透過您的圖書館登入
IP:52.15.112.69
  • 學位論文

RFID 在EPC 一128 Class 2 Tag 中的安全防護

Methods of RFID Intrusion Detection : A Case Study EPC-128 Class 2 Tag

指導教授 : 曹世昌
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在這篇論文中我們所討論的是關於RFID 系統中隱私方面的問題。過去,在RFID 系統中任何的Readers 都能對其鄰近有效範圍內的Tags 做讀寫的動作。當物品嵌入了Tag 便容許被追蹤或監控。這說明了就使用的資訊安全而官是有漏洞的,它表示如果這些物品被貼上標籤,那麼所有的個人資訊將能在不需要對使用者有任何了解的情況下被取得。通常,有兩種方法提供RFID Tags 上的資料安全。在Tags 上裝備資料加密是其中一種方法。在此過程中,此資料能被保護以密文編排的方式代替明文編排。資料被任何未被授權的Readers 取回將顯示不使攻擊者成興趣的資料,除非他們能解開全部他們所得到的資訊。RFID Readers 跟Tags 之間的確認是另一種方法。它意指標準的資訊假如先前已經確認完畢,即當Readers 跟Tags 兩者都鑑定彼此是正確的一方。則Readers 能被允許由Tags 取得資料並繼續進行其權限內的所有操作。 這篇論文主要是以HMAC 內嵌MDS 雜湊函數的觀念去阻止未授權的Readers 從Tags 侵入其所儲存的資訊。以此方式作為雜湊用途於RFID EPC 一128 CLASSZ 被動式Tags 中。對EPC 一128 的EPC 碼做加密的動作,避免大量的資料造成過長的Readers 讀取時間。

並列摘要


In this thesis we will discuss the privacy issues in the RFID system. In the past any RFID reader can read from and write to the tags within the valid range in the neighborhood. When the articles are embedded with tags, they can be traced and monitored. Therefore it demonstrates the security holes as regards to information safety used. It shows that all information of articles after being attached with tags can be obtained without needing the permission from tag users. In general there two kinds of methods that provide the data security of RFID tags. One of the methods is to encrypt the data of tags. In the processes the data can be protected by substituting the plain-edited text with the cipher-edited text. Any data obtained by unauthorized readers will be not readable unless the data obtained can be decrypted. The other method is to set up confirmation between tags and readers. It means that if the data has already been confirmed before, the readers and tags will be mutually ascertained the right party. Therefore the readers can be allowed to obtain the data of tags and continue to carry out operations within the authorized ranges. The research in this thesis mainly uses HMAC inlayed with MD5 hash functions to prevent the unauthorized readers from invading the data information in the tags. The hatched method is applied to the passive RFID of EPC-128 Class Therefore it will not take too long read time that EPC-128 tags are encrypted.

並列關鍵字

RFID、HMAC、MD5

參考文獻


2. Steven Shepard, RFID Radio Frequency Identification. United States: McGraw Hill,2005.
3.Frank Thornton, Brad Haines, Anand M. Das, Hersh Bhargava, Anita Campbell and JohnKleinschmidt, RFID Security. Canada: Syngress, 2006.
4. William Stallings, Cryptography and Network Security Principles and Practices, 3rd ed.Taiwan: Pearson, 2004.
8.Louis A. Lefebvre, Élisabeth Lefebvre, Ygal Bendavid, Samuel Fosso Wamba and Harold Boeck, “RFID as an Enabler of B-to-B e-Commerce and its Impact on Business
Processes: A Pilot Study of a Supply Chain in the Retail Industry,” in System Sciences,2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on,Jan. 2006, vol. 6, pp. 104a-104a.

延伸閱讀