中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/62966
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 80990/80990 (100%)
造访人次 : 44277800      在线人数 : 866
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/62966


    题名: 超輕量RFID交互驗證協定;An Ultralightweight RFID Mutual Authentication Protocol
    作者: 黃興燦;江振瑞
    贡献者: 國立中央大學資訊工程系
    关键词: 資訊工程;硬體工程;資訊科學;軟體
    日期: 2012-12-01
    上传时间: 2014-03-17 14:15:32 (UTC+8)
    出版者: 行政院國家科學委員會
    摘要: 研究期間:10108~10207;Radio frequency identification (RFID) system is vulnerable to various attacks, since data transmission between the reader and tags is based on wireless communication. Typical attacks are forged-reader attack, forged-server attack, man-in-the-middle attack, tracking attack, replay attack, forward secrecy attack and denial of service attack, etc. Some methods like Karthikeyan-Nesterenko’s scheme, Chien-Chen’s scheme, Chien’s scheme, Lo-Yeh's scheme, and Sun-Ting-Wang's scheme have been proposed to resist the attacks. They still have some flaws, though. This project is intended to develop a mutual authentication protocol between the reader and tags conforming EPC Class 1 Generation 2 (EPC C1G2) standard to resist the attacks just mentioned. The challenge is that EPC C1G2 tags have limited memory and can perform only ultralightweight operations like random number generation, pseudo random number generator (PRNG) and exclusive-or (XOR) operator. We plan to make the reader and tags first register with a server to obtain symmetric keys and pseudo IDs for later communications. We then plan to realize the protocol by using proactively changing symmetric keys (one for communication, and the other for authentication) and pseudo IDs and by embedding a random number in every message sent between the reader and a tag to resist the above-mentioned attacks. We will conduct thorough security analysis for the developed protocol and comprehensively compare it with other related methods to demonstrate it is indeed better than others.
    關聯: 財團法人國家實驗研究院科技政策研究與資訊中心
    显示于类别:[資訊工程學系] 研究計畫

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML336检视/开启


    在NCUIR中所有的数据项都受到原著作权保护.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明