摘要: | RFID是一種利用無線電波訊號的自動辨識技術,因其非接觸式且無方向性的特性所帶來的方便性,使得RFID的相關應用非常廣泛,被認為是未來生活中不可或缺的重要社會基礎建設之一。然而,由於RFID標籤本身的硬體資源限制,以及其無線電波溝通的性質,讓RFID系統存在許多安全性問題,RFID認證協定則是確保RFID系統安全的方法之一。 目前已有非常多的RFID認證協定被提出,然而,現有的RFID認證協定之研究假設,多未考量行動RFID系統中不安全的溝通環境,無法適用於行動RFID系統。此外,許多RFID認證協定對於標籤的運算負荷過重,不符合EPC國際標準規範的輕量級運算,或是後端伺服器查詢標籤資料的運算成本過大,影響RFID系統效能,無法有效率地解決RFID系統存在的安全性問題。 針對這些問題,本研究提出新的RFID認證協定-“DEAP: A Dynamic and Efficient Authentication Protocol for Mobile RFID Systems”,以解決行動RFID系統環境下潛在的安全性問題;再者DEAP的運算,皆符合EPC的使用輕量級運算規定,並且後端伺服器只需使用到少量運算便可查詢到標籤與讀取器資料,達到減輕標籤、讀取器和後端伺服器三方的運算負擔,有效改善系統效率。 最後,透過分析證明本研究所提出的新RFID認證協定,確實能有效確保行動RFID系統的安全性,可抵抗所有類型的RFID攻擊,也量化並比較DEAP所需的運算複雜度。 ;Radio Frequency Identification (RFID) is a technology to automate identification by radio wave signals. Due to the convenience brought by its non-contact and non-directional characteristic, the applications related to RFID are very wide so that RFID have been considered as one of indispensable important society infrastructure in the future life. However, because of RFID tags inherent limitations of hardware resources and the nature of radio waves to communicate, there are many security issues in RFID systems, and RFID authentication protocol is one kind of methods to ensure the security of RFID systems. Many RFID authentication protocols are proposed currently, but most of the research hypothesis of current RFID authentication protocols don’t take into consideration the insecure communication environment in mobile RFID systems, which can’t be applied to mobile RFID systems. Besides, many RFID authentication protocols bring overmuch computation load to RFID tags, which doesn’t conform to the lightweight operations in EPC international standard, or make back-end server spend too much cost to search RFID tag data, which affect the RFID system performance, so they can’t solve the security issues in RFID systems effectively. Against these problems, this study proposes a new RFID authentication protocol named“DEAP: A Dynamic and Efficient Authentication Protocol for Mobile RFID Systems” to solve the potential security issues in mobile RFID system environment. Moreover, all operations in DEAP conform to the lightweight operations that EPC formulates, and the back-end server only use few computation to query RFID tag and reader data, which achieves to ease the computation load of RFID tags, RFID readers and back-end server as well as improves system efficiency effectively.. Finally, through analysis and comparison, we prove the new RFID authentication protocol that this study proposes can indeed ensure the security in mobile RFID systems to resist all kinds of RFID attacks, and also quantify as well as compare the computational complexity that DEAP needs. |