To see the other types of publications on this topic, follow the link: RFID mutual authentication protocol.

Dissertations / Theses on the topic 'RFID mutual authentication protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'RFID mutual authentication protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, Harold. "Chaos Based RFID Authentication Protocol." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24250.

Full text
Abstract:
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved. As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.
APA, Harvard, Vancouver, ISO, and other styles
3

Jafri, Asad Abbas. "Enhanced secured authentication protocol for RFID systems." Thesis, Wichita State University, 2008. http://hdl.handle.net/10057/2029.

Full text
Abstract:
In this current era of change and revolutionary development every technology has passed on its successor and so has the barcodes. Barcodes have been there for decades and have been used in various products and these can be found in our daily life. The extensive use of barcodes is there in everyday life but the issues faced by them led to the invention of RFID-Radio Frequency Identification Tags. RFID were commercialized not before the early 1990s when the industrialists requested for its availability to the general public so that they can utilize so as to ease their tasks. One of the most important use of RFID came into play in supply chain and warehousing. These were the areas where the object was in a constant motion and there was also a dire need to quantize and track such objects. Like every technology introduced has its setbacks, so does the RFID Tags. The RFID Tags being a baby technology and still in a phase of reformation RFID is facing a major security issue, as it works in a open wireless environment and the current security features have been poor with respect to energy conservation, scalability, time and money. For a place where electronic flow of information is the order of the day, there always has been a sense of security so as to protect the information, while containing time to nano of seconds. This paper similarly focuses on securing RFID communication, and our paper suggests a method that would not only secure the information but would also conserve time and energy. Various methods have been proposed but all are complex and require processing at the Tag, whereas our method takes the calculation and the complexity and sets it at the RFID Access Point.
Thesis [M.S] - Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
APA, Harvard, Vancouver, ISO, and other styles
4

Jafri, Asad Abbas Pendse Ravindra. "Enhanced secured authentication protocol for RFID systems." A link to full text of this thesis in SOAR, 2008. http://hdl.handle.net/10057/2029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Edelev, Sviatoslav [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, and Xiaoming [Akademischer Betreuer] Fu. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol / Sviatoslav Edelev. Gutachter: Dieter Hogrefe ; Xiaoming Fu. Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1076673597/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malecký, Marek. "Analýza vybraných bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237107.

Full text
Abstract:
The subject of this thesis is to study available security protocols and tools for their verification. The first part is devoted to briefly describe the concepts related to the area of security protocols and verification logics. The second part directly lists various protocols, along with attacks and errors found in design. Next chapter describes the most important tools for automatic analysis of security protocols in more detail. The main part deals with verification of security protocols selected in the chosen tool called Scyther. In conclusion, examples of multiprotocol attacks along with a summary table are displayed.
APA, Harvard, Vancouver, ISO, and other styles
7

SANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Ching-chien, and 袁境鍵. "Hardware Implementation of RFID Mutual Authentication Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46028509272753713099.

Full text
Abstract:
碩士
義守大學
電子工程學系碩士班
97
Radio Frequency Identification (RFID) is a wireless technology which utilizes radio communication to identify objects with a unique electrical identity. The widespread deployment of RFID technologies may generate new threats to security and user privacy. One of the main drawbacks for RFID technology is the weak authentication systems between reader and tag. In general, weak authentication systems that either leak the password directly over the network or that leak sufficient information while performing authentication to allow intruders to deduce or guess at the password. According to EPCglobal Class1 Gen2 authentication system, the important information in tag will be exposed inadvertently because of the wireless transmission of data while performing authentication and causes much of threat to security. In this dissertation, we study the RFID tag-reader mutual authentication scheme. To avoid direct exposure of vital information from wireless transmission, the primitive exposed information must be covered in authentication process. A hardware implementation of mutual authentication protocol for RFID system is also proposed. The proposed system was simulated using Altera Quartus II software. The system has been successfully implemented in hardware using Altera DE2 board includes an Altera Cyclone II Field Programmable Gate Array (FPGA). The output waveforms from the FPGA have been displayed on the 16702A Logic Analysis System for real time verification. Finally the gate level files have been performed within mutual authentication schemes using Synopsys Design Vision from CIC and analyzed the power dissipation with different authentication schemes by Prime Power.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Perry, and 李培宇. "RFID mutual Authentication Protocol based on Hamming Distance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56512911502492089377.

Full text
Abstract:
碩士
國立交通大學
網路工程研究所
99
RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed. The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system. The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation.
APA, Harvard, Vancouver, ISO, and other styles
10

Liao, Wei-Chih, and 廖偉志. "Secure and Efficient Mutual Authentication Protocol for RFID systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13935129028580827426.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
99
Radio Frequency Identification (RFID) is a non-contact sensor network technology to automate identification. RFID systems had been applied to many fields and have been considered as a key infrastructure for the ubiquitous society in the future. However, because RFID tag on the inherent limitations of hardware resources, RFID has various security threats like privacy problem, eavesdropping, tag cloning, tag tracing, etc. To address these problems, lots of solutions had been proposed. RFID authentication protocol is one kind of these solutions. The point of RFID authentication protocol is to enforce the security policy between legal RFID tags can the legal RFID readers. RFID authentication protocols provide a mutual authentication mechanism to protect RFID system. But most of them have some drawbacks. These problems include the security not strong enough to resist various RFID attacks, the computation overhead of RFID tag is too high, and the back-end server spends too much time for searching RFID tag data, and etc. In this thesis, we proposed two RFID authentication protocols to overcome these drawbacks. In our analysis, the results have demonstrated that our RFID authentication protocols can resist most common RFID attacks and are more effective than most RFID authentication protocols.
APA, Harvard, Vancouver, ISO, and other styles
11

Omer, Asrar Ahmed. "Mutual authentication protocols for RFID systems." 2007. http://digital.library.okstate.edu/etd/umi-okstate-2556.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, zih Li, and 楊自立. "A Secure Mutual Authentication Protocol for Low-cost RFID System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/52898041463235335840.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊管理系
96
In recent years, RFID technology is rapidly adopted by various industries such as manufacturing, retailer business and medical treatment. Since then security weakness and privacy invasion in RFID systems have become the concern to academic researchers, human right advocators, government apparatus and enterprises. As RFID system operates in wireless environment, it is easy to be threatened by various attacks such as eavesdropping, replay attack, denial of service, tracking and so on. Hence, many researchers devote to solve those security problems in recent years. However, restricted by the current RFID standards, a proposed security solution not only has to comply with hardware restrictions for antenna, battery capacity and chip size, but also needs to meet low-cost requirement; in consequence, pervious researches were not able to eliminate major security threats successfully and enhance the security of RFID usage under such challenging environment. In this thesis, we propose a novel Secure Mutual Authentication Protocol for Low-cost RFID System (SMAP-LRS) whose design and operation can meet the requirements of current RFID standards, such as EPCglobal proposed ones. As best we know, the required memory space of our scheme decreases about 45% to 50% in comparison with other existing mutual authentication protocols. Our scheme also eliminates the major security threats and enhances privacy protection to achieve security requirement such as data security, anonymity and forward security. Keywords: RFID, Privacy, Security, Mutual Authentication
APA, Harvard, Vancouver, ISO, and other styles
13

Cheng, I.-Wen, and 鄭依文. "An Efficient Multilevel Mutual Authentication Protocol of Low-cost RFID Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/86447563571143285560.

Full text
Abstract:
碩士
國立交通大學
電機與控制工程系所
95
The technology of contactless identification of objects, RFID or radio-frequency identification, allows its readers to get application data from the back-end database by object identifications. The convenience resulting from its contactless and low-cost makes it possible to be widely adopted in many areas. However, due to the lack of data privacy and protection mechanism in RFID technology makes the widespread adoption and deployment of RFID technology pose several privacy-related concerns for consumers. In this paper, we propose a mutual authentication protocol for the low-cost RFID systems. We also formally prove the correctness and completeness of the proposed protocol by using GNY logics. In addition, we identify several attacks that can be applied to RFID systems and we demonstrate the security of the proposed protocol. Furthermore, we show compare the performances, including storage cost, computational cost and communication cost, with other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

