南華大學機構典藏系統:Item 987654321/18877
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 18278/19583 (93%)
造访人次 : 1073627      在线人数 : 493
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://nhuir.nhu.edu.tw/handle/987654321/18877


    题名: 一個基於ECC的有效率RFID互相認證方法
    其它题名: An efficient RFID mutual authentication scheme based on ECC
    作者: 吳政倫
    Wu, Cheng-lun
    貢獻者: 資訊管理學系碩士班
    周志賢
    Chih-hsien Chou
    关键词: 互相認證;前向保密;位置隱私;無線射頻辨識
    forward secrecy;mutual authentication;location privacy;Radio Frequency Identification (RFID)
    日期: 2011
    上传时间: 2015-03-03 11:30:49 (UTC+8)
    摘要:   近年來,無線射頻辨識(RFID)系統被應用在許多行業中,像是使用RFID來管理醫療藥物,或在遊樂園裡尋找失踪兒童,可見RFID應用的範圍相當廣泛。這些應用基本上可分為兩種類型:非公鑰密碼系統為基礎與公鑰密碼系統為基礎。但是,許多的研究發現,它們的隱私問題受到嚴重威脅。因此,有許多學者嘗試解決這些問題。其中大部分的研究著重在探討如何將低成本的Tag應用在大規模的RFID系統中。但是,經過分析後,我們發現這些研究有一些共同問題,像是容易遭受實體攻擊或非同步攻擊。因此,在本文中,我們將設計一個基於橢圓曲線密碼系統(ECC)的有效率RFID互相認證方法,來避免這些問題。經過分析後,我們發現所提的方法不僅能抵抗各種攻擊,而且在安全需求與計算量上更優於其他ECC為基礎的RFID方法。
      Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs which use RFID to manage the placing of drugs and amusement park using RFID to search for missing children. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy problem. Therefore, researchers tried to resolve this problem. Most of them investigated on how low-cost RFID tags can be used in large-scale systems. However, after analyses, we found these studies have some problems, such as suffering physical attack, or de-synch attack. Hence, in this paper, we try to design an efficient RFID scheme based on Elliptic Curve Cryptography (ECC) to avoid these problems. After analyses, we conclude that our scheme not only can resist various kinds of attacks but also outperforms the other ECC based RFID schemes in security requirements with needing only little extra elliptic curve point multiplications.
    显示于类别:[資訊管理學系] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    099NHU05396027-001.pdf637KbAdobe PDF23检视/开启
    index.html0KbHTML396检视/开启


    在NHUIR中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