文化大學機構典藏 CCUR:Item 987654321/45099
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46833/50693 (92%)
Visitors : 11847877      Online Users : 463
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/45099


    Title: 一個增強的密鑰變動型RFID認證協定
    An improvement to a secret key changing RFID authentication protocol
    Authors: 呂淑瑛
    Contributors: 資訊管理學系
    Keywords: 雙向認證
    資訊安全
    安全性分析
    無線射頻身份識別
    Date: 2019
    Issue Date: 2019-10-24 09:06:40 (UTC+8)
    Abstract: 隨著科技的不斷進步,人們已普遍使用RFID (無線射頻身份識別)來快速又有效率地處理生活中的大小事。此外,使用RFID技術的物聯網興起需要有效的RFID身份識別認證協定,才能安全地防止網路傳遞的資訊不被攻擊者惡意篡改、假冒及無法使用…等等,而造成使用者財務和信用的重大損失。
      本研究探討如何利用RFID認證協定中密鑰變動的認證機制來抵抗標籤仿冒及阻絕服務攻擊。本研究首先針對Dass和Om及Yu和Zhang的RFID認證協定進行安全性分析,說明其安全漏洞,並針對Dass和Om協定,提出改良協定,來更有效地抵抗標籤仿冒攻擊及阻絕服務攻擊。
      本研究並將改良協定與Dass和Om及Yu和Zhang協定進行安全性及效能分析比較,證明本研究的改良協定具有良好的計算成本且能有效抵抗標籤仿冒攻擊及阻絕服務攻擊。
    With the rapid development of technology, RFID (Radio Frequency Identification) has been widely used in everything of life. Also, the more massive using of RFID, the authentication protocol to secure information transmitted by the network are more important. The effective and efficient scheme can protect users from maliciously falsified, impersonated and unusable attacks that result in huge economic losses.
    This study explores how to use the schemes of key changes in RFID authentication protocols to defense tag spoofing and Denial-of-Service attacks. Firstly, we find the Dass and Oms and Yu and Zhangs RFID authentication protocols still have some security weaknesses. Secondly, we propose a light improved protocol for Dass and Oms scheme to resist attacks. Finally, we compare the improvement protocol with the Dass and Oms and Yu and Zhangs schemes with security and performance analysis that show the improved protocol has better performance and can effectively resist tag counterfeited and Dos attacks.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] Thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML129View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback