淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-0109201423235100
中文論文名稱 RFID標籤所有權安全轉移技術
英文論文名稱 Secure RFID Tag Ownership Transfer Protocols
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 102
學期 2
出版年 103
研究生中文姓名 林筱媛
研究生英文姓名 Hsiao-Yuan Lin
學號 601410730
學位類別 碩士
語文別 中文
第二語文別 英文
口試日期 2014-06-17
論文頁數 57頁
口試委員 指導教授-黃仁俊
委員-楊中皇
委員-黃心嘉
委員-黃仁俊
中文關鍵字 RFID  身分驗證  所有權轉移  阻斷服務攻擊  重送攻擊  向前安全 
英文關鍵字 RFID  Authentication  Ownership Transfer  DoS Attack  Replay Attack  Forward Security 
學科別分類 學科別應用科學資訊工程
中文摘要 無線射頻技術(Radio Frequency Identification,RFID)應用越來越廣泛,由於其可以重複讀寫和快速讀取等特性,使得將RFID技術融入供應鏈管理的應用也屢見不鮮,但是在這應用層面中存在一重要的安全議題:所有權的安全轉移,本論文提出一個安全的所有權轉移方法可以提供身分鑑別、向前安全、防止重送攻擊、力抗阻斷服務攻擊和維護新擁有者隱私以及舊擁有者隱私。
英文摘要 RFID (Radio Frequency Identification) technology is now in widespread use in various applications. As a result of its not only has rewritable characteristic and also accesses the information rapidly. The supply chains usually use the RFID technology to manage the goods, but there is an important secure issue of tag ownership transfer. This paper proposes a secure RFID tag ownership transfer protocol not only can provide identity authentication, forward security, new owner privacy, and old owner privacy but also prevent replay attack and DoS attack.
論文目次 目錄
第一章、前言 1
第二章、相關研究工作 7
2.1 Kapoor等人方法 7
2.2 分析與討論 11
2.3 RFID標籤介紹 12
2.4 RFID標籤與傳統Bar code比較 13
第三章、本論文之方法 15
3.1 安全需求之定義 15
3.2 所有權轉移 16
第四章、安全性、功能及效能分析 20
4.1 身分鑑別 (Authentication) 20
4.2 重送攻擊 (Replay attack) 22
4.3 新擁有者隱私 (New Owner Privacy) 24
4.4 舊擁有者隱私 (Old Owner Privacy) 25
4.5 向前安全 (Forward Privacy) 25
4.6 DoS (Denial of service阻斷服務攻擊) 26
4.7 效能和安全性分析 27
第五章、結論與未來研究方向 29
參考文獻 30
Appendix 32

圖目錄
圖2-1、Kapoor等人提出方法協定圖 9
圖2-2、Kapoor提出tag與新擁有者R2鑑別圖 10
圖3-1、本論文方法示意圖 17

表目錄
表1-1、符號表 5
表2-1、標籤類型比較表[27] 12
表2-2、EPCglobal標籤分類表[28] 13
表2-3、RFID tag與傳統Bar code比較表[26] 14
表3-1、所有權轉移前各個參與者擁有參數 16
表3-2、所有權轉移前後各參與方擁有參數 18
表4-1、安全性比較分析表 27
表4-2、通訊次數與計算量比較 28
參考文獻 [1] J. Saito, K. Imamoto, and K. Sakurai, “Reassignment scheme of an RFID tag’s key for owner transfer,” in Proc. IFIP Int. Conf. Embedded Ubiquitous Comput. Workshop, LNCS 3823, 2005, pp. 1303–1312.
[2] K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer,” in Proc. Int. Conf. Comput. Intell. Security, LNAI 4456, 2007, pp. 778–787.
[3] E.-J. Yoon and K.-Y. Yoo, “Two security problems of RFID security method with ownership transfer,” in Proc. IFIP Int. Conf. Netw. Parallel Comput., 2008, pp. 68–73.
[4] S. Fouladgar and H. Afifi, “A simple delegation scheme for RFID systems (SiDeS),” in Proc. IEEE Int. Conf/RFID, 2007, pp. 1–6
[5] S. Fouladgar and H. Afifi, “An efficient delegation and transfer of ownership protocol for RFID tags,” in Proc. 1st Int. EURASIP Workshop RFID Technol., 2007, pp. 59–62.
