RFID mutual Authentication Protocol based on Hamming Distance
碩士 === 國立交通大學 === 網路工程研究所 === 99 === RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/56512911502492089377 |
id |
ndltd-TW-099NCTU5726035 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCTU57260352015-10-13T20:37:27Z http://ndltd.ncl.edu.tw/handle/56512911502492089377 RFID mutual Authentication Protocol based on Hamming Distance 基於Hamming Distance之上的RFID相互認證協定 Li, Perry 李培宇 碩士 國立交通大學 網路工程研究所 99 RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed. The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system. The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation. Tsai, Wen-Nung 蔡文能 2011 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 網路工程研究所 === 99 === RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed.
The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system.
The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation.
|
author2 |
Tsai, Wen-Nung |
author_facet |
Tsai, Wen-Nung Li, Perry 李培宇 |
author |
Li, Perry 李培宇 |
spellingShingle |
Li, Perry 李培宇 RFID mutual Authentication Protocol based on Hamming Distance |
author_sort |
Li, Perry |
title |
RFID mutual Authentication Protocol based on Hamming Distance |
title_short |
RFID mutual Authentication Protocol based on Hamming Distance |
title_full |
RFID mutual Authentication Protocol based on Hamming Distance |
title_fullStr |
RFID mutual Authentication Protocol based on Hamming Distance |
title_full_unstemmed |
RFID mutual Authentication Protocol based on Hamming Distance |
title_sort |
rfid mutual authentication protocol based on hamming distance |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/56512911502492089377 |
work_keys_str_mv |
AT liperry rfidmutualauthenticationprotocolbasedonhammingdistance AT lǐpéiyǔ rfidmutualauthenticationprotocolbasedonhammingdistance AT liperry jīyúhammingdistancezhīshàngderfidxiānghùrènzhèngxiédìng AT lǐpéiyǔ jīyúhammingdistancezhīshàngderfidxiānghùrènzhèngxiédìng |
_version_ |
1718049889194082304 |