§ 瀏覽學位論文書目資料
  
系統識別號 U0002-0109201423235100
DOI 10.6846/TKU.2014.00035
論文名稱(中文) RFID標籤所有權安全轉移技術
論文名稱(英文) Secure RFID Tag Ownership Transfer Protocols
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 102
學期 2
出版年 103
研究生(中文) 林筱媛
研究生(英文) Hsiao-Yuan Lin
學號 601410730
學位類別 碩士
語言別 繁體中文
第二語言別 英文
口試日期 2014-06-17
論文頁數 57頁
口試委員 指導教授 - 黃仁俊
委員 - 楊中皇
委員 - 黃心嘉
委員 - 黃仁俊
關鍵字(中) RFID
身分驗證
所有權轉移
阻斷服務攻擊
重送攻擊
向前安全
關鍵字(英) RFID
Authentication
Ownership Transfer
DoS Attack
Replay Attack
Forward Security
第三語言關鍵字
學科別分類
中文摘要
無線射頻技術(Radio Frequency Identification,RFID)應用越來越廣泛,由於其可以重複讀寫和快速讀取等特性,使得將RFID技術融入供應鏈管理的應用也屢見不鮮,但是在這應用層面中存在一重要的安全議題:所有權的安全轉移,本論文提出一個安全的所有權轉移方法可以提供身分鑑別、向前安全、防止重送攻擊、力抗阻斷服務攻擊和維護新擁有者隱私以及舊擁有者隱私。
英文摘要
RFID (Radio Frequency Identification) technology is now in widespread use in various applications. As a result of its not only has rewritable characteristic and also accesses the information rapidly. The supply chains usually use the RFID technology to manage the goods, but there is an important secure issue of tag ownership transfer. This paper proposes a secure RFID tag ownership transfer protocol not only can provide identity authentication, forward security, new owner privacy, and old owner privacy but also prevent replay attack and DoS attack.
第三語言摘要
論文目次
目錄
第一章、前言	1
第二章、相關研究工作	7
2.1 Kapoor等人方法	7
2.2 分析與討論	11
2.3 RFID標籤介紹	12
2.4 RFID標籤與傳統Bar code比較	13
第三章、本論文之方法	15
3.1 安全需求之定義	15
3.2 所有權轉移	16
第四章、安全性、功能及效能分析	20
4.1 身分鑑別 (Authentication)	20
4.2 重送攻擊 (Replay attack)	22
4.3 新擁有者隱私 (New Owner Privacy)	24
4.4 舊擁有者隱私 (Old Owner Privacy)	25
4.5 向前安全 (Forward Privacy)	25
4.6 DoS (Denial of service阻斷服務攻擊)	26
4.7 效能和安全性分析	27
第五章、結論與未來研究方向	29
參考文獻	30
Appendix	32