[6] K. Koralalage, S. Reza, J. Miura, Y. Goto, and J. Cheng, “POP Method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism,” in Proc. ACM Symp. Appl. Comput., 2007, pp. 270–275.
[7] H. Lei and T. Cao, “RFID protocol enabling ownership transfer to protect against traceability and DoS attacks,” in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, Nov. 2007, pp. 508–510.
[8] B. Song, “RFID tag ownership transfer,” in Proc.. RFIDSec, 2008, p. 16.
[9] Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” in Proc. Symp. Cryptogr. Inf. Security, 2007, pp. 1–7.
[10] G. Kapoor and S. Piramuthu, “Vulnerabilities in some recently proposed RFID ownership transfer protocols,” IEEE Commun. Lett., vol. 14, no. 3, Mar. 2010, pp. 260–262.
[11] G. Kapoor, W. Zhou, and S. Piramuthu, “Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains,” Decision Support Systems, vol. 52, no. 1, 2011, pp. 258–270.
[12] G. Kapoor and S. Piramuthu, “Single RFID tag ownership transfer protocols,” IEEE Trans. Systems, Man, Cybern. C, Appl. Rev., vol. 42, no. 2, Mar. 2012, pp. 164–173.
[13] B. Song and C. J. Mitchell, “Scalable RFID security protocols supporting tag ownership transfer,” Comput. Commun., vol. 34, no. 4, Apr. 2011, pp. 556–566.
[14] B. Ray, M. Chowdhury, J. Abawajy, “Secure Mobile RFID Ownership Transfer Protocol to Cover all Transfer Scenarios,” 7th International Conference on Computing and Convergence Technology, 2012, pp. 1185-1192
[15] R. Doss, W. Zhou, and S. Yu, “Secure RFID tag ownership transfer based on quadratic residues,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, Feb.2013, pp. 390–401.
[16] Y. Zuo, "Changing hands together: a secure group ownership transfer protocol for RFID tags," Hawaii International Conference on System Sciences, Koloa, Kauai, HI, 2010, pp. 1-10.
[17] H. B. Chen, W. B. Lee, Y. H. Zhao, Y. L. Chen,“Enhancement of the RFID Security Method with Ownership Transfer, ” the 3rd International Conference on Ubiquitous Information Management and Communication, SKKU, Suwon, Korea, Jan. 2009, pp. 251-254.
[18] Ming H. Yang, “Secure Multiple Group Ownership Transfer Protocol for Mobile RFID,” Electronic Commerce Research and Applications, 2012, pp. 361-373.
[19] B. Violino,“A Summary of RFID Standards,” RFID Jounal,Jan., 2005 http://www.rfidjournal.com/article/articleprint/1335/-1/1.
[20] IPICO, “HIGH PERFORMANCE PRODUCTS FOR REAL WORLD APPLICATIONS,” http://www.ipico.com/index.cfm?pagepath=Products&id=5894, 2014.
[21] GS1 TAIWAN, "已發布之EPCglobal標準概況, " http://www.gs1tw.org/ twct/web/epcg.jsp, 2014.
[22] uID Center, “Certified ucode Tags,” http://www.uidcenter.org/learning-about-ucode/certifiedtags, 2014.
[23] A. Mathuria , R. Safavi-Naini and P. Nickolas ,"On the automation of GNY logic", Australian Computer Science Communications, vol. 17, no. 1, 1995, pp.370 -379.
[24] F. Thayer , J. C. Herzog and J. D. Guttman ,"Strand spaces: Why is a security protocol correct?," Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998.
[25] F. J. T. FA!brega , J. C. Herzog and J. D. Guttman ,"Strand spaces: Proving security protocols correct," Journal of Computer Security, vol. 7, no. 2/3, 1999, pp.191 -230.
[26] 張克章、奚正德,「RFID相關應用與安全機制簡介」,資通安全專論,2007.
[27] 劉惠園, “簡介無線射頻(RFID )原理與應用,” wiki.csie.niu.edu.tw/ attachment.php?aid=1085, 2009.
[28] Shih-Cheng Horng, “RFID概論第四章 RFID標籤與讀取器,” lms.ctl.cyut.edu.tw/sys/read_attach.php?id=902777, 2011.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2014-09-04公開。
  • 同意授權瀏覽/列印電子全文服務,於2014-09-04起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信