透過您的圖書館登入
IP:18.117.216.229
  • 學位論文

行動裝置及物聯網之安全身分驗證暨金鑰協議方式

An Authentication and Key Agreement Protocol for Mobile Devices and Internet of Things

指導教授 : 盧永豐
共同指導教授 : 黃慧鳳(Hui-Feng Huang)
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在日益普及的數位化生活中,人們環顧周圍皆是資訊產物,伸手可及的地方都能靠手指觸碰操控,事物的控制愈發簡便輕鬆,隨著科技的進步,人們有能力讓身邊的眾多事物使用的更加簡化、清楚並隨時掌握,同時透過通訊技術的發展,眾多學者試圖讓周圍的電子產品、非電子產品都納入手中以便觀測,減少多餘的人力成本及時間成本的花費,進而產生物聯網(IoT)的概念。在物聯網中,每個人都可以應用電子標籤將真實的物體上網聯結,物聯網上都可以查出它們的具體位置。在物聯網的概念下,物與物之間通訊連結的方法比比皆是,而對於為數眾多與物聯網連結的物體,人們最易於隨身攜帶及操控的資訊控制核心,莫過於手邊的行動裝置。以行動裝置為中心常見的通訊方式如;行動網路、無線網路、藍芽設備,以及近場通訊(NFC),其中又因近場通訊雖然技術上傳輸距離較短,但是傳輸建立速度較快,傳輸速度也更快,是功耗更低的通訊方式。本研究目的是以物聯網的情境對於使用者透過手機的近場通訊功能,將需認證個人身分與物聯網的通訊傳輸,如:電子錢包、大樓進出保全系統等,做出兼具使用者身分認證及使用者身分隱蔽的通訊方式,並為通訊過程做資訊安全上的考量。

並列摘要


In the increasingly popular digital life, people look around the information products are all within reach of the fingers can touch control, things become more simple and easy control, with the progress of science and technology, people have the ability to let the side Many things to use more simplified, clear and keep abreast of the same time through the development of communication technology, many scholars trying to let the surrounding electronic products, non-electronic products are included in the hands of observation, to reduce redundant labor costs and time costs, The concept of Internet of Things (IoT). In the Internet of Things, everyone can use electronic tags will be the real object Internet connection, things can be found on their specific location.Under the concept of the Internet of Things, the means of communication between objects and objects abound, and for a large number of objects linked with the Internet of Things, people most likely to carry and manipulate the information control core, than the hand of the mobile device. Mobile devices, such as mobile networks, wireless networks, Bluetooth devices, and near-field communication (NFC), which because of the near-field communication technology, although the transmission distance is shorter, but the transmission establishment speed Fast, faster transmission speed is lower power consumption of the communication.The purpose of this study is to use the near-field communication function of the user through the context of the Internet of Things to transfer personal identification and Internet of things such as electronic wallet, building access control system and so on to make users identity Authentication and user identity of the hidden means of communication, and for the communication process to do information security considerations.

參考文獻


[20] 蔡維哲,“物聯網發展趨勢與政府政策研究”,交通大學科技管理研究所學 位論文,2011年
[22] 姜濟均,”手機行動支付平台競合與NFC模組產業之關鍵成功因素”,中山 大學高階經營碩士班學位論文,2014年。
[14] Pardeep Kumar,Amlan Jyoti Choudhury, Mangal Sain, Sang-Gon Lee, Hoon-Jae Lee, “RUASN: A Robust User Authentication Framework for Wireless Sensor Networks”, Molecular Diversity Preservation International, Sensors 2011 May, Pages 5020-5046.
[16] Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin, “IOT Gateway: BridgingWireless Sensor Networks into Internet of Things” , Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference onEmbedded and Ubiquitous Computing, 28 January 2011.
[1] Aigner, M., Dominikus S, Feldhofer,” A system of secure virtual coupons using NFC technology.” IEEE international conference on pervasive computing and communications workshops, pp. 362–366.

延伸閱讀