:::

詳目顯示

回上一頁
題名:RFID所有權轉移協定
書刊名:電子商務研究
作者:葉慈章 引用關係王志翔林儷珊
作者(外文):Yeh, Tzu-changWang, Zhi-xiangLin, Li-shan
出版日期:2012
卷期:10:2
頁次:頁217-234
主題關鍵詞:安全隱私所有權轉移RFIDSecurityPrivacyOwnership transfer
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:24
無線射頻識別(radio frequency identification, RFID)系統由於成本低並具有遠距離自動辨識的能力,已逐漸取代傳統條碼;隨著RFID的普及,嵌有RFID標籤的物品在其生命週期內可能會進行多次的所有權轉移,然而透過空氣傳輸的訊息容易遭到竊聽、攔截、竄改,產生安全與隱私的問題。2011年Chen、Lai、Chen、Deng與Hwang等人提出RFID所有權轉移協定,然而我們發現其有假冒攻擊、向前安全性、阻斷服務攻擊與舊擁有者隱私的問題;本論文將詳細分析此協定,並提出改善以避免上述問題,使其可應用於高安全需求的環境。
Due to its low cost and remote automatic identification ability, RFID is taking place of barcodes. With the popularity of RFID, objects embedded with tags might be transferred to new owners for many times during their life cycle. However, the information transmitted in the air could easily be eavesdropped, intercepted or modified due to its radio transmission nature. The issues of security and privacy are thus raised. In 2011, Chen, Lai, Chen, Deng and Hwang proposed RFID ownership transfer authorization systems conforming EPCglobal Class-1 Generation-2 standards. However, we found that their protocols are vulnerable to impersonation attacks, forward security attacks, denial of service attacks and old owner privacy problem. This paper will give demonstrations on what have caused these weaknesses, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above. The improved protocols could thus be applied in high security demanding environments.
期刊論文
1.Fouladgar, S.、Afifi, H.(2007)。A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags。Journal of Communications,2(6),6-13。  new window
2.Osaka, K.、Takagi, T.、Yamazaki, K.、Takahashi, O.(2006)。An efficient and secure RFID security method with ownership transfer。LNCS,4456,778-787。  new window
3.Peris-Lopez, P.、Hemandez-Castro, J. C.、Estevez-Tapiador, J. M.、Li, T. Y.、Li, Y. J.(2010)。Vulnerability analysis of RFID protocols for tag ownership transfer。Computer Networks,54(9),1502-1508。  new window
4.Song, B.、Mitchell, J. C.(2011)。Scalable RFID security protocols supporting tag ownership transfer。Computer Communications,34(4),556-566。  new window
5.Rizomiliotis, P.、Rekleitis, E.、Gritzalis, S.(2009)。Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags。Communications Letters,13(4),274-276。  new window
6.Roberts, C. M.(2006)。Radio frequency identification (RFID)。Computers & Security,25(1),18-26。  new window
7.Sheng, Q. Z.、Li, X.、Zeadally, S.(2009)。Enableing Next-Generation RFID Applications: Solutions and Challenges。Computer,41(9),21-28。  new window
8.Molnar, D.、Soppera, A.、Wagner, D.(2005)。A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Tranlsfer of RFID Tags。LNCS,3897,276-290。  new window
9.Peris-Lopez, P.、Hemandez-Castro, J.C.、Estevez-Tapiador, J.M.、Ribagorda, A.(2009)。Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard。Computer Standards & Interfaces,31(2),372-380。  new window
10.Chen, C. L.、Lai, Y. L.、Chen, C. C.、Deng, Y. Y.、Hwang, Y. C.(2011)。RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards。International Journal of Network Security,13(1),41-48。  new window
11.Deursen, T.V.、Mauw, S.、Radomirovic, S.、Vullers, P.(2009)。Secure Ownership and Ownership Transfer in RPID Systems。LNCS,5789,637-654。  new window
會議論文
1.Song, B.(2008)。RFID tag ownership transfer。Workshop on RFID Security-RFIDSec'08。  new window
2.Song, B.、Mitchell, C. J.(2008)。RFID authentication protocol for low-cost tags。First ACM Conference on Wireless Network Security,140-147。  new window
3.Seth, A.、Beg, M.(2006)。Achieving Privacy and Security in Radio Frequency Identification。  new window
4.Qingsong, Y.、Yong, Q.、Jinsong, H.、Jizhong, Z.、Xiangyang, L.、Yunhao, L.(2009)。Randomizing RFID private authentication。  new window
5.Yoon, E.J.、Yoo, K.Y.(2008)。Two Security Problems of RPID Security Method with Ownership Transfer68-73。  new window
6.Song, B.、Mitchell, J. C.(2009)。Scalable RFID Pseudonym Protocol。The Third International Conference on Network and System Security-NSS 2009, IEEE Computer Society。Queensland, Australia。216-224。  new window
學位論文
1.Song, B.(2009)。RFID Authentication Protocols using Symmetric Cryptography(博士論文)。Royal Holloway University of London。  new window
其他
1.Cai, S.,Li, Y.,Li, T.,Deng, R.(2009)。Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions。  new window
2.Erguler, I.,Anarim, E.(2010)。Scalability and Security Conflict for RFID Authentication Protocols。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE