English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46867/50733 (92%)
造訪人次 : 11882369      線上人數 : 1026
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/20446


    題名: RFID存取控制協定之安全性與效率改良
    作者: 黃敏思
    貢獻者: 資訊管理研究所碩士在職專班
    關鍵詞: 阻絕服務
    效能
    地點隱私
    重送攻擊
    RFID
    日期: 2010
    上傳時間: 2011-11-28 12:52:19 (UTC+8)
    摘要: 目前無線射頻識別(Radio Frequency Identification,RFID)技術已被廣泛應用於生活及商業活動的各個領域。然而許多現行RFID安全協定,仍然無法滿足實際安全需求。常遭到攻擊之狀況,有阻絕服務攻擊、重送攻擊及地點隱私保護攻擊等。

    2009及2010年相關學者所提出的RFID安全協定,改良了以前學者所提出RFID安全協定之漏洞。但我們發現學者們所提出的安全協定機制仍無法避免被攻擊,且有資料隱私外洩疑慮。因此,本研究針對相關文獻之安全協定,分析其弱點,並提出新機制加以改良。

    本研究新協定考慮之應用,假設RFID標籤讀取者需使用並修改標籤內儲存之應用資料,且該資料並非存於RFID系統之後端資料庫。本研究運用加密、安全雜湊函數、及隨機亂數,來達到使用者標籤之不可追蹤性;由於新協定不需使用後端資料庫,完全避免RFID之後端資料庫搜尋時的高成本;而標籤端只進行簡單的認證運算及加密存取,就可滿足其效率與安全需求。

    The current RFID (Radio Frequency Identification, RFID) technology has been widely used in our daily life and business activities in various fields. However, many existing RFID security protocols still cannot meet the actual security needs. Constant attacks include denial of service attacks, replay attacks, and location privacy attacks and so on.

    During 2009 and 2010, new RFID security protocols proposed have tried to im-prove the vulnerability of previous RFID protocols. However, we found that those new protocols still cannot avoid the above mentioned attacks, and there still exists privacy concerns regarding leakage of data. Therefore, this research analyzes related protocols in literature, their weaknesses, and proposes new mechanism to improve the weak-nesses.

    The proposed new protocol in this research consider only the applications that readers of RFID are required to read and modify the application data stored in RFID tags, and that the application data is not stored in the RFID back-end database system. The new protocol uses encryption, secure hash function, and random numbers to achieve the location privacy of user tag. Since no database is needed in the new protocol, the back-end server also prevents the cost of searching the entire RFID back-end data-base. With the low cost simple authentication and encryption operations in the RFID tag, efficiency and safety are also achieved.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML536檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