Shie, Huei-sz, and 謝慧思. "A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/22534334098018982802.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊管理系
96
Radio frequency identification (RFID) has widely applied to many applications including supply chain, logistics management, personnel identification and patient care management. With the increasing usage of a RFID system, information security and end-user privacy have become a critical concern. In terms of security schemes, most of previous RFID authentication researches are too sophisticated for a low-cost RFID system. Factors such as resource-constrained tag, cheaper reader implementation and efficient information search on backend database should all be considered along with the security and privacy protection schemes for low cost RFID systems. In this thesis, we present a mutual authentication protocol which uses the lightweight bitwise logic and arithmetic operations on a low-cost RFID tag to defend against many malicious attacks and achieve security requirements for a RFID system. In our scheme, we use simple and low-cost operations as encryption tools. In order to guarantee communication security, after the reader is successfully verified by a tag, the tag transmits the enciphered ID information to a reader to avoid attacker getting ID information by eavesdropping and to increase the cost of password guessing attack. Our scheme can achieve privacy protection and comply with security requirements to provide secure properties such as anonymity, data confidentiality, anti-cloning, availability, and forward security.
APA, Harvard, Vancouver, ISO, and other styles
15

Tzeng, Shr-shiuan, and 曾士軒. "A Study on RFID Mutual Authentication Protocol Based on Theory of Quadratic Residues." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/8x5859.

Full text
Abstract:
碩士
南華大學
資訊管理學研究所
95
Radio Frequency Identification (RFID) refers to technologies and systems that use radio waves to transmit and uniquely identify objects. These are poise to supplant barcodes, and become perva-sive for many domains in our daily lives. These also provide to re-duce fraud, easy identity checks, and enhance security. However, RFID technology also raises new risks about the privacy and security implications. RFID system has been conducted by wireless com-munication of radio frequency so that the information on identifi-cation could be eavesdropping by the third party maliciously. There are major impediments to their widespread use. Over the past few years, several streams of research have emerged approaching the RFID privacy/security problem from different perspectives. We study a few protocols and propose a novel mutual authentication protocol based on quadratic residues for low-cost RFID tags, and can satisfy security, performance and cost requirement at the same time. Additionally, our protocol is very simple and it can be imple-mented easily with the use of standard cryptographic hash func-tions.
APA, Harvard, Vancouver, ISO, and other styles
16

Shen, Yi-Jie, and 沈意傑. "RFID Mutual Authentication Protocols with Location Privacy and Scalability." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/36414840571104848191.

Full text
Abstract:
碩士
國立成功大學
資訊工程學系碩博士班
96
Radio Frequency Identification (RFID) is an automatic identification technology without the physical contact。Due to the low cost and conveniently identifying objects without physical contact,the RFID technology has been widely deployed in many applications that include retail business,supply chain management, pharmaceutical industry, inventory control, etc. However, the wireless accessing characteristics of RFID system allows the outsider to easily eavesdrop the transmitted messages. The possible attacks including revealing user privacy, tracking problem and impersonation behavior produce the secure risk. Therefore, the design of an efficient and secure protocol without using complicate cryptographic techniques for RFID systems is an important issue。 Though many authentication protocols for RFID have been proposed recently, they either cannot protect the location privacy of tags or have high overhead on identifying tags for the backed-end server。Moreover, an inefficient authentication protocol suffers easily the deny of service (DoS) attack. None of them provide satisfactory solution for both problems at the same time。 This paper proposes the security requirements and analyses the reason why these recently researches cannot fulfil the security requirements. This paper also proposes two mutual authentication protocols. The first protocol protects the location privacy and is efficiency on performing the authentication. The second protocol not only achieves the proposed requirements but also solve the attack of DoS completely.
APA, Harvard, Vancouver, ISO, and other styles
17

Lin, Ching-Chao, and 林青照. "The Study of Using Mobile RFID to Design RBACThe Study of Using Mobile RFID to Design RBAC Mutual Authentication Protocol." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71993130973189428634.

