透過您的圖書館登入
IP:3.137.161.222
  • 學位論文

Security Cryptography for Low-Cost RFID Tags

Security Cryptography for Low-Cost RFID Tags

指導教授 : 曹世昌 許健
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


Radio Frequency Identification (RFID) 是一種自動的辨別法,倚賴儲存,遙遠使用設備挽回數據叫RFID tags 或 transponders。 今天RFID 在很多過程中使用應用,特別是他們能改進效率的供應鏈子從製造廠開始直到POS(Point of Sales)。 不過,儘管這些諾言,RFID 跟蹤能力的零售商和政府機構的可能的濫用提出關於個人隱私的潛在的破壞的問題。 現在更多RFID 安全特性提議並且研究,可是除保安問題以外有另一個問題出現的。 仍然遠方用於替換考慮的編碼酒吧的標籤 (bar-coding tags) 無價,現下最便宜的RFID tag 是高營業額時段交付5 分錢。 在這分論文裡, 我們想為了降低儘可能低的RFID tag 生產成本推薦新最低點為計算的RFID 計畫並且獲得更大的可伸縮性, 我們在為這項研究之前提及安全問題沒被考慮。 我們提議的協議在中間對活躍的攻擊(象 Man-in-the-middle 什麼的)足夠可靠攻擊和重放映攻擊以及數據損失。 協議基於在一個 tag 和背之間的相互驗証結束伺服器, 並且為讀者提供驗証,以防讀者沒被認為是被相信的第三者(Trusted Third Party)。 只的tags 有切碎的食物功能和專有或者操作,我們提議的協議可行低成本RFID 系統與這以前作品相比。 正確性的正式證據首先為提議驗証協議基於GNY 邏輯作出規定。

關鍵字

第三者 伸縮性 零售商 正確性 伺服器

並列摘要


Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. Today RFID use in many application, especially in supply chain which they can improve the efficiency start from manufacturing plant until POS (Point of Sales) . However, despite these promises, the possible abuse by retailers and government agencies of RFID's tracking capability raises questions about potential violations of personal privacy. Now more RFID security feature have been propose and researched, but after we satisfy with the security problem another problem arise. Now the cheapest RFID tag was 5 cents for high volume delivery, still far away for replacing bar-coding tags which consider priceless. In this paper we want to propose a new low computational RFID scheme to lowering RFID tag manufacturing cost as low as possible and gain larger scalability and as we mention before for this study security problems are not considered. Our proposed protocol is reliable enough against the active attacks such as the man in-the-middle attack, and the replay attack as well as the data loss. The protocol is based on mutual authentication between a tag and a back-end server, and provides authentication for the reader in case the reader is not regarded as the trusted third party (TTP). As tags only have hash function and exclusive-or operation, our proposed protocol is very feasible for low-cost RFID system compared to the previous works. The formal proof of correctness is firstly provided for the proposed authentication protocol based on GNY logic.

並列關鍵字

AND

參考文獻


2 . A. Juels, Minimalist Cryptography for Low-Cost RFID Tags, Available at http://www.rsasecurity.com/rsalabs/node.asp?id=2033.
5. D. Henrici, and P. MÄuller, Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers, In the Proceedings of PerSec'04 at IEEE PerCom, pp.149-153, Mar. 2004.
7. Gong, L., Needham, R., and Yahalom, R., (1990) Reasoning about belief in cryptographic protocols. In Proc. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May, pp. 234-248. IEEE Society Press, Washington, DC.
8. G.Yuval, How to swindle Rabin, Cryptologia, 3:187-189, pp.187-190, Jul. 1979.
12. M. Ohkubo, K. Suzuki, and S. Kinoshita, RFID privacy issues and Technical challenges, COMMUNICATIONS OF THE ACM, Vol. 48, No. 9, September 2005.