透過您的圖書館登入
IP:18.216.186.164
  • 學位論文

低計算量的身分驗證協定之研究

A Research on Low-computational-load Authentication Protocols

指導教授 : 張雅芬

摘要


在現代,越來越多的服務是利用移動裝置或一些計算能力較低的晶片來完成。另外,由於被動式RFID標籤價格便宜且不需電池,亦有許多應用採用使用被動式RFID標籤的系統,例如電子錢包。然而,要提供這些服務前,裝置及後端伺服器之間需相互認證,以判斷是否為合法的裝置。 但是,這些裝置之計算能力遠低於伺服器、且儲存空間也有限。故,現在許多研究都在思考如何在減少計算量的同時,可提供足夠的安全性,以適用於低計算能力裝置如RFID標籤及行動裝置。 Safkhani等學者針對RFID系統提出一個基於離散函數的身分驗證方法,他們宣稱該方法符合RFID系統必要的安全性。另一方面,Doss等學者針對被動式RFID標籤提出了一個基於二次剩餘的身分驗證方法,且該方法依循EPC Class-1 Gen-2的規範,並具備必要的安全性能。然而,經分析後,我們發現Safkhani等學者及Doss等學者的方法之計算負擔過於沉重。在本研究中,我們將回顧Safkhani等學者與Doss等學者所提出之RFID身分驗證的方法,進而分別提出改善方案。透過分析我們的所提出的方案不僅能提供相同之安全等級,且計算量較低。此特性更加利於我們的方案運行於低計算能力裝置上。

關鍵字

計算負載 身分驗證 行動裝置 RFID

並列摘要


Nowadays, more and more services are provided via mobile devices and chips of limited computation ability. Moreover, because passive tags are cheap and need no battery, plenty of applications adopt RFID systems of passive tags - electronic purses for example. Before a service is provided, mutual authentication between a device and the back-end server is needed to check whether the device is legal. Unfortunately, these devices possess limited computation abilities and storage. As a result, many researchers want to find a way to provide a sufficient security level with a low computational load for devices with low computation abilities – mobile devices and RFID tags for example. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. They claimed that their protocol complied with essential security properties for RFID systems. On the other hand, Doss et al. proposed a quadratic residue (QR)-based authentication scheme for passive RFID tags. This scheme conforms to the EPC Class-1 Gen-2 specification and also possesses the required security properties. However, computational loads of them are heavy. In this research, we will review Safkhani et al.’s and Doss et al.’s schemes and propose corresponding improvements. Our schemes provide not only an equivalent security level but also a lighter computational load. That will be more beneficial to perform our scheme on these devices.

並列關鍵字

computational load authentication mobile device RFID

參考文獻


[1] J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, February 2004, pp. 231-235
[2] C. C. Lee, M. S. Hwang, and I.E. Liao, “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Industrial Electronics, Vol. 53, No. 5, October 2006, pp. 1683-1687
[3] J. Xu, W Lee. T. Zhu, and D. G. Feng, “An efficient mutual authentication and key agreement protocol preserving user anonymity in mo
bile networks,” Computer Communications, Vol. 34, No. 3, March 2011, pp. 319-325
[4] T. Y. Wu and Y. M. Tseng, “An efficient user authentication and key exchange protocol for mobile client–server environment,” Computer Networks, Vol. 54, No. 9, June 2010, pp. 1520-1530

延伸閱讀