Full text
Abstract:
碩士
南台科技大學
資訊傳播系
98
Due to the popularization of information science and the development of network technology, the internet has become the transmission medium in the modern information system. It needs to achieve the goals of the integrity, security and privacy when the Internet transmits data. In the Internet, it needs a perfect security authentication protocol to make sure that the lawful user uses the remote server to obtain the service and the resource. The wireless radio frequency recognizes (RFID) is a very convenient of technology and it can read the data without contacts. The tag can be embedded in the object and identified through the wireless technology quickly. Gradually, the mobile device is embedded the reader by applying the RFID technology. Hence, the user uses the RFID technology embedded the reader through wireless network to read the information of tag on the object and use the service .The Mobile RFID could improve disadvantages of the traditional RFID technology. The characteristics of mobility can make the reading more flexible, and it can process real-time to make up for the insufficiency of stationary of RFID device. If offers the faster and effect process .It has the most important security privacy problem to the mobile RFID. However, the problem of constructing a mobile RFID protocol is how to protect the user’s privacy. The thesis proposes a secure mutual authentication protocol which applies by the appointed architecture of mobile RFID. The reader can get the specific role class though backend database server. The reader can process the mutual authentication with the backend database server and the tag. It can limit the reading times and the information of tag to achieve the protect of privacy
APA, Harvard, Vancouver, ISO, and other styles
18

Mota, Rajesh Kumar. "Role of Cryptographic Welch-Gong (WG-5) Stream Cipher in RFID Security." Thesis, 2012. http://hdl.handle.net/10012/6769.

Full text
Abstract:
The purpose of this thesis is to design a secure and optimized cryptographic stream cipher for passive type Radio Frequency Identification (RFID) tags. RFID technology is a wireless automatic tracking and identification device. It has become an integral part of our daily life and it is used in many applications such as electronic passports, contactless payment systems, supply chain management and so on. But the information carried on RFID tags are vulnerable to unauthorized access (or various threats) which raises the security and privacy concern over RFID devices. One of the possible solutions to protect the confidentiality, integrity and to provide authentication is, to use a cryptographic stream cipher which encrypts the original information with a pseudo-random bit sequence. Besides that RFID tags require a resource constrained environment such as efficient area, power and high performance cryptographic systems with large security margins. Therefore, the architecture of stream cipher provides the best trade-off between the cryptographic security and the hardware efficiency. In this thesis, we first described the RFID technology and explain the design requirements for passive type RFID tags. The hardware design for passive tags is more challenging due to its stringent requirements like power consumption and the silicon area. We presented different design measures and some of the optimization techniques required to achieve low-resource cryptographic hardware implementation for passive tags. Secondly, we propose and implement a lightweight WG-5 stream cipher, which has good proven cryptographic mathematical properties. Based on these properties we measured the security analysis of WG-5 and showed that the WG-5 is immune to different types of attacks such as algebraic attack, correlation attack, cube attack, differential attack, Discrete Fourier Transform attack (DFT), Time-Memory-Data trade-off attack. The implementation of WG-5 was carried out using 65 nm and 130 nm CMOS technologies. We achieved promising results of WG-5 implementation in terms of area, power, speed and optimality. Our results outperforms most of the other stream ciphers which are selected in eSTREAM project. Finally, we proposed RFID mutual authentication protocol based on WG-5. The security and privacy analysis of the proposed protocol showed that it is resistant to various RFID attacks such as replay attacks, Denial-of-service (DoS) attack, ensures forward privacy and impersonation attack.
APA, Harvard, Vancouver, ISO, and other styles
19

Allahem, Hisham. "MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS." 2013. http://hdl.handle.net/10222/21728.

Full text
Abstract:
Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a system consists of a tag with a unique identifier, a tag reader and a backend server. Due to the system's limited computational resources, it can be subject to various types of attacks. This can exacerbate when the reader itself is mobile. The objective of this thesis is to propose a mutual authentication scheme for mobile RFID systems. Our proposed scheme uses a shared encryption key generated and updated by the mobile reader to authenticate the system entities. The encryption keys are updated at the end of each authentication session. Experimental results show that the proposed scheme meets the security and privacy goals, and resists known attacks on mobile RFID systems
APA, Harvard, Vancouver, ISO, and other styles
20

Lee, Yu-Lin, and 李昱霖. "Mobile RFID Mutual Authentication and Ownership Transfer." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/72650312043937650900.

