Dissertations / Theses on the topic 'RFID mutual authentication protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'RFID mutual authentication protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.
Find full textChung, Harold. "Chaos Based RFID Authentication Protocol." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24250.
Full textJafri, Asad Abbas. "Enhanced secured authentication protocol for RFID systems." Thesis, Wichita State University, 2008. http://hdl.handle.net/10057/2029.
Full textThesis [M.S] - Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
Jafri, Asad Abbas Pendse Ravindra. "Enhanced secured authentication protocol for RFID systems." A link to full text of this thesis in SOAR, 2008. http://hdl.handle.net/10057/2029.
Full textEdelev, Sviatoslav [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, and Xiaoming [Akademischer Betreuer] Fu. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol / Sviatoslav Edelev. Gutachter: Dieter Hogrefe ; Xiaoming Fu. Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1076673597/34.
Full textMalecký, Marek. "Analýza vybraných bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237107.
Full textSANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Full textYuan, Ching-chien, and 袁境鍵. "Hardware Implementation of RFID Mutual Authentication Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46028509272753713099.
Full text義守大學
電子工程學系碩士班
97
Radio Frequency Identification (RFID) is a wireless technology which utilizes radio communication to identify objects with a unique electrical identity. The widespread deployment of RFID technologies may generate new threats to security and user privacy. One of the main drawbacks for RFID technology is the weak authentication systems between reader and tag. In general, weak authentication systems that either leak the password directly over the network or that leak sufficient information while performing authentication to allow intruders to deduce or guess at the password. According to EPCglobal Class1 Gen2 authentication system, the important information in tag will be exposed inadvertently because of the wireless transmission of data while performing authentication and causes much of threat to security. In this dissertation, we study the RFID tag-reader mutual authentication scheme. To avoid direct exposure of vital information from wireless transmission, the primitive exposed information must be covered in authentication process. A hardware implementation of mutual authentication protocol for RFID system is also proposed. The proposed system was simulated using Altera Quartus II software. The system has been successfully implemented in hardware using Altera DE2 board includes an Altera Cyclone II Field Programmable Gate Array (FPGA). The output waveforms from the FPGA have been displayed on the 16702A Logic Analysis System for real time verification. Finally the gate level files have been performed within mutual authentication schemes using Synopsys Design Vision from CIC and analyzed the power dissipation with different authentication schemes by Prime Power.
Li, Perry, and 李培宇. "RFID mutual Authentication Protocol based on Hamming Distance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56512911502492089377.
Full text國立交通大學
網路工程研究所
99
RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed. The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system. The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation.
Liao, Wei-Chih, and 廖偉志. "Secure and Efficient Mutual Authentication Protocol for RFID systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13935129028580827426.
Full text國立交通大學
資訊科學與工程研究所
99
Radio Frequency Identification (RFID) is a non-contact sensor network technology to automate identification. RFID systems had been applied to many fields and have been considered as a key infrastructure for the ubiquitous society in the future. However, because RFID tag on the inherent limitations of hardware resources, RFID has various security threats like privacy problem, eavesdropping, tag cloning, tag tracing, etc. To address these problems, lots of solutions had been proposed. RFID authentication protocol is one kind of these solutions. The point of RFID authentication protocol is to enforce the security policy between legal RFID tags can the legal RFID readers. RFID authentication protocols provide a mutual authentication mechanism to protect RFID system. But most of them have some drawbacks. These problems include the security not strong enough to resist various RFID attacks, the computation overhead of RFID tag is too high, and the back-end server spends too much time for searching RFID tag data, and etc. In this thesis, we proposed two RFID authentication protocols to overcome these drawbacks. In our analysis, the results have demonstrated that our RFID authentication protocols can resist most common RFID attacks and are more effective than most RFID authentication protocols.
Omer, Asrar Ahmed. "Mutual authentication protocols for RFID systems." 2007. http://digital.library.okstate.edu/etd/umi-okstate-2556.pdf.
Full textYang, zih Li, and 楊自立. "A Secure Mutual Authentication Protocol for Low-cost RFID System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/52898041463235335840.
Full text國立臺灣科技大學
資訊管理系
96
In recent years, RFID technology is rapidly adopted by various industries such as manufacturing, retailer business and medical treatment. Since then security weakness and privacy invasion in RFID systems have become the concern to academic researchers, human right advocators, government apparatus and enterprises. As RFID system operates in wireless environment, it is easy to be threatened by various attacks such as eavesdropping, replay attack, denial of service, tracking and so on. Hence, many researchers devote to solve those security problems in recent years. However, restricted by the current RFID standards, a proposed security solution not only has to comply with hardware restrictions for antenna, battery capacity and chip size, but also needs to meet low-cost requirement; in consequence, pervious researches were not able to eliminate major security threats successfully and enhance the security of RFID usage under such challenging environment. In this thesis, we propose a novel Secure Mutual Authentication Protocol for Low-cost RFID System (SMAP-LRS) whose design and operation can meet the requirements of current RFID standards, such as EPCglobal proposed ones. As best we know, the required memory space of our scheme decreases about 45% to 50% in comparison with other existing mutual authentication protocols. Our scheme also eliminates the major security threats and enhances privacy protection to achieve security requirement such as data security, anonymity and forward security. Keywords: RFID, Privacy, Security, Mutual Authentication
Cheng, I.-Wen, and 鄭依文. "An Efficient Multilevel Mutual Authentication Protocol of Low-cost RFID Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/86447563571143285560.
Full text國立交通大學
電機與控制工程系所
95
The technology of contactless identification of objects, RFID or radio-frequency identification, allows its readers to get application data from the back-end database by object identifications. The convenience resulting from its contactless and low-cost makes it possible to be widely adopted in many areas. However, due to the lack of data privacy and protection mechanism in RFID technology makes the widespread adoption and deployment of RFID technology pose several privacy-related concerns for consumers. In this paper, we propose a mutual authentication protocol for the low-cost RFID systems. We also formally prove the correctness and completeness of the proposed protocol by using GNY logics. In addition, we identify several attacks that can be applied to RFID systems and we demonstrate the security of the proposed protocol. Furthermore, we show compare the performances, including storage cost, computational cost and communication cost, with other existing protocols.
Shie, Huei-sz, and 謝慧思. "A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/22534334098018982802.
Full text國立臺灣科技大學
資訊管理系
96
Radio frequency identification (RFID) has widely applied to many applications including supply chain, logistics management, personnel identification and patient care management. With the increasing usage of a RFID system, information security and end-user privacy have become a critical concern. In terms of security schemes, most of previous RFID authentication researches are too sophisticated for a low-cost RFID system. Factors such as resource-constrained tag, cheaper reader implementation and efficient information search on backend database should all be considered along with the security and privacy protection schemes for low cost RFID systems. In this thesis, we present a mutual authentication protocol which uses the lightweight bitwise logic and arithmetic operations on a low-cost RFID tag to defend against many malicious attacks and achieve security requirements for a RFID system. In our scheme, we use simple and low-cost operations as encryption tools. In order to guarantee communication security, after the reader is successfully verified by a tag, the tag transmits the enciphered ID information to a reader to avoid attacker getting ID information by eavesdropping and to increase the cost of password guessing attack. Our scheme can achieve privacy protection and comply with security requirements to provide secure properties such as anonymity, data confidentiality, anti-cloning, availability, and forward security.
Tzeng, Shr-shiuan, and 曾士軒. "A Study on RFID Mutual Authentication Protocol Based on Theory of Quadratic Residues." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/8x5859.
Full text南華大學
資訊管理學研究所
95
Radio Frequency Identification (RFID) refers to technologies and systems that use radio waves to transmit and uniquely identify objects. These are poise to supplant barcodes, and become perva-sive for many domains in our daily lives. These also provide to re-duce fraud, easy identity checks, and enhance security. However, RFID technology also raises new risks about the privacy and security implications. RFID system has been conducted by wireless com-munication of radio frequency so that the information on identifi-cation could be eavesdropping by the third party maliciously. There are major impediments to their widespread use. Over the past few years, several streams of research have emerged approaching the RFID privacy/security problem from different perspectives. We study a few protocols and propose a novel mutual authentication protocol based on quadratic residues for low-cost RFID tags, and can satisfy security, performance and cost requirement at the same time. Additionally, our protocol is very simple and it can be imple-mented easily with the use of standard cryptographic hash func-tions.
Shen, Yi-Jie, and 沈意傑. "RFID Mutual Authentication Protocols with Location Privacy and Scalability." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/36414840571104848191.
Full text國立成功大學
資訊工程學系碩博士班
96
Radio Frequency Identification (RFID) is an automatic identification technology without the physical contact。Due to the low cost and conveniently identifying objects without physical contact,the RFID technology has been widely deployed in many applications that include retail business,supply chain management, pharmaceutical industry, inventory control, etc. However, the wireless accessing characteristics of RFID system allows the outsider to easily eavesdrop the transmitted messages. The possible attacks including revealing user privacy, tracking problem and impersonation behavior produce the secure risk. Therefore, the design of an efficient and secure protocol without using complicate cryptographic techniques for RFID systems is an important issue。 Though many authentication protocols for RFID have been proposed recently, they either cannot protect the location privacy of tags or have high overhead on identifying tags for the backed-end server。Moreover, an inefficient authentication protocol suffers easily the deny of service (DoS) attack. None of them provide satisfactory solution for both problems at the same time。 This paper proposes the security requirements and analyses the reason why these recently researches cannot fulfil the security requirements. This paper also proposes two mutual authentication protocols. The first protocol protects the location privacy and is efficiency on performing the authentication. The second protocol not only achieves the proposed requirements but also solve the attack of DoS completely.
Lin, Ching-Chao, and 林青照. "The Study of Using Mobile RFID to Design RBACThe Study of Using Mobile RFID to Design RBAC Mutual Authentication Protocol." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71993130973189428634.
Full text南台科技大學
資訊傳播系
98
Due to the popularization of information science and the development of network technology, the internet has become the transmission medium in the modern information system. It needs to achieve the goals of the integrity, security and privacy when the Internet transmits data. In the Internet, it needs a perfect security authentication protocol to make sure that the lawful user uses the remote server to obtain the service and the resource. The wireless radio frequency recognizes (RFID) is a very convenient of technology and it can read the data without contacts. The tag can be embedded in the object and identified through the wireless technology quickly. Gradually, the mobile device is embedded the reader by applying the RFID technology. Hence, the user uses the RFID technology embedded the reader through wireless network to read the information of tag on the object and use the service .The Mobile RFID could improve disadvantages of the traditional RFID technology. The characteristics of mobility can make the reading more flexible, and it can process real-time to make up for the insufficiency of stationary of RFID device. If offers the faster and effect process .It has the most important security privacy problem to the mobile RFID. However, the problem of constructing a mobile RFID protocol is how to protect the user’s privacy. The thesis proposes a secure mutual authentication protocol which applies by the appointed architecture of mobile RFID. The reader can get the specific role class though backend database server. The reader can process the mutual authentication with the backend database server and the tag. It can limit the reading times and the information of tag to achieve the protect of privacy
Mota, Rajesh Kumar. "Role of Cryptographic Welch-Gong (WG-5) Stream Cipher in RFID Security." Thesis, 2012. http://hdl.handle.net/10012/6769.
Full textAllahem, Hisham. "MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS." 2013. http://hdl.handle.net/10222/21728.
Full textLee, Yu-Lin, and 李昱霖. "Mobile RFID Mutual Authentication and Ownership Transfer." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/72650312043937650900.
Full text中原大學
資訊工程研究所
96
RFID had been widely used in manufacturing, supply chain, inventory control and other areas. Lately, in order to increase the convenience of tags, we had developed mobile readers through the combination of RFID reader chip and the mobile devices. But also, there was some limitation about tags. EX: data transmission between tag and reader is unencrypted; readers may not authorize to read. Therefore, people who have installed this device may have read other people’s massage on the tags. It means the privacy of users might be under threat. For those reasons, we map out a protocol under Mobile RFID. When tags need to be read, it has to get though mutual authentication. After that, database will take action base on the Role Class of the tags, and deliver the related massages to the reader. In addition, we can also change the secret key of the tags in order to achieve the purpose of transfer ownership. This scheme could resist replay attack and provide data privacy, location privacy, and ownership transfer.
Lin, Chia-Min, and 林家民. "The Study on RFID Mutual Authentication Schemes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73946799125537158882.
Full text亞洲大學
光電與通訊學系碩士班
99
RFID security protocol is widely discussed as an important issue, while most of the mutual authentication with the security agreement has been discussed most enthusiastically. The security of ultralightweight RFID authentication protocol has been discussed and has focused on low-cost RFID.In 2007, based on the SASI protocol proposed by Chien , a very small amount of calculation and communication costs can reach ultralightweight security protocol, which has been discussed by many paper. However all of the articles discussing the SASI protocol have not come up with effective improvement programsThis article cited in 2008, Xuefei Leng, Keith Mayes and Konstantinos Markantonakis has three methods proposed by scholars to be improved, so that was only one way to identify the HB family of agreements with the successful characteristics of mutual authentication.
Lai, Ching-Hong, and 賴慶鴻. "An RFID authentication protocol resisting data collision." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/93761835855512196140.
Full text淡江大學
資訊工程學系碩士班
96
With the gradual mature of radio-frequency identification (RFID) related techniques, the range of its applications becomes wider and wider; they include people identification, entrance gate control, object identification of shopping malls, supply chain management, health care, automatic collection of road tolls, and so on. However, with the malicious attacks on these systems getting severe, a secure authentication scheme with privacy protection mechanism becomes more and more important. In this paper, we will first introduce the system architecture of RFID and its various applications. We then survey the related research work on RFID authentication protocols, including the initial setting, the execution procedure, and analysis whether each of the seven security properties they possess: (1) resistance to eavesdropping, (2) resistance to tracking, (3) resistance to replaying, (4) resistance to de-synchronization, (5) resistance to key collision, (6) providing perfect forward secrecy, and (7) supporting mutual authentication. We will point out that the authentication scheme proposed by Liu-Wang-Huang is vulnerable to key collision. We then present an improved protocol to remedy the weakness of their scheme. Finally, we compare our improved authentication scheme with other related schemes and propose a guideline to further enhance our modified scheme.
Kuo, Shang-Lun, and 郭上倫. "A Secure RFID Authentication Protocol with Anonymity." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53204662957143625666.
Full text淡江大學
資訊工程學系碩士班
98
RFID (Radio Frequency Identification) technology has been widely used recent years. A main system is composed of three parts: RFID tags, readers, and a backend server. Because chips are small and antennas are easily made into various shapes, these make RFID systems easy to use. Moreover, RFID systems transmit by wireless and their prices are more and more affordable. They are not like traditional barcode systems which can easily be destroyed and soiled by outside environments. Using traditional barcode systems is not efficient because they have to be used in visual accessible distance to contact objects. Therefore, several of applications of RFID systems are entrance gate control systems, shopping malls charging systems, industrial manufacturing parts management systems, medical applications systems, supply chain management systems, and so on. Since RFID is communicated by wireless and has limited computing power, it cannot provide complex computations. Therefore, providing efficient and secure authentication schemes becomes an important issue. Many researchers have proposed various authentication schemes for RFID systems. In this thesis, we analyzed and discussed the security problem of these research works. The security problems including the capabilities of tag anonymity, resistance to replaying attack, recovery from de-synchronization attack, resistance to man-in-the-middle attack, resistance to tag impersona¬tion, resistance to reader impersonation, tag anti-cloning and mutual authentication, resistance to tag tracking, avoidance to location privacy disclosure, and providing forward secrecy. We also improved Choi et al.’s authentication scheme and compared the improved scheme with other existing schemes based on the above security features.
Chang, Chen-Yi, and 張軫益. "An Improved Mutual Authentication Scheme for RFID Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65302569011742691463.
Full text國立中興大學
資訊科學與工程學系所
97
RFID (Radio Frequency Identification) systems, having wireless characteristics, have many applications, including all trades and professions such as Wal-Mart, airports and airlines. The tags of RFID are made at present very small. Domestic and international companies pay very close attention to the relevant applications and development of RFID. The mutual authentication among the iron trigonometry (server, reader, tag) of a RFID system is very important. In 2008, Mitchell and Song put forward a novel RFID authentication mechanism [11]. In this thesis, we improve its efficiency and enhance its function to allow mutual authentication between the server and the reader.
MinhDuc, Ta, and 謝明德. "A new mutual authentication protocol for mobile communication." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/76357026015735147984.
Full textHSIAO-FENG, WANG, and 王曉峰. "A Remote Mutual Authentication Protocol Using Smart Cards." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/47581868333964313328.
Full text國立中興大學
資訊科學研究所
89
We propose a scheme which can verify the remote access passwords without verification tables. The scheme utilizes the signature aspect of public key cryptosystems in conjunction with the use of smart cards. Before the server authenticates the remote user who wishes to get the services of the server, the user can authenticate the server as well. In other words, the scheme achieves mutual authentication between the server and the remote user. During the login, the user submits his identity(ID)and password associated with his smart card. After authenticates the server, the smart card uses a signature scheme to check whether or not the login can be accepted. The scheme can also be protected against replay by adding the communication time stamps, and there is no problem to synchronize the clocks on the Internet that previous researches have to do. To lower the computational requirements of smart cards, We employ the technique of precomputation which allows the shifting of computation to the server.
Li, Jia-Hong, and 李佳鴻. "Lightweight Mobile RFID Authentication Protocol for Location Privacy." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/53656290650698755245.
Full text中原大學
資訊工程研究所
96
Radio Frequency Identification(RFID) systems is used in various fields such as supply chain management, inventory control, medical management, indoor access control, and so forth. Recently, it is expanding to become the mobile RFID systems for more convenience. Through RFID reader chip is installed to mobile terminal like PDA or cellular phone, which can provide purchasing, verifying and paying for the product directly. However, mobile reader and tag using RF signals to communicate with each other, and low-cost tag can’t provide enough security protection. The malicious attacker can pretend as mobile reader to cause security and privacy problems such as tag’s information leakage and owner traceability. In this paper, we propose a PIN-test Set based scheme suitable to mobile RFID systems and conforming to EPC Class-1 Generation-2 standards. Our scheme is forward-secure and prevent from threats such as reply attack, DOS attack, man-in-the-middle attack, and tag counterfeit.
Lin, PingChung, and 林品仲. "A Lightweight RFID Authentication Protocol with Privacy protection." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/68018444803958751584.
Full text長榮大學
資訊管理學系碩士班
99
Recently, many aspects of the security in RFID systems has become a subject of prime attention. RFID technology has been applied heavily for its small size, low cost, and ability to stores large amounts of data. However, the features in RFID technology, such as unique identification and out-of-sight readability, can also bring about some security concerns. In this thesis, we address the tracking issue of RFID tags and propose a protocol to perform authentication while preserving the privacy of its user.
Wei-LiHuang and 黃為立. "RFID Privacy Protection Authentication Protocol with Staying Tags." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bfazgv.
Full textWu, Cheng-lun, and 吳政倫. "An efficient RFID mutual authentication scheme based on ECC." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/54807303314958452676.
Full text南華大學
資訊管理學系碩士班
99
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs which use RFID to manage the placing of drugs and amusement park using RFID to search for missing children. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy problem. Therefore, researchers tried to resolve this problem. Most of them investigated on how low-cost RFID tags can be used in large-scale systems. However, after analyses, we found these studies have some problems, such as suffering physical attack, or de-synch attack. Hence, in this paper, we try to design an efficient RFID scheme based on Elliptic Curve Cryptography (ECC) to avoid these problems. After analyses, we conclude that our scheme not only can resist various kinds of attacks but also outperforms the other ECC based RFID schemes in security requirements with needing only little extra elliptic curve point multiplications.
Edelev, Sviatoslav. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol." Doctoral thesis, 2015. http://hdl.handle.net/11858/00-1735-0000-0023-9618-D.
Full text陳培郁. "A Study on ECC-Based RFID Lightweight Authentication Protocol." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/63612131090957109939.
Full text國立清華大學
資訊工程學系
98
RFID technology has become popular in many applications, but it also raised security and privacy concerns. Many people worry about the disadvantages which brought by RFID technology, such as leaking their location privacy and confidentiality of private information. However, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure the RFID systems with untraceability, which is one of the most critical privacy issues in RFID. But we found that this protocol is still vulnerable to tracing attacks, and two variant attacks are presented to break Chien’s protocol. In this thesis, we propose an ECC-based mutual uthentication protocol for RFID. Our protocol requires only lightweight operations that can be mounted on the low-cost tags. With an ECC-based filtering mechanism applied, the computational load on the RFID reader can be reduced. Therefore, our protocol is appropriate for the real-world applications. Further analysis shows that the protocol is secure against the common security threats of RFID systems.
Hsiao, Chin-Wen, and 蕭景文. "A Low Cost RFID Authentication Protocol and its Application." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/cc262v.
Full text國立中興大學
資訊科學與工程學系所
101
Radio Frequency Identification (RFID) system is composed of electronic tags, the reader and back-end database server, and has been widely used in daily life. This thesis presents a low-cost authentication protocol, with simple XOR operation and shift operation. When applying it in daily shopping, Customers can quickly get access to Daily Sales and Deals messages, and Shops can save money in printing and dispatching Ads and increase revenue at the same time, thus creating a win-win solution. Reducing the amount of Ads and flyers is also being friendly to the environment.
Yu, Po-Kai, and 游柏凱. "A Privacy and Authentication Protocol for Mobile RFID Systems." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5gkgsh.
Full text國立臺中科技大學
資訊工程系碩士班
102
Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed schemes do not conform to the EPC Class-1 GEN-2 standard for passive RFID tags as they require the implementation of hash functions on the tags. Furthermore, due to secure channel assumptions previously proposed schemes are not suitable for wireless/mobile reader applications. In 2013, Doss et al. proposed the mutual authentication for the tags, the reader, and the back-end server in the RFID system. Their scheme is the first quadratic residues based to achieve compliance to EPC Class-1 GEN-2 specification and the security of the server-reader channel may not be guaranteed. However, this article will show that the computational requirements and bandwidth consumption are quite demanding in Doss et al.’s scheme. It is not practical for the server and the reader to obtain the information of tags for the quality of services. To improve Doss et al.’s protocol, this study proposes a new efficient RFID system where both the tag-reader channel and the reader-server channel are insecure. The proposed method is not only satisfies all the security requirements for the reader and tag but also achieve compliance to EPC Class-1 GEN-2 specification. Moreover, the proposed scheme can be used in a large-scale RFID system.
WU, KUAN-LIANG, and 吳冠良. "The Research of RFID Lightweight Authentication Protocol for VANETs." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/42297940033975624068.
Full text中華大學
資訊工程學系
104
With the advancement of technology, Radio Frequency Identification (RFID) system for the convenience in our life have been deeply affected. In the case of daily life, almost everyone has some RFID proximity cards, but there are some important personal privacy or information security issues. Because of the RFID tag is to transmit signal to the reader by using wireless channel, it is likely to suffer malicious user to track, eavesdrop, replay or denial of service attacks, etc.. To solve the above security issues, many scholars have proposed different RFID authentication protocols. In 2012, Caballero-Gil et al. presented CG authentication protocol to solve replay attack and track attacks, but their protocol cannot resist the problem of brute force and de-synchronization attacks. Fereidoun Moradi et al. proposed CG+ authentication protocol to solve the de-synchronization problem in CG authentication protocol. But we found that CG+ authentication protocol may still allow the attacker through denial of service attack to cause de-synchronization attack between by database and tag. Therefore, an improved method will be analyzed and submitted in this research. At the same time, our method can effectively reduce the tag and database computation overheads and it comply EPCglobal Class1 Generation2 standard. We expect our research results can be applied to VANETs(Vehicular Ad Hoc Networks) in the future.
Cai, Jhong-Heng, and 蔡仲恆. "The Research of Lightweight Mutual Authentication Protocol for Mobile Payment." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/76084473635154181926.
Full text義守大學
電機工程學系
104
Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods. Although the concept of using non-coin-based currency systems has a long history, it is only recently that the technology to support such systems has become widely available. NFC is used mostly in paying for purchases made in physical stores or transportation services. Most transactions do not require authentication, but some require authentication using PIN, before transaction is completed. Mobile payment method via NFC faces significant challenges for wide and fast adoption, due to lack of supporting infrastructure, complex ecosystem of stakeholders, and standards. Due to the need of a safer NFC mobile payment system with low computational complexity, an XOR-based mutual authentication protocol is developed in this thesis. In order to demonstrate the superiority on computational complexity and security of proposed protocol, four other authentication protocols have been surveyed and numerical experiments have also been conducted to provide the performance comparison. EPCglobal Class-1 Gen-2 need other method to improve its encryption process, and it is not a mutual authentication protocol. Tag-Reader Mutual Authentication need a lot of input parameters to support its encryption process. IOT lightweight authentication protocol will expose all its parameters and messages during message exchange. ECMA-386 do many Complex calculations during encryption process. All of those are the purpose of published this thesis.
Chiou, Huan-Shiun, and 邱煥訓. "An Efficient RFID Authentication Protocol based on Quadratic Residue Cryptosystem." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/49995145522923900172.
Full text中華大學
資訊工程學系碩士班
99
Radio Frequency Identification (RFID) is the popular technology in recent years. Wal-Mart is the leader of department store in the U.S., and it requests all goods for the top 100 suppliers must be attached RFID tag before 2006. It produces a serious change with the supply chain management of RFID technology. Moreover, Ministry of Economic Affairs takes the lead promote a plan in 2005 that uses the RFID in the public places. It also guides the development of private enterprises. They raise the concerns of industry and academia. The RFID technology will be applied in each kind of domain in the future. Recently, the popularity of RFID applications creates a convenient life. It also brings various security issues. There are many scholars presented solutions to improve these problems. In this paper, we will review some recent RFID authentication protocols. In 2008, Chen et al. presented the authentication protocol based on quadratic residue cryptosystem. Yeh et al.’s pointed out that Chen et al.’s scheme is vulnerable to impersonation attack and replay attack and submitted the improved scheme in 2010. Our proposed scheme is not only increase efficiency in RFID, but also retains the same safety properties. It needs only one quadratic residual operation in the tag and server respectively. The total numbers of operations in our scheme are less than Chen et al.’s and Yeh et al.’s schemes. Therefore, the proposed RFID authentication scheme is better in efficiency based on quadratic residue cryptosystem.
CHEN, CHIEN-JU, and 陳健儒. "A Low-Cost Security Authentication Protocol Against RFID Common Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/96531132481673890358.
Full text中華大學
資訊工程學系碩士班
100
ABSTRACT In recent years, Radio Frequency Identification (RFID) is gaining popularity. It has a wide range of applications in consumer market, such as supply chain management, warehouse management, healthcare, door access management and animal tracing chip, etc. in recent years. However, the RFID system is used to wireless communication technology transferring data. Therefore, it may have many potential security and privacy issues. Currently, there are many scholars that propose the methods of RFID security and privacy issues, but it still has many issues unresolved. In 2009, Lei et al proposed a revised efficient authentication protocol for low-cost RFID system (R-LCAP). He claimed to solve Lee’s authentication protocol (LCAP) forward security of issues. After our analysis of security, we still found security vulnerabilities of tracing privacy and de-synchronization problem in R-LCAP. Therefore, we propose an improved RFID security authentication protocol for R-LCAP in this paper. We solve tracing privacy and denial of service (DoS) attack that cause data not being synchronized in security issues. Our protocols enough to resist RFID common methods of attacks, contains(形容詞) Information leakage, Mutual authentication, Replay attack, Forward security, Untraceability and Denial of Service to cause De-synchronization. We also enhance RFID security and privacy. Our protocols computation cost is lower than Lei’s protocol. The proposed protocol satisfies the security property and conforms to the low cost authentication protocol to provide security design and applications. Keywords:RFID、Authentication、De-synchronization、Security
LU, SHU-YING, and 呂淑瑛. "An improvement to a secret key changing RFID authentication protocol." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/avx79r.
Full text中國文化大學
資訊管理學系
107
With the rapid development of technology, RFID (Radio Frequency Identification) has been widely used in everything of life. Also, the more massive using of RFID, the authentication protocol to secure information transmitted by the network are more important. The effective and efficient scheme can protect users from maliciously falsified, impersonated and unusable attacks that result in huge economic losses. This study explores how to use the schemes of key changes in RFID authentication protocols to defense tag spoofing and Denial-of-Service attacks. Firstly, we find the Dass and Oms and Yu and Zhangs RFID authentication protocols still have some security weaknesses. Secondly, we propose a light improved protocol for Dass and Oms scheme to resist attacks. Finally, we compare the improvement protocol with the Dass and Oms and Yu and Zhangs schemes with security and performance analysis that show the improved protocol has better performance and can effectively resist tag counterfeited and Dos attacks.
Li, Yu-Hsien, and 李育賢. "The Study of Off-Line Authentication Protocol for RFID tags." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/73853308271854010380.
Full text南台科技大學
資訊管理系
96
Recently, RFID researches have been considered as the main development by the government. Basically, RFID sends messages through radio wave. Therefore, how to recognize the tag information correctly and protect users’ privacy have become important issues. For solving these security issues, many scholars proposed some RFID protocols. However, most protocols are relying on one on-line backend server and cannot work on an off-line environment. In 2007, Fouladgar and Afifi first proposed the off-line SiDES protocol. Later, Lin proposed a TCD-RP protocol. They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi’s SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin’s protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame. Therefore, this thesis designs a more secure RFID protocol to fix these security flaws. In 2007, Fouladgar and Afifi also proposed EDTOP protocol which is based on AES and keeps higher performance on the operations of tag ownership transform. However, it also fails to achieve the forward security. Therefore, this thesis further proposes an improved protocol which can achieve the forward security.
Lee, Shiow-Hsiang, and 李秀香. "A Study of Mutual Authentication on RFID Security and Its Applications." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/50583768046013253571.
Full text國立中興大學
資訊科學系所
95
Including Japan , Korea S. and our national capital promote the ubiquitous network society in a more cost-effective manner at pr esent, the ones that hoped with new science and technology , such as the mobile communication, wireless network ,etc. are auxiliary , strengthen management and working efficiency, and then improve the output value of enterprise. And Radio Frequency Identification (RFID) system vigorous a technology continuously at present among them. As RFID is used extensivly day by day, its safe mechanism can be met and manager'' s and consumer''s demand, is the key factor of this application can be survived. In the application of RFID, because the relevant software and hardware environment is excellent in the active system, can use the tight security certification mechanism, but the cost raises much more relatively; And the passive form system used extensively, its advantage is relatively low for cost, but because the factors of the electric energy consumed and memory or storage capacity, etc., it is relatively limited too that its security mechanism adopted selects. This thesis briefly presents the current problems and solution to RFID security and privacy, and will propose an improved protocol with mutual authentication, the methos that we design, can increase the security of back-end system, reader and tag by verifying each other at the same time, and can prevent the Denial of Service (DoS) attacks. In addition, the computation loads of the back-end system is also reduced, thus we can reach the demands of a secure RFID system including security, efficiency and low cost.
Wang, Shen yi, and 王聖懿. "Extended mutual authentication protocol for Radio Frequency Identification under insecure communication." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/64176559863909801632.
Full text長庚大學
資訊管理學系
98
Radio Frequency Identification (RFID) is a form of automatic identification and data capture technique. RFID is recently being used in a wide range of areas such as supply chain management (SCM), health care, retail, entrance guard management, identity identification, luggage management and access control, etc. The ability to store large amounts of data and identify items which are not in the line of sight has given RFID technology an edge over other automatic identification approaches such as the barcode systems and optical character recognition systems (OCR). As an example, RFID technology in the SCM systems has resulted in the reduced loss, and improved visibility in various stages of SCM. However, the broadcast of wireless signal during RFID raises important security issues. This is a problem on how to design an efficient authentication protocol for RFID systems. Form the past researches, include some important topic like the topic of owner transfer information, it is a key point we want to exchange. To modify the scheme of Yoon and Yoo which revised the disadvantage of Osaka’s approach, increase base on unique ID value of field address, combination of a new virtual ID value, as a verification method, and the given recommendations. To prevent is attack of the power analysis. Let power analysis can not directly attack and collection ID information. After virtual treatment which is by the reality ID information. We propose an effective protection against a variety of attacks and threats through mutual authentication protocols approach: (1) To strengthen the ownership transfer of security reasons. (2) To improve the feasibility of encryption algorithms and more. (3)To improve after the produce of random variable transmission privacy issue. We can apply the different researches like the RFID system can ensure that the information in the transmission or exchange to be more secure, and to protect privacy and confidentiality. We propose the security method to achieve the following security requirements such as (1) Forward security, (2) Replay attack, (3) Tag killing, and (4) Ownership transfer. Then Cryptographic complexity and efficiency message protocol can also be reduced. We believe that the transmission and access security to back-end database server are secure enough. The main purpose of our study is to prevent power analysis. Between the database and the tag transfer, and ownership transfer between the database and owner. And the new owner user to communicate with the database, database will be a security mutual authentication mechanism.
Yang, Shun-Miao, and 楊舜淼. "A Lightweight RFID Authentication Protocol with Collision-Free Based on CDMA." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/74417138417627611086.
Full text雲林科技大學
資訊工程研究所
98
Radio Frequency IDentification(RFID) is an automatic identification system, it’s said that a RFID reader can identify a large number of tags simultaneously. For commercial products, however, a RFID reader identifies tags one by one. This is because collisions occur when several tags send their data at the same time. The RFID authentication protocols[7][8][9] put heavy computational overhead on low-cost tags, which don’t have the ability to perform complex operations. To overcome the collision and computation overhead problems, we propose a lightweight RFID mutual authentication protocol with collision-free based on CDMA. By CDMA Technology, the scheme allows many tags to send their data simultaneously without collision. The proposed scheme requires a tag to perform 2~4 hash operations during authentication phase and has the following secure properties: tag anonymity, indistinguishability, robustness, forward secrecy and mutual authentication. In addition, the scheme can also resist the following attacks: eavesdropping, replay attack, forgery attack, tracking attack and de-synchronization attack.
YU, HSIANG-CHENG, and 游翔晨. "Resist Common Attacks on RFID Authentication Protocol Conforming to EPCglobal Standard." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/44003131741767942572.
Full text中華大學
資訊工程學系碩士班
100
Radio Frequency Identification (RFID) system is most concerned to the academia and industry in recent years. It is not only replacing the bar code system but also taking more applications in our life. For example it is used in automatic parking payment system, public transport system, entry control system, supply chain management, e-passports and credit card. While RFID technology is growing quickly, and people begin to pay attention on consideration of the RFID technology. However, it will bring some security and privacy problems. Recently, many scholars were researching the RFID security and privacy issues. In 2003, Weis etc. proposed the RFID authentication protocol. They are started the research direction of RFID system security. In 2007, Chien and Chen designed the RFID authentication protocol by using random number and Cyclic Redundancy Code (CRC), which is conforming to EPC Class 1 Generation 2 Standard. In 2010, Yeh etc. pointed out the Chien and Chen’s protocol still have some problems include Denial of Service attack, privacy issue and database loading. Yeh etc. proposed an improvement protocol to correct the problem later. However, we have researched the authentication protocol of Yeh etc. and we discover that their protocol still have some problems. In this paper, we indicated the Yeh etc. protocol is still suffering replay attack. We will propose a new authentication protocol to fix their weakness. Our protocol does not require additional memory cost. Our proposed protocol can provide strong privacy protection and data security including to resist replay attack, resist eavesdropping attack, resist tracking, resist DoS attack, obtain forward security, privacy issue and lower database loading. Our method is secure to protect important RFID information in the future.
Chuang, Tsung-i., and 莊聰益. "An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/57064410474347881584.
Full text國立臺灣科技大學
管理研究所
103
As RFID technology has emerged in our daily life, the prevention of illegal access and information leakage of RFID based applications becomes a practical requirement. A more secure and privacy aware RFID authentication protocol is devastatingly needed. Recently, Lin et al. proposed a mutual RFID authentication scheme conforming EPC Class 1 Generation 2 (EPC GEN 2) standard to deliver strong data privacy, robust system security and computation efficiency. However, their claimed security cannot hold. In this dissertation, we demonstrate how to break through Lin et al.’s authentication scheme by engaging a series of active attack procedures. The computational complexities of identified attacks are practical so that Lin et al.’s scheme cannot improve security any more than the EPC GEN 2 standard. Furthermore, we develop a new RFID authentication protocol to enhance security density, prevent threats of tag tracing and secrecy disclosure, and achieve the similar computational cost as Lin et al.’s protocol does.
Ho, Huang-Kuan, and 何皇寬. "A Combined Low Cost RFID Tag Collision Resolution Protocol with Authentication." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/17756594656489648486.
Full text國立臺灣科技大學
電機工程系
96
Radio Frequency Identification (RFID) system has been widely used in many different areas. Its main purpose is to identify an object quickly. The most popular application of RFID is in supply chain management for barcode replacement. Different from traditional barcode, RFID has many advantages such as no line-of-sight requirement, high toleration of harsh environments, long read range, large storage space, traceability, and multiple reads at once. A RFID system consists of the Reader(s) (or Interrogator), the Tag(s) (or Transponder) and the back-end host system. Usually a reader sends a RF signal at the working frequency, and then the tag responds with a RF signal at different frequency. Because the information conveyed between the reader and the tag is through RF channel, if multiple readers or tags transmit data simultaneously, then these data may interfere with one another and can not be recognized. Multiple readers can communicate with each other via physical lines, however tags won’t be able to do that due to their limited resources (e.g., most tags do not have internal power). Therefore in order to singulate each tag by the reader successfully, we need a specific method, which is the anti-collision protocol to achieve this goal. First, we present an overview of the existing anti-collision protocols and then we classify and compare them according to their major characteristics. The existing multiple access techniques in RFID system include Space Division Multiple Access (SDMA), Time Domain Multiple Access (TDMA), Frequency Domain Multiple Access (FDMA) and Code Division Multiple Access (CDMA) four major categories. TDMA is the most popular approach to achieve anti-collision and further divided into Reader-driven and Tag-driven. Because it is hard for a RFID passive tag without internal power to drive anti-collision actions, therefore we will concentrate our discussions only on the Reader-driven anti-collision schemes, which are the main streams in the passive tags environment. In those schemes, a reader must dominate the anti-collision protocol and tell the tags what they should do. Reader-driven protocols could be classified into two major approaches, one is tree-style since it uses the tag ID to build a binary tree, while the other is ALOHA-style since it uses a contention-based multiple access scheme to assign each tag into a unique timeslot. They are both widely used in today’s RFID standards and specifications (e.g., the EPCglobal Class 1 Generation 2 uses an anti-collision protocol named Q-Algorithm, which is an ALOHA-style protocol), therefore this thesis mainly addresses the tree-style protocols and ALOHA-style protocols. Although there already exist several taxonomies on the anti-collision protocols for RFID system, none of them has incorporated all the latest proposed protocols. Therefore, we enhance the existing taxonomies especially with a special focus on tree-style protocols and ALOHA-style protocols, and also add a recently proposed SDMA based anti-collision protocol which is different to the mainstream TDMA. Besides the collision problem, RFID applications today also face the threats of security and privacy. A tag may leak the information of the tagged item if an invisible adversary could trace or monitor this item surreptitiously. In order to prevent either a fraudster who uses a counterfeit tag to cheat a legitimate reader into believing it is an authorized tag, or a fake reader intends to obtain the sensitive information from a legitimate tag, we need an authentication protocol to protect the security and privacy of the RFID system especially in the tags. Although many authentication protocols have been proposed, none of them is perfect and not suitable to be deployed in many different scenarios. The authentication protocol usually starts by sending a challenge from an authentication server / verifier (a person or a device) to a party who is to be authenticated. For instance, if the reader sends a challenge to the tag, then the tag computes a response by using a pre-shared secret key in combination with the challenge as a feedback reply to the reader. Subsequently the reader verifies whether the received response is a correct to determine the tag’s legitimacy. If true, the reader provides the service that the tag requested or denies its request if false. This thesis discusses an authentication protocol proposed by Hopper and Blum, named HB protocol. The security of HB protocol is based on the conjectured hardness of the “Learning Parity with Noise” (LPN) problem. HB protocol can combine with anti-collision protocol that is different to other authentication protocol. We will also show other HB protocol variants and then compare the security and efficiency of these protocols. In the past, the anti-collision protocol and authentication protocol are usually treated separately. Normally, an authentication protocol will begin when an anti-collision protocol ends. In fact, it costs the RFID system too much resources and time to accomplish both purposes when there are many tags present on the scene. Therefore we propose a new protocol called CRPA (Collision Resolution Protocol with Authentication) to make both of them working together. While the anti-collision protocol is progressing, the authentication challenges are piggybacked with the anti-collision commands sent by the reader and the tag will reply the answers after finishing anti-collision. This combined approach can kill two birds with one stone by achieving both anti-collision and authentication at the same time. The security of the proposed protocol is still based on the conjectured hardness of the LPN problem. Let the anti-collision commands piggybacking the authentication challenges can share the transmission resources by streamlining their overall operations. Compared to the traditional separate anti-collision and authentication schemes, this combined approach can complete most of the authentication procedure by the time anti-collision process is finished. It saves a lot of time and message overheads to authenticate the tags due to the parallel processing of the authentication and anti-collision protocols. Furthermore, CRPA doesn’t make use of any complicated mathematical operations (e.g. cryptographic primitives). All the required functions of CRPA are supported by the standard equipments of EPCglobal Class 1 Generation 2. The proposed CRPA protocol is especially applicable to multiple tags scenario that requires anti-collision and authentication. The proposed CRPA protocol will perform the best, if all the challenges sent out are within the timeslot allocations that are required to resolve the anti-collisions. For example, if the tag population on the scene is more than 100, then the proposed CRPA protocol will perform the best for the anti-collision protocol “Q-Algorithm” in EPCglobal Class 1 Generation 2. We will also verify the feasibility and practicability of the proposed CRPA protocol in this thesis, and ensure its security, privacy and un-traceability under passive attacks. In addition, we also propose an extended CRPA, called ECRPA. The ECRPA flips answers using a deterministic probability. The error rate of the answers which received by the reader is identical to the flipping probability. Therefore, the reader can authenticate the same number of tags by fewer answers. Although the reduced answers may lower the overall security, it is more applicable to the low cost RFID tags applications.
Li, Hung-Lin, and 李泓霖. "Design and Hardware Implementation of Hybrid RFID and WSN Mutual Authentication System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/30489901199764949929.
Full text義守大學
電子工程學系碩士班
98
In the past few years, radio frequency identification (RFID; Radio Frequency Identification) and wireless sensor networks Road (WSN; Wireless Sensor Network) has been parallel studied. RFID radio frequency identification system consists of tags and readers (antennas), and composed of middleware, while the wireless sensor network system consists of processing capability, memory, a radio frequency (RF) transceiver and a sensor unit. As the RFID technology mainly used in object tracking and data management. In contrast, WSN is much more mature in source information collection and data transmission routing. The integration of RFID and WSN technologies can achieve better applications. RFID can no longer be limited by its communication range. Through a better WSN communications network, it can improve the performance of RFID tracking ability. In addition, with the combination of smart tags and sensors, WSN can generate the ability to track and identify the object, rather than just monitoring the object. Therefore, it will be able to greatly enhance the performance of wireless sensor networks. Because the WSN itself transmit messages through the wireless communication media, the attacker can access to make anonymous connections or speculation sent the message is vulnerable to eavesdropping, interception and tampering. It is therefore very important to protect the confidentiality of information and privacy for WSN network. In this thesis, the lightweight mutual authentication protocol RFID tags and wireless sensor networks Dynamic User Authentication Scheme have been proposed. To enhance the security and privacy, a proposed mask function is used to establish mutual authentication protocol for WSN application. The simulation results of the proposed mutual authentication protocol are presented. The hardware verification of the proposed mask function is demonstrated on Altera DE2 demo board.
Chen, Shin-Yu, and 陳欣郁. "A Study of Untraceability and Mutual Authentication in RFID Supply Chain System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34072384006151116592.
Full text淡江大學
資訊管理學系碩士班
100
Radio Frequency Identity (RFID) has become more popular day after day in supply chain. However, because of its contact-less retrieval and substantial commercial interests in the supply chain, attackers would seek market intelligence or privacy over RFID. In order to protect commercial benefits, how to ensure the security of RFID system is extremely important. In this paper, based on Liu’s et al. and Yu-Hung Peng’s schemes, we propose a more secure RFID authentication scheme. Proposed scheme add into the reader-to-tag authentication, which eliminate the possibility of hostile reader attack. Furthermore, by equipping hash lock method with random number, our scheme also supports untraceability. Security analysis indicates that the proposed scheme has the highest security.
Lo, Yuan Shiang, and 羅元翔. "Enhancing the Privacy of Low Cost RFID Tag with Mutual Authentication Mechanism." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/25797045643167634621.
Full text長庚大學
資訊管理學研究所
97
The main function of RFID system is to provide automation identification of the product or people using radio wave. Many organizations plan RFID technology to enhance the performance of automated management, improve business process, and services. The industry wants to use RFID system that will bring more developments and applications, including supply chain management, warehouse management, retail stores, access control, healthcare, etc. With the advent of wireless communications environment, the exchange of information between the components should be effectively protected. This paper proposes a secure RFID system based on reduced costs and resource constraints, which consider the low-cost and privacy protection of tags using XOR operations. A mutual authentication is also implemented to apply the XOR operations, thus still achieving effective protection against a variety of attacks and threats through mutual authentication protocols. The RFID system can ensure that the information in the transmission or exchange is more secure, and to protect privacy and confidentiality. For future development, researchers continue to improve the performance of the RFID system components to enhance security and privacy protection mechanisms.
Luo, Rui-Kun, and 羅瑞昆. "The Study of Mutual Authentication and Multi-Contents Mechanism for RFID System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/54274614996624134490.
Full text亞洲大學
資訊工程學系碩士班
97
After the world’s largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints. RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made orders, and decreasing excess inventory. The thesis is to explore the security issues of the RFID EPC Class 1 Generation 2. RFID transmits information wirelessly, and therefore information can be captured. In order to protect data privacy, many scholars have proposed their own ways to improve. This thesis has extended the scheme of Duc et al., and made a more efficient version. However, previously in radio frequency identification (RFID), a single RFID tag is only one purpose. Since previous scheme to achieve multi-contents needs one purpose stored one key in tag and in server, otherwise there will be security issues. In this thesis, we propose a multi-contents RFID tags scheme and it is can be dynamic join-and-leave. In our scheme, tag can choice adding different proposes in multiple applications. Moreover, just authorized tags can be accessed. Our scheme is capable of applying multi-contents tags, and we just need to store one key in tag. Our approach will not cause the large computations of the server.