A Forward Secure RFID protocol conforming to Gen-2 standard

碩士 === 明新科技大學 === 資訊管理研究所 === 97 === In recent years, RFID (Radio Frequency Identification) has been widely applied in many fields to identify or track objects. As its deployment costs reduced and applicable functions extended, RFID is gradually replacing the traditional bar code systems, giving RFI...

Full description

Bibliographic Details
Main Authors: Hsu Yi, 徐謚
Other Authors: Tzu-Chang Yeh
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/09616972414748648658
id ndltd-TW-097MHIT5396002
record_format oai_dc
spelling ndltd-TW-097MHIT53960022015-11-16T16:09:09Z http://ndltd.ncl.edu.tw/handle/09616972414748648658 A Forward Secure RFID protocol conforming to Gen-2 standard 具向前安全性的RFID Gen-2協定 Hsu Yi 徐謚 碩士 明新科技大學 資訊管理研究所 97 In recent years, RFID (Radio Frequency Identification) has been widely applied in many fields to identify or track objects. As its deployment costs reduced and applicable functions extended, RFID is gradually replacing the traditional bar code systems, giving RFID great potential in development. As RFID identifies by radio frequency signals, attackers may eavesdrop RFID communications or use illegal readers for arbitrary reading, and thus creating privacy and security concerns. With significant drop in cost, RFID is expected to be universally used in our daily lives. Consumers may carelessly discard objects with embedded tags after use, which may be easily obtained by attackers. Then, the attackers may compromise the data stared in the tags and identify transaction records of the tags from back-end database to track them or their holders. Therefore, forward secrecy will become a major topic of RFID in the near future. The security protocols proposed in recent literature all rely on updating the shared key of the back-end database and the tag after each reading to achieve forward secrecy. The updated methods are categorized into three types: hash chain, pseudo-random number generator and other methods. However, the computing power and capacity of the tags conforming to the new global standard, EPC Class 1 Generation 2, are limited, so hash functions and other complex computations are not supported. The solutions proposed for the standard have their security problems. Thus, this study aims to discuss the forward secrecy of RFID, analyze the existing security mechanisms and propose a lightweight protocol to effectively promote RFID application security, allowing consumers to enjoy the technological convenience brought by RFID. Tzu-Chang Yeh 葉慈章 2009 學位論文 ; thesis 78 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 明新科技大學 === 資訊管理研究所 === 97 === In recent years, RFID (Radio Frequency Identification) has been widely applied in many fields to identify or track objects. As its deployment costs reduced and applicable functions extended, RFID is gradually replacing the traditional bar code systems, giving RFID great potential in development. As RFID identifies by radio frequency signals, attackers may eavesdrop RFID communications or use illegal readers for arbitrary reading, and thus creating privacy and security concerns. With significant drop in cost, RFID is expected to be universally used in our daily lives. Consumers may carelessly discard objects with embedded tags after use, which may be easily obtained by attackers. Then, the attackers may compromise the data stared in the tags and identify transaction records of the tags from back-end database to track them or their holders. Therefore, forward secrecy will become a major topic of RFID in the near future. The security protocols proposed in recent literature all rely on updating the shared key of the back-end database and the tag after each reading to achieve forward secrecy. The updated methods are categorized into three types: hash chain, pseudo-random number generator and other methods. However, the computing power and capacity of the tags conforming to the new global standard, EPC Class 1 Generation 2, are limited, so hash functions and other complex computations are not supported. The solutions proposed for the standard have their security problems. Thus, this study aims to discuss the forward secrecy of RFID, analyze the existing security mechanisms and propose a lightweight protocol to effectively promote RFID application security, allowing consumers to enjoy the technological convenience brought by RFID.
author2 Tzu-Chang Yeh
author_facet Tzu-Chang Yeh
Hsu Yi
徐謚
author Hsu Yi
徐謚
spellingShingle Hsu Yi
徐謚
A Forward Secure RFID protocol conforming to Gen-2 standard
author_sort Hsu Yi
title A Forward Secure RFID protocol conforming to Gen-2 standard
title_short A Forward Secure RFID protocol conforming to Gen-2 standard
title_full A Forward Secure RFID protocol conforming to Gen-2 standard
title_fullStr A Forward Secure RFID protocol conforming to Gen-2 standard
title_full_unstemmed A Forward Secure RFID protocol conforming to Gen-2 standard
title_sort forward secure rfid protocol conforming to gen-2 standard
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/09616972414748648658
work_keys_str_mv AT hsuyi aforwardsecurerfidprotocolconformingtogen2standard
AT xúshì aforwardsecurerfidprotocolconformingtogen2standard
AT hsuyi jùxiàngqiánānquánxìngderfidgen2xiédìng
AT xúshì jùxiàngqiánānquánxìngderfidgen2xiédìng
AT hsuyi forwardsecurerfidprotocolconformingtogen2standard
AT xúshì forwardsecurerfidprotocolconformingtogen2standard
_version_ 1718131124411039744