Full text
Abstract:
碩士
中原大學
資訊工程研究所
96
RFID had been widely used in manufacturing, supply chain, inventory control and other areas. Lately, in order to increase the convenience of tags, we had developed mobile readers through the combination of RFID reader chip and the mobile devices. But also, there was some limitation about tags. EX: data transmission between tag and reader is unencrypted; readers may not authorize to read. Therefore, people who have installed this device may have read other people’s massage on the tags. It means the privacy of users might be under threat. For those reasons, we map out a protocol under Mobile RFID. When tags need to be read, it has to get though mutual authentication. After that, database will take action base on the Role Class of the tags, and deliver the related massages to the reader. In addition, we can also change the secret key of the tags in order to achieve the purpose of transfer ownership. This scheme could resist replay attack and provide data privacy, location privacy, and ownership transfer.
APA, Harvard, Vancouver, ISO, and other styles
21

Lin, Chia-Min, and 林家民. "The Study on RFID Mutual Authentication Schemes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73946799125537158882.

Full text
Abstract:
碩士
亞洲大學
光電與通訊學系碩士班
99
RFID security protocol is widely discussed as an important issue, while most of the mutual authentication with the security agreement has been discussed most enthusiastically. The security of ultralightweight RFID authentication protocol has been discussed and has focused on low-cost RFID.In 2007, based on the SASI protocol proposed by Chien , a very small amount of calculation and communication costs can reach ultralightweight security protocol, which has been discussed by many paper. However all of the articles discussing the SASI protocol have not come up with effective improvement programsThis article cited in 2008, Xuefei Leng, Keith Mayes and Konstantinos Markantonakis has three methods proposed by scholars to be improved, so that was only one way to identify the HB family of agreements with the successful characteristics of mutual authentication.
APA, Harvard, Vancouver, ISO, and other styles
22

Lai, Ching-Hong, and 賴慶鴻. "An RFID authentication protocol resisting data collision." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/93761835855512196140.

Full text
Abstract:
碩士
淡江大學
資訊工程學系碩士班
96
With the gradual mature of radio-frequency identification (RFID) related techniques, the range of its applications becomes wider and wider; they include people identification, entrance gate control, object identification of shopping malls, supply chain management, health care, automatic collection of road tolls, and so on. However, with the malicious attacks on these systems getting severe, a secure authentication scheme with privacy protection mechanism becomes more and more important. In this paper, we will first introduce the system architecture of RFID and its various applications. We then survey the related research work on RFID authentication protocols, including the initial setting, the execution procedure, and analysis whether each of the seven security properties they possess: (1) resistance to eavesdropping, (2) resistance to tracking, (3) resistance to replaying, (4) resistance to de-synchronization, (5) resistance to key collision, (6) providing perfect forward secrecy, and (7) supporting mutual authentication. We will point out that the authentication scheme proposed by Liu-Wang-Huang is vulnerable to key collision. We then present an improved protocol to remedy the weakness of their scheme. Finally, we compare our improved authentication scheme with other related schemes and propose a guideline to further enhance our modified scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

Kuo, Shang-Lun, and 郭上倫. "A Secure RFID Authentication Protocol with Anonymity." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53204662957143625666.

Full text
Abstract:
碩士
淡江大學
資訊工程學系碩士班
98
RFID (Radio Frequency Identification) technology has been widely used recent years. A main system is composed of three parts: RFID tags, readers, and a backend server. Because chips are small and antennas are easily made into various shapes, these make RFID systems easy to use. Moreover, RFID systems transmit by wireless and their prices are more and more affordable. They are not like traditional barcode systems which can easily be destroyed and soiled by outside environments. Using traditional barcode systems is not efficient because they have to be used in visual accessible distance to contact objects. Therefore, several of applications of RFID systems are entrance gate control systems, shopping malls charging systems, industrial manufacturing parts management systems, medical applications systems, supply chain management systems, and so on. Since RFID is communicated by wireless and has limited computing power, it cannot provide complex computations. Therefore, providing efficient and secure authentication schemes becomes an important issue. Many researchers have proposed various authentication schemes for RFID systems. In this thesis, we analyzed and discussed the security problem of these research works. The security problems including the capabilities of tag anonymity, resistance to replaying attack, recovery from de-synchronization attack, resistance to man-in-the-middle attack, resistance to tag impersona¬tion, resistance to reader impersonation, tag anti-cloning and mutual authentication, resistance to tag tracking, avoidance to location privacy disclosure, and providing forward secrecy. We also improved Choi et al.’s authentication scheme and compared the improved scheme with other existing schemes based on the above security features.
APA, Harvard, Vancouver, ISO, and other styles
24

Chang, Chen-Yi, and 張軫益. "An Improved Mutual Authentication Scheme for RFID Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65302569011742691463.

Full text
Abstract:
碩士
國立中興大學
資訊科學與工程學系所
97
RFID (Radio Frequency Identification) systems, having wireless characteristics, have many applications, including all trades and professions such as Wal-Mart, airports and airlines. The tags of RFID are made at present very small. Domestic and international companies pay very close attention to the relevant applications and development of RFID. The mutual authentication among the iron trigonometry (server, reader, tag) of a RFID system is very important. In 2008, Mitchell and Song put forward a novel RFID authentication mechanism [11]. In this thesis, we improve its efficiency and enhance its function to allow mutual authentication between the server and the reader.
APA, Harvard, Vancouver, ISO, and other styles
25

MinhDuc, Ta, and 謝明德. "A new mutual authentication protocol for mobile communication." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/76357026015735147984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

HSIAO-FENG, WANG, and 王曉峰. "A Remote Mutual Authentication Protocol Using Smart Cards." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/47581868333964313328.

Full text
Abstract:
碩士
國立中興大學
資訊科學研究所
89
We propose a scheme which can verify the remote access passwords without verification tables. The scheme utilizes the signature aspect of public key cryptosystems in conjunction with the use of smart cards. Before the server authenticates the remote user who wishes to get the services of the server, the user can authenticate the server as well. In other words, the scheme achieves mutual authentication between the server and the remote user. During the login, the user submits his identity(ID)and password associated with his smart card. After authenticates the server, the smart card uses a signature scheme to check whether or not the login can be accepted. The scheme can also be protected against replay by adding the communication time stamps, and there is no problem to synchronize the clocks on the Internet that previous researches have to do. To lower the computational requirements of smart cards, We employ the technique of precomputation which allows the shifting of computation to the server.
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Jia-Hong, and 李佳鴻. "Lightweight Mobile RFID Authentication Protocol for Location Privacy." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/53656290650698755245.

Full text
Abstract:
碩士
中原大學
資訊工程研究所
96
Radio Frequency Identification(RFID) systems is used in various fields such as supply chain management, inventory control, medical management, indoor access control, and so forth. Recently, it is expanding to become the mobile RFID systems for more convenience. Through RFID reader chip is installed to mobile terminal like PDA or cellular phone, which can provide purchasing, verifying and paying for the product directly. However, mobile reader and tag using RF signals to communicate with each other, and low-cost tag can’t provide enough security protection. The malicious attacker can pretend as mobile reader to cause security and privacy problems such as tag’s information leakage and owner traceability. In this paper, we propose a PIN-test Set based scheme suitable to mobile RFID systems and conforming to EPC Class-1 Generation-2 standards. Our scheme is forward-secure and prevent from threats such as reply attack, DOS attack, man-in-the-middle attack, and tag counterfeit.
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, PingChung, and 林品仲. "A Lightweight RFID Authentication Protocol with Privacy protection." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/68018444803958751584.

Full text
Abstract:
碩士
長榮大學
資訊管理學系碩士班
99
Recently, many aspects of the security in RFID systems has become a subject of prime attention. RFID technology has been applied heavily for its small size, low cost, and ability to stores large amounts of data. However, the features in RFID technology, such as unique identification and out-of-sight readability, can also bring about some security concerns. In this thesis, we address the tracking issue of RFID tags and propose a protocol to perform authentication while preserving the privacy of its user.
APA, Harvard, Vancouