南華大學機構典藏系統:Item 987654321/18877
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 18278/19583 (93%)
Visitors : 1024498      Online Users : 595
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://nhuir.nhu.edu.tw/handle/987654321/18877


    Title: 一個基於ECC的有效率RFID互相認證方法
    Other Titles: An efficient RFID mutual authentication scheme based on ECC
    Authors: 吳政倫
    Wu, Cheng-lun
    Contributors: 資訊管理學系碩士班
    周志賢
    Chih-hsien Chou
    Keywords: 互相認證;前向保密;位置隱私;無線射頻辨識
    forward secrecy;mutual authentication;location privacy;Radio Frequency Identification (RFID)
    Date: 2011
    Issue Date: 2015-03-03 11:30:49 (UTC+8)
    Abstract:   近年來,無線射頻辨識(RFID)系統被應用在許多行業中,像是使用RFID來管理醫療藥物,或在遊樂園裡尋找失踪兒童,可見RFID應用的範圍相當廣泛。這些應用基本上可分為兩種類型:非公鑰密碼系統為基礎與公鑰密碼系統為基礎。但是,許多的研究發現,它們的隱私問題受到嚴重威脅。因此,有許多學者嘗試解決這些問題。其中大部分的研究著重在探討如何將低成本的Tag應用在大規模的RFID系統中。但是,經過分析後,我們發現這些研究有一些共同問題,像是容易遭受實體攻擊或非同步攻擊。因此,在本文中,我們將設計一個基於橢圓曲線密碼系統(ECC)的有效率RFID互相認證方法,來避免這些問題。經過分析後,我們發現所提的方法不僅能抵抗各種攻擊,而且在安全需求與計算量上更優於其他ECC為基礎的RFID方法。
      Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs which use RFID to manage the placing of drugs and amusement park using RFID to search for missing children. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy problem. Therefore, researchers tried to resolve this problem. Most of them investigated on how low-cost RFID tags can be used in large-scale systems. However, after analyses, we found these studies have some problems, such as suffering physical attack, or de-synch attack. Hence, in this paper, we try to design an efficient RFID scheme based on Elliptic Curve Cryptography (ECC) to avoid these problems. After analyses, we conclude that our scheme not only can resist various kinds of attacks but also outperforms the other ECC based RFID schemes in security requirements with needing only little extra elliptic curve point multiplications.
    Appears in Collections:[Department of Information Management] Disserations and Theses

    Files in This Item:

    File Description SizeFormat
    099NHU05396027-001.pdf637KbAdobe PDF23View/Open
    index.html0KbHTML395View/Open


    All items in NHUIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback