透過您的圖書館登入
IP:18.225.255.134
  • 學位論文

使用EPCglobalGEN-2RFID的產權轉移協定

A secure ownership transfer protocol using EPCglobal GEN-2 RFID

指導教授 : 陳金鈴
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


無線射頻認證(RFID)是一項新興的技術。近年,在許多應用層面上是便利且可行的。然而,也提出了許多值得去討論的安全議題,由於RFID使用無線傳輸環境,有些惡意人士想藉由這個環境取得RFID標籤內的資訊並且侵犯使用者的隱私,即使已經有許多關於RFID安全性的保護方式被提出,許多研究還是經常遭受各式各樣的攻擊。在本篇論文中,我們提出一種可證明安全暨符合EPCglobal 第二代標準的無線射頻產權轉移協定,透過謹慎及仔細的證明,這個方法可以抵抗各種攻擊及確保安全交的易

並列摘要


Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. Due to RFID system uses wireless transmission, there are some malicious peoples who want to get the information in the RFID tags around the environment, and the user’s privacy would be invaded. Although there have been many protection methods were proposed for RFID security, many researches still suffered from various attacks. In this paper, we propose a conformation of EPCglobal class 1 generation 2 standards RFID ownership transfer protocol with provable security. The proposed scheme can resist several attacks and ensure a secure transaction via a serial of conscientious and careful proof.

並列關鍵字

RFID ownership transfer Mutual authentication EPC security

參考文獻


[1] S. L. Garfinkel, A. Juels, R. Pappu, RFID Privacy: An overview of problems and proposed Solutions, IEEE Security & Privacy Magazine, Vol. 3, No. 3, pp. 34-43, May, 2005.
[2] E. Y. Choi, D. H. Lee b,J. I. Limb, Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems, Computer Standards & Interfaces, in press DOI:10.1016, 2009.
[5] A.D. Henrici, P.MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, In the Proceedings of PerSec''04 at IEEE PerCom, pp. 149–153, Mar, 2004.
[9] S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems, security in pervasive computing, LNCS Vol. 2802, pp. 50-59, 2004.
[10] D. Molnar, A. Soppera and D.Wagner, A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags, selected areas in cryptography, LNCS Vol. 3897, pp. 276-290, 2006.

延伸閱讀