A Transport Mechanism of RFID Security Authentication Based on WiMAX Network Environment

碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === WiMAX is the new technical standard of wireless network in recent years. Compared with 802.11x, WiFi, Zigbee, and Sensor Network ... etc., WiMAX can provide more powerful encryption to achieve mutual authentication and to ensure that data will be transmitted...

Full description

Bibliographic Details
Main Authors: Cheng-Chieh Hsu, 許政傑
Other Authors: Hung-Tu Liao
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/13312212096221524795
Description
Summary:碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === WiMAX is the new technical standard of wireless network in recent years. Compared with 802.11x, WiFi, Zigbee, and Sensor Network ... etc., WiMAX can provide more powerful encryption to achieve mutual authentication and to ensure that data will be transmitted under safe environment. This paper will design a secure data authentication mechanism to solve the problems of data transmission safety involved with RFID and WiMAX. The mechanism is to exchange information between RFID and back-end server through WiMAX and to encrypt related data obtained from WiMAX and thus enhance the security mechanism which is short of in RFID wireless environment. The main technique in this mechanism is to process transmission encryption through WiMAX channel and one-way function to do authentication in addition to implementing WiMAX PKMv2 to achieve safely mutual authentication and data transmission. Further, through authentication, get key and tag information of users and then find out confidential data related to tag information from the back-end database and put it into encryption procedure by using key asymmetric calculation and verify data correctness during authentication process. As soon as the data transmission completes, the mechanism will update tag information by using random numbers to prevent tag repeating usage meanwhile keeping data integrity and confidentiality. In order to prove the data encryption mechanism proposed in this paper can prevent from vicious attack effectively, we will compare it with other encryption mechanism by examine their calculation time and security analysis and then verify its effectiveness in integrity, confidentiality, and non-repudiation.