透過您的圖書館登入
IP:3.133.86.172
  • 學位論文

改良之Gen2v2標籤認證協定與模擬實作

Design And Implement of Improved Gen2v2 Authentication Protocol

指導教授 : 簡宏宇

摘要


EPCglobal推出的 Gen2 RFID除了原先的物流應用外,已被廣泛地應用在其他領域-如: 身分認證、存取控制等等;這些應用也突顯出原先Gen2 標準安全保護不足的弱點。2013年EPCglobal因此公布了新一代Gen2規格- Gen2v2;最近Engels 等人提出了針對 Gen2v2雙向認證機制。然而我們發現該機制無法防止tag 或reader被偽造攻擊;本研究指出這些缺點,並以 AES的CFB、CBC、 OFB 三種加密mode提出安全的安全認證方法。最後以程式語言模擬如何成功攻擊Engels等人的機制和模擬我們所提出的三種更安全的認證機制來驗證我們的理論。

關鍵字

RFID Gen2 認證 加密 資訊安全

並列摘要


EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applications need. Therefore ,EPCglobal published a new generation - Gen2v2 specification; the new standards add several security commands, file management commands and privacy protection commands to set a foundation and building blocks for various secure applications. Engels et al., based on Gen2v2, proposed authentication and key agreement schemes. However, we find that the schemes can not protect tag or reader from forgery attacks. This study points out these shortcomings , and proposes improved schemes. Finally, we simulate our attacks and improved schemes, and the results verify our attacks and improvements.

並列關鍵字

RFID Gen2 Authentication Encrypt Information security

參考文獻


[1] Duc, D.N., H. Lee, and K. Kim, Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning, in Networked RFID Systems and Lightweight Cryptography, P.H. Cole and D.C. Ranasinghe, Editors. 2008, Springer Berlin Heidelberg. p. 269-277.
[2] Jaemin, P., N. Junchae, and K. Minjeong. A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag. in Future Generation Communication and Networking (FGCN 2007). 2007.
[3] Yamamoto, A., A Tamper Detection Method for RFID Tag Data. in RFID, 2008 IEEE International Conference on. 2008.
[4] Choi, E.Y., D.H. Lee, and J.I. Lim, Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. Comput. Stand. Interfaces, 2009. 31(6): p. 1124-1130.
[5] Ohkubo, M., K. Suzuki, and S. Kinoshita, Cryptographic Approach to "Privacy-Friendly" Tags. 2003. In RFID privacy workshop.

被引用紀錄


王怡捷(2011)。大專護理系學生運動休閒價值觀之研究-以中華醫事科技大學為例〔碩士論文,長榮大學〕。華藝線上圖書館。https://doi.org/10.6833/CJCU.2011.00138
簡玉惠(2009)。國民小學教師人格特質和休閒活動參與相關之研究〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-0807200916272974
張維志(2010)。柔道選手休閒活動參與對賽前焦慮之影響探討 -以98年全國運動會柔道選手為例〔碩士論文,朝陽科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0078-0601201112112534
陳瑩貞(2010)。婚友媒合活動的時空、社會交換與規訓〔碩士論文,國立臺灣師範大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0021-1610201315201072
林靖婷(2014)。罕見疾病男孩母親之心路歷程〔碩士論文,朝陽科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0078-2611201410190402

延伸閱讀