A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems

碩士 === 中華大學 === 資訊工程學系碩士班 === 100 === Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID syst...

Full description

Bibliographic Details
Main Authors: Yuan-Yu Chu, 朱元佑
Other Authors: Lin-Chuan Wu
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/11318604547357134625
id ndltd-TW-100CHPI5392015
record_format oai_dc
spelling ndltd-TW-100CHPI53920152015-10-13T21:17:10Z http://ndltd.ncl.edu.tw/handle/11318604547357134625 A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems 解決EPCglobal標準常見安全問題之RFID認證協定 Yuan-Yu Chu 朱元佑 碩士 中華大學 資訊工程學系碩士班 100 Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID system not only can replace the traditional barcode system, but also to apply in various fields. However, some illegal users begin to study into the vulnerability of RFID system to obtain legal user’s private data when the RFID system is applied in a wide range of areas. Therefore, to ensure the authentication protocol’s security and privacy becomes an important issue. In order to ensure the authentication protocol’s security and privacy, many scholars have joined to research. The main purpose is hoping to design a secure authentication protocol to protect the user’s privacy. Owing to promotion of the EPCglobal organization, the standards of RFID system are more complete and can operate freely in the world without any restriction. The EPC Class 1 Generation 2 standard is the most popular of all standards. In 2011, Khor et al. designed an RFID authentication protocol according to the EPC Class 1 Generation 2 standard. However, we found that Khor et al. proposed authentication protocol will be suffer to denial of service attacks and caused the data update desynchronization. In our research, we will point out the problem that authentication protocol may be suffer to denial of service attacks and caused the desynchronization proposed by Khor et al. and propose an improvement authentication protocol to solve this problem. Compare with the Khor et al. method, the calculations are more than 1 random number generator, and 2 cyclic redundancy code computing, and the storages are more than 3 data. Nevertheless, in order to enhance the security of the authentication protocol and stand on the premise that not pay an excessive amount of computations and storages, we not only solve the lack of Khor et al., but also satisfy all security requirement to ensure the user’s data privacy. Provide a new concept in the design of RFID security authentication protocol. Lin-Chuan Wu 吳林全 2012 學位論文 ; thesis 63 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中華大學 === 資訊工程學系碩士班 === 100 === Recently, Radio Frequency Identification (RFID) system is developed very well whether it has considerable attention in academic or industry. Due to RFID system is popularized widely and identify object more quickly and conveniently. It is believed that RFID system not only can replace the traditional barcode system, but also to apply in various fields. However, some illegal users begin to study into the vulnerability of RFID system to obtain legal user’s private data when the RFID system is applied in a wide range of areas. Therefore, to ensure the authentication protocol’s security and privacy becomes an important issue. In order to ensure the authentication protocol’s security and privacy, many scholars have joined to research. The main purpose is hoping to design a secure authentication protocol to protect the user’s privacy. Owing to promotion of the EPCglobal organization, the standards of RFID system are more complete and can operate freely in the world without any restriction. The EPC Class 1 Generation 2 standard is the most popular of all standards. In 2011, Khor et al. designed an RFID authentication protocol according to the EPC Class 1 Generation 2 standard. However, we found that Khor et al. proposed authentication protocol will be suffer to denial of service attacks and caused the data update desynchronization. In our research, we will point out the problem that authentication protocol may be suffer to denial of service attacks and caused the desynchronization proposed by Khor et al. and propose an improvement authentication protocol to solve this problem. Compare with the Khor et al. method, the calculations are more than 1 random number generator, and 2 cyclic redundancy code computing, and the storages are more than 3 data. Nevertheless, in order to enhance the security of the authentication protocol and stand on the premise that not pay an excessive amount of computations and storages, we not only solve the lack of Khor et al., but also satisfy all security requirement to ensure the user’s data privacy. Provide a new concept in the design of RFID security authentication protocol.
author2 Lin-Chuan Wu
author_facet Lin-Chuan Wu
Yuan-Yu Chu
朱元佑
author Yuan-Yu Chu
朱元佑
spellingShingle Yuan-Yu Chu
朱元佑
A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
author_sort Yuan-Yu Chu
title A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
title_short A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
title_full A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
title_fullStr A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
title_full_unstemmed A RFID Authentication Protocol Conforming EPCglobal Standard to Solve Some Security Problems
title_sort rfid authentication protocol conforming epcglobal standard to solve some security problems
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/11318604547357134625
work_keys_str_mv AT yuanyuchu arfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems
AT zhūyuányòu arfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems
AT yuanyuchu jiějuéepcglobalbiāozhǔnchángjiànānquánwèntízhīrfidrènzhèngxiédìng
AT zhūyuányòu jiějuéepcglobalbiāozhǔnchángjiànānquánwèntízhīrfidrènzhèngxiédìng
AT yuanyuchu rfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems
AT zhūyuányòu rfidauthenticationprotocolconformingepcglobalstandardtosolvesomesecurityproblems
_version_ 1718058727155695616