A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
碩士 === 中華大學 === 資訊工程學系碩士班 === 100 === Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID syst...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/11318604547357134625 |
id |
ndltd-TW-100CHPI5392015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100CHPI53920152015-10-13T21:17:10Z http://ndltd.ncl.edu.tw/handle/11318604547357134625 A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems 解決EPCglobal標準常見安全問題之RFID認證協定 Yuan-Yu Chu 朱元佑 碩士 中華大學 資訊工程學系碩士班 100 Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID system not only can replace the traditional barcode system, but also to apply in various fields. However, some illegal users begin to study into the vulnerability of RFID system to obtain legal user’s private data when the RFID system is applied in a wide range of areas. Therefore, to ensure the authentication protocol’s security and privacy becomes an important issue. In order to ensure the authentication protocol’s security and privacy, many scholars have joined to research. The main purpose is hoping to design a secure authentication protocol to protect the user’s privacy. Owing to promotion of the EPCglobal organization, the standards of RFID system are more complete and can operate freely in the world without any restriction. The EPC Class 1 Generation 2 standard is the most popular of all standards. In 2011, Khor et al. designed an RFID authentication protocol according to the EPC Class 1 Generation 2 standard. However, we found that Khor et al. proposed authentication protocol will be suffer to denial of service attacks and caused the data update desynchronization. In our research, we will point out the problem that authentication protocol may be suffer to denial of service attacks and caused the desynchronization proposed by Khor et al. and propose an improvement authentication protocol to solve this problem. Compare with the Khor et al. method, the calculations are more than 1 random number generator, and 2 cyclic redundancy code computing, and the storages are more than 3 data. Nevertheless, in order to enhance the security of the authentication protocol and stand on the premise that not pay an excessive amount of computations and storages, we not only solve the lack of Khor et al., but also satisfy all security requirement to ensure the user’s data privacy. Provide a new concept in the design of RFID security authentication protocol. Lin-Chuan Wu 吳林全 2012 學位論文 ; thesis 63 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中華大學 === 資訊工程學系碩士班 === 100 === Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID system not only can replace the traditional barcode system, but also to apply in various fields.
However, some illegal users begin to study into the vulnerability of RFID system to obtain legal user’s private data when the RFID system is applied in a wide range of areas. Therefore, to ensure the authentication protocol’s security and privacy becomes an important issue. In order to ensure the authentication protocol’s security and privacy, many scholars have joined to research. The main purpose is hoping to design a secure authentication protocol to protect the user’s privacy. Owing to promotion of the EPCglobal organization, the standards of RFID system are more complete and can operate freely in the world without any restriction. The EPC Class 1 Generation 2 standard is the most popular of all standards. In 2011, Khor et al. designed an RFID authentication protocol according to the EPC Class 1 Generation 2 standard. However, we found that Khor et al. proposed authentication protocol will be suffer to denial of service attacks and caused the data update desynchronization.
In our research, we will point out the problem that authentication protocol may be suffer to denial of service attacks and caused the desynchronization proposed by Khor et al. and propose an improvement authentication protocol to solve this problem. Compare with the Khor et al. method, the calculations are more than 1 random number generator, and 2 cyclic redundancy code computing, and the storages are more than 3 data. Nevertheless, in order to enhance the security of the authentication protocol and stand on the premise that not pay an excessive amount of computations and storages, we not only solve the lack of Khor et al., but also satisfy all security requirement to ensure the user’s data privacy. Provide a new concept in the design of RFID security authentication protocol.
|
author2 |
Lin-Chuan Wu |
author_facet |
Lin-Chuan Wu Yuan-Yu Chu 朱元佑 |
author |
Yuan-Yu Chu 朱元佑 |
spellingShingle |
Yuan-Yu Chu 朱元佑 A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
author_sort |
Yuan-Yu Chu |
title |
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
title_short |
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
title_full |
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
title_fullStr |
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
title_full_unstemmed |
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems |
title_sort |
rfid authentication protocol conforming epcglobal standard to solve some security problems |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/11318604547357134625 |
work_keys_str_mv |
AT yuanyuchu arfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems AT zhūyuányòu arfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems AT yuanyuchu jiějuéepcglobalbiāozhǔnchángjiànānquánwèntízhīrfidrènzhèngxiédìng AT zhūyuányòu jiějuéepcglobalbiāozhǔnchángjiànānquánwèntízhīrfidrènzhèngxiédìng AT yuanyuchu rfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems AT zhūyuányòu rfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems |
_version_ |
1718058727155695616 |