透過您的圖書館登入
IP:3.15.218.254
  • 學位論文

擁有高度安全與隱私的新RFID協定

A New RFID Protocol with Strong Security and Privacy

指導教授 : 張仁俊 吳信龍
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


RFID的發明,使許多產業在管理方面變得更加地有效率,而隨著RFID應用越來越廣泛的時候,我們可以發現在我們的日常生活中已經隨處可見到RFID的蹤影,像是供應鏈管理、電子證件、電子收費系統等應用,在RFID的崛起的同時,也讓人們開始注意到使用RFID時,所必須面臨的安全性與隱私的問題,我們可以發現在RFID有限的能力與資源當中,傳統的安全機制已經不適合用於RFID,因此如何設計出一個新的適合RFID的安全機制將是本篇論文所要探討的重點。 目前已經有許多的學者針對RFID的安全和隱私議題提出他們研究的安全機制,然而還是存在著許多的問題尚未解決。而在RFID常見的應用中,在供應鏈管理方面,常常為了節省標籤成本,必須重複使用標籤,而在重複使用標籤的同時也產生了標籤所有權轉移的問題。在2007年時,Osaka等人提出了他們的RFID安全協定,並且也針對RFID標籤的所有權轉移做研究探討,然而我們還是發現了在Osaka的安全協定中,依然存在著幾個安全性和隱私的問題尚未解決。 因此本篇論文將針對RFID的安全性與隱私問題提出一個新的RFID安全機制,在我們所提出的RFID安全協定中,足以抵擋大部分常見的RFID攻擊,大幅地增強了RFID的安全性和隱私性,並且也改良提升了以往後端資料庫在搜尋速度效率慢的缺點,讓使用者在使用RFID的同時,利用我們所設計的安全協定來更加有效地保障使用者的安全和隱私。

並列摘要


Many industries used RFID for more efficient management. We can see RFID everywhere in our daily lives such as Supply Chain Management(SCM), electronic identity card and Electronic Toll Collection system(ETC). When the RFID applica-tions become more widely, then the security and privacy of RFID systems become the important concerns because they are vulnerable to a number of malicious attacks. But for low-cost RFID systems, many traditional security mechanisms are inefficient due to the resource constraints. So our research we concern on design a new RFID proto-col with strong security and privacy. Supply chain management is a common RFID application. In many situations we have to re-use the tags to save cost. However, the tag ownership becomes another is-sue for the re-use tags. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki and Osamu Takahashi presented their RFID ownership transfer protocol in 2007. However, we found there still have some security and privacy issues in Osaka et al. protocol remain unsolved. In this thesis, we focus on designing a new RFID protocol with strong security and privacy. Our protocol can against most of the common RFID attacks and greatly enhanced the RFID security and privacy protection. In addition, it also improved the efficiency of the back-end database search. Our protocol can provide more effective protection of the security and privacy of users.

參考文獻


[4]. EPCGlobal, “Guidelines on EPC for Consumer Products”,
[6]. A. Juels, R. Pappu, “Squealing euros: Privacy protection in RFID-enabled bank-notes”, In Proceedings of Financial Cryptography –FC’03, 2003.
[9]. A. Juels, “Privacy and Authentication in Low-Cost RFID Tags”, submission 2003.
[11]. T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks”, In Secure Comm 2005. IEEE Computer Society Press, 2005.
[18]. G. Kapoor and S. Piramuthu, “Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols”, In First International Conference on Networks & Communications, 2009.

延伸閱讀