圖目錄
圖2-1、Kapoor等人提出方法協定圖	9
圖2-2、Kapoor提出tag與新擁有者R2鑑別圖	10
圖3-1、本論文方法示意圖	17

表目錄
表1-1、符號表	5
表2-1、標籤類型比較表[27]	12
表2-2、EPCglobal標籤分類表[28]	13
表2-3、RFID tag與傳統Bar code比較表[26]	14
表3-1、所有權轉移前各個參與者擁有參數	16
表3-2、所有權轉移前後各參與方擁有參數	18
表4-1、安全性比較分析表	27
表4-2、通訊次數與計算量比較	28
參考文獻
[1]	J. Saito, K. Imamoto, and K. Sakurai, “Reassignment scheme of an RFID  tag’s key for owner transfer,” in Proc. IFIP Int. Conf. Embedded Ubiquitous Comput. Workshop, LNCS 3823, 2005, pp. 1303–1312.
[2]	K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An efficient and secure RFID security method with ownership transfer,” in Proc. Int. Conf. Comput. Intell. Security, LNAI 4456, 2007, pp. 778–787.
[3]	E.-J. Yoon and K.-Y. Yoo, “Two security problems of RFID security method with ownership transfer,” in Proc. IFIP Int. Conf. Netw. Parallel Comput., 2008, pp. 68–73.
[4]	S. Fouladgar and H. Afifi, “A simple delegation scheme for RFID systems (SiDeS),” in Proc. IEEE Int. Conf/RFID, 2007, pp. 1–6
[5]	S. Fouladgar and H. Afifi, “An efficient delegation and transfer of ownership protocol for RFID tags,” in Proc. 1st Int. EURASIP Workshop RFID Technol., 2007, pp. 59–62.
[6]	K. Koralalage, S. Reza, J. Miura, Y. Goto, and J. Cheng, “POP Method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism,” in Proc. ACM Symp. Appl. Comput., 2007, pp. 270–275.
[7]	H. Lei and T. Cao, “RFID protocol enabling ownership transfer to protect against traceability and DoS attacks,” in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, Nov. 2007, pp. 508–510.
[8]	B. Song, “RFID tag ownership transfer,” in Proc.. RFIDSec, 2008, p. 16.
[9]	Y. Seo, T. Asano, H. Lee, and K. Kim, “A lightweight protocol enabling ownership transfer and granular data access of RFID tags,” in Proc. Symp. Cryptogr. Inf. Security, 2007, pp. 1–7.
[10]	G. Kapoor and S. Piramuthu, “Vulnerabilities in some recently proposed RFID ownership transfer protocols,” IEEE Commun. Lett., vol. 14, no. 3, Mar. 2010, pp. 260–262.
[11]	G. Kapoor, W. Zhou, and S. Piramuthu, “Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains,” Decision Support Systems, vol. 52, no. 1, 2011, pp. 258–270.
[12]	G. Kapoor and S. Piramuthu, “Single RFID tag ownership transfer protocols,” IEEE Trans. Systems, Man, Cybern. C, Appl. Rev., vol. 42, no. 2, Mar. 2012, pp. 164–173.
[13]	B. Song and C. J. Mitchell, “Scalable RFID security protocols supporting tag ownership transfer,” Comput. Commun., vol. 34, no. 4, Apr. 2011, pp. 556–566.
[14]	B. Ray, M. Chowdhury, J. Abawajy, “Secure Mobile RFID Ownership Transfer Protocol to Cover all Transfer Scenarios,” 7th International Conference on Computing and Convergence Technology,  2012, pp. 1185-1192 
[15]	R. Doss, W. Zhou, and S. Yu, “Secure RFID tag ownership transfer based on quadratic residues,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, Feb.2013, pp. 390–401. 
[16]	Y. Zuo, "Changing hands together: a secure group ownership transfer protocol for RFID tags," Hawaii International Conference on System Sciences, Koloa, Kauai, HI, 2010, pp. 1-10.
[17]	H. B. Chen, W. B. Lee, Y. H. Zhao, Y. L. Chen,“Enhancement of the RFID Security Method with Ownership Transfer, ” the 3rd International Conference on Ubiquitous Information Management and Communication, SKKU, Suwon, Korea, Jan. 2009, pp. 251-254.
[18]	Ming H. Yang, “Secure Multiple Group Ownership Transfer Protocol for Mobile RFID,”  Electronic Commerce Research and Applications, 2012, pp. 361-373.
[19]	B. Violino,“A Summary of RFID Standards,” RFID Jounal,Jan., 2005 http://www.rfidjournal.com/article/articleprint/1335/-1/1.
[20]	IPICO, “HIGH PERFORMANCE PRODUCTS FOR REAL WORLD APPLICATIONS,” http://www.ipico.com/index.cfm?pagepath=Products&id=5894, 2014.
[21]	GS1 TAIWAN, "已發布之EPCglobal標準概況, "  http://www.gs1tw.org/ twct/web/epcg.jsp, 2014.  
[22]	uID Center, “Certified ucode Tags,” http://www.uidcenter.org/learning-about-ucode/certifiedtags, 2014.
[23]	A. Mathuria , R. Safavi-Naini and P. Nickolas ,"On the automation of GNY logic",  Australian Computer Science Communications, vol. 17, no. 1, 1995, pp.370 -379.
[24]	F. Thayer , J. C. Herzog and J. D. Guttman ,"Strand spaces: Why is a security protocol correct?," Proceedings of 1998 IEEE Symposium on Security and Privacy,  1998.
[25]	F. J. T. FA!brega , J. C. Herzog and J. D. Guttman ,"Strand spaces: Proving security protocols correct," Journal of Computer Security,  vol. 7,  no. 2/3, 1999, pp.191 -230.
[26]	張克章、奚正德,「RFID相關應用與安全機制簡介」,資通安全專論,2007.
[27]	劉惠園, “簡介無線射頻(RFID )原理與應用,” wiki.csie.niu.edu.tw/ attachment.php?aid=1085, 2009.
[28]	Shih-Cheng Horng, “RFID概論第四章 RFID標籤與讀取器,” lms.ctl.cyut.edu.tw/sys/read_attach.php?id=902777, 2011.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信