English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140887 (78%)
Visitors : 46290761      Online Users : 1454
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/61202
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/61202


    Title: 一個極輕量級RFID認證協議的安全性分析與改良
    Security Analysis and Improvements on an Authentication Protocols in Ultra-Lightweight RFID Systems
    Authors: 黃思瑋
    Contributors: 左瑞麟
    黃思瑋
    Keywords: 極輕量級RFID認證協議
    複製攻擊
    物理不可克隆函數
    Date: 2013
    Issue Date: 2013-10-01 13:47:33 (UTC+8)
    Abstract: 無線射頻識別(RFID)技術是一種無線通訊技術。利用無線電射頻信號,以非接觸的方式,識別特定目標並讀寫相關數據,由後端資料庫系統取得相關資料。因為具備了不需要視覺接觸就能夠遠距離辨識身份和成本低廉的特性,使得這項技術運用在各種領域應用上能帶來前所未有的便利。然而,RFID技術所遇到的最大困難點在於其協定中缺乏隱私保護及資料安全。這使得透過無線訊號傳遞的資料,容易遭受到攻擊者的監聽、掃瞄與追蹤。許多學者為了解決這個問題有提出過許多的方案。其中Bassil等學者於2012年提出基於PUF的輕量級RFID認證方案,此方案可防止被物理克隆攻擊,但此方案所提出之協議仍有安全上的弱點。因此,在此篇論文中,我們基於Bassil等學者提出的方案,分析其安全性漏洞,並在兼顧安全性與低成本的特性下,提出新的基於PUF函數的新的輕量級RFID認證協議。
    Reference: [1] R. Bassil, W. El-Beaino, W. Itani, A. Kayssi, and A. Chehab. "PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. " International Journal of RFID Security and Cryptography, 1(1), March (2012)
    [2] H. Chien. "SASI: A New Ultralight weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4(4)Oct.-Dec. (2007)
    [3] T.Cao, E. Bertino, and H. Lei.“Security Analysis of the SASI Protocol”.IEEE Transactions on Dependable and Secure Computing (2008).
    [4] S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, "Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications,” in Proc. IEEE International Conference on RFID, April (2008).
    [5] A. Eghdamian and A. Samsudin. "A secure protocol for ultralightweight radio frequency identication (RFID) tags. " In Informatics Engineering and Infor-mation Science ICIEIS 2011, volume 251 of Communications in Computer and Information Science , Kuala Lumpur, Malaysia, Springer. November (2011)
    [6] EPCglobal, http://www.epcglobalinc.org/, 2007.
    [7] G. Y. Jin, X. Y. Lu, M. S. Park. "An Indoor Localization Mechanism Using Active RFID Tag. " In SUTC, (2006)
    [8] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda. "M2AP: a minimalist mutual-authentication protocol for lowcost RFID Tags. "inProc.International Conference on Ubiquitous Intelligence and Computing (2006)
    [9] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda."LMAP: a real lightweight mutual authentication protocol for low-cost RFID Tags." in Proc. Workshop RFID Security.(2006)
    [10] P. P. Lopez, J. C. H. Castro, J. M. Estevez-Tapiador, and A. Ribagorda. "EMAP: An efficient mutual authentication protocol for low-cost RFID Tags. " Springer-Verlag,In Proc. of IS`06, volume 4277 of LNCS.(2006)
    [11] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda. "Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol", In Workshop on Information Security Applications, Volume 5379 of LNCS, (2008)
    [12] T. Li and G. Wang. "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols", Proc. 22nd IFIP TC-11 Int’1Information Security Conference.(2007)
    [13] Y. Lee. "Two ultralightweight authentication protocols for low-cost RFID tags. "Applied Mathematics and Information Sciences, 6(2S) May (2012)
    [14] L. M. Ni, Y.H. Liu, Y.C. Lau, A.P. Patil. "LANDMARC: Indoor location sensing using active RFID: Pervasive computing and communications", Wireless Networks, 10 (6). (2004)
    [15] M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic Approach to Privacy-Friendly Tags" RFID Privacy Workshop,November (2003)
    [16] M. Safkhani, N. Bagheri, M. Naderi, "Security Analysis of a PUF based RFID Authentication Protocol" 704 Cryptology ePrintArchive:Listing for 2011
    [17] I. Vajda and L. Butty´an, “Lightweight authentication protocols for low-cost RFID Tags,” 2nd Workshop on Security in Ubiquitous Computing (2003)
    [18] Y. Zhao, Y. Liu, L.M. Ni, "VIRE: active RFID-based localization using virtual reference elimination, " in Proceedings of the 2007 International Conference on Parallel Processing, IEEE, Piscataway, NJ, USA (2007)
    [19] Y. Zhang, P. kitsos. "Security in RFID and Sensor Networks" Auerbach Publications (2009)
    Description: 碩士
    國立政治大學
    資訊科學學系
    100753021
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0100753021
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    302101.pdf679KbAdobe PDF2228View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback