的問題。 最後我們會使用GNY證明本實驗方法的安全性,並透過實驗比較我們的方法與其他多對多或是能支援不同權重轉移的所有權方法,經實驗證明,我們的方法不僅是能夠保障最多安全性,同時又能在計算量以及通訊量上達成最有效率的方法。 本論文是目前已知唯一支援不同權重多擁有者多標籤的所有權轉移方法,透過設定門檻值與總權重來完成分配標籤群組金鑰而產生的子金鑰,並透過回收該子金鑰來恢復出標籤群組金鑰來確認是否同意轉移。通過實驗,本研究證明我們的方法具有最低的計算量和通訊量,並且相對於其他多的方法是具有最多安全性保障同事又能兼顧效率的。

並列摘要


Radio Frequency Identification (RFID) technology is widely used in supply chains due to its advantages of lightweight computing and storage capabilities, and the ability to read and write multiple tag information at the same time, which can effectively improve management efficiency, save manpower, and save costs. Since a product may belong to multiple owners, it is not possible to transfer ownership only with the consent of a single owner, at least with the consent of most owners, and in fact not every owner owns the same product power, so there may be differences in the ownership weight of the goods among the owners. Therefore, this paper proposes an ownership transfer method suitable for the simultaneous transfer of a large number of goods. This method can safely and efficiently transfer tags through groups under the condition that multiple owners have multiple tags without going through a trusted third party. way to transfer labels. The old and new owners can belong to different server jurisdictions. When either the old owner initiates a transfer request, the server sends back the subkey representing the weight of the owner by identifying the different owners. Recover the tag group key to determine whether there is permission to transfer, and can specify to transfer one, some or all tags, and provide two-way authentication between tags, readers and servers, and can resist secret leakage, known attacks in this field, such as retransmission and asynchronous paralysis, are more resistant to the problem that the old owner after the transfer may act as an attacker to regain the ownership of the tag. Finally, we will use GNY to prove the security of this experimental method, and compare our method with other many-to-many or ownership methods that can support different weight transfers through experiments. Experiments show that our method can not only guarantee the most security at the same time, it can achieve the most efficient method in terms of calculation amount and communication amount. This paper is the only known ownership transfer method that supports multi-owner and multi-tags with different weights. By setting the threshold value and the total weight, the sub-key generated by assigning the tag group key is completed, and the sub-key is recovered by recycling the sub-key. Recover the tag group key to confirm whether to agree to the transfer. Through experiments, this study proves that our method has the lowest amount of computation and communication, and compared to other methods, it has the most security guarantees and can take into account the efficiency.

並列關鍵字

RFID Threshold Secret Sharing Weighted

參考文獻


[1] A. N. Nambiar, "RFID technology: A review of its applications," in Proceedings of the world congress on engineering and computer science, 2009, vol. 2: Citeseer, pp. 20-22.
[2] Y. Thakare, S. Musale, and S. Ganorkar, "A technological review of RFID & applications," in 2008 IET International Conference on Wireless, Mobile and Multimedia Networks, 2008: IET, pp. 65-70.
[3] E. Ngai, K. K. Moon, F. J. Riggins, and Y. Y. Candace, "RFID research: An academic literature review (1995–2005) and future research directions," International Journal of Production Economics, vol. 112, no. 2, pp. 510-520, 2008.
[4] C.-C. Chao, J.-M. Yang, and W.-Y. Jen, "Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005," Technovation, vol. 27, no. 5, pp. 268-279, 2007.
[5] C. Munoz-Ausecha, J. Ruiz-Rosero, and G. Ramirez-Gonzalez, "RFID Applications and Security Review," Computation, vol. 9, no. 6, p. 69, 2021.

延伸閱讀