文化大學機構典藏 CCUR:Item 987654321/20446
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47126/50992 (92%)
Visitors : 13863624      Online Users : 245
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/20446


    Title: RFID存取控制協定之安全性與效率改良
    Authors: 黃敏思
    Contributors: 資訊管理研究所碩士在職專班
    Keywords: 阻絕服務
    效能
    地點隱私
    重送攻擊
    RFID
    Date: 2010
    Issue Date: 2011-11-28 12:52:19 (UTC+8)
    Abstract: 目前無線射頻識別(Radio Frequency Identification,RFID)技術已被廣泛應用於生活及商業活動的各個領域。然而許多現行RFID安全協定,仍然無法滿足實際安全需求。常遭到攻擊之狀況,有阻絕服務攻擊、重送攻擊及地點隱私保護攻擊等。

    2009及2010年相關學者所提出的RFID安全協定,改良了以前學者所提出RFID安全協定之漏洞。但我們發現學者們所提出的安全協定機制仍無法避免被攻擊,且有資料隱私外洩疑慮。因此,本研究針對相關文獻之安全協定,分析其弱點,並提出新機制加以改良。

    本研究新協定考慮之應用,假設RFID標籤讀取者需使用並修改標籤內儲存之應用資料,且該資料並非存於RFID系統之後端資料庫。本研究運用加密、安全雜湊函數、及隨機亂數,來達到使用者標籤之不可追蹤性;由於新協定不需使用後端資料庫,完全避免RFID之後端資料庫搜尋時的高成本;而標籤端只進行簡單的認證運算及加密存取,就可滿足其效率與安全需求。

    The current RFID (Radio Frequency Identification, RFID) technology has been widely used in our daily life and business activities in various fields. However, many existing RFID security protocols still cannot meet the actual security needs. Constant attacks include denial of service attacks, replay attacks, and location privacy attacks and so on.

    During 2009 and 2010, new RFID security protocols proposed have tried to im-prove the vulnerability of previous RFID protocols. However, we found that those new protocols still cannot avoid the above mentioned attacks, and there still exists privacy concerns regarding leakage of data. Therefore, this research analyzes related protocols in literature, their weaknesses, and proposes new mechanism to improve the weak-nesses.

    The proposed new protocol in this research consider only the applications that readers of RFID are required to read and modify the application data stored in RFID tags, and that the application data is not stored in the RFID back-end database system. The new protocol uses encryption, secure hash function, and random numbers to achieve the location privacy of user tag. Since no database is needed in the new protocol, the back-end server also prevents the cost of searching the entire RFID back-end data-base. With the low cost simple authentication and encryption operations in the RFID tag, efficiency and safety are also achieved.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] Thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML573View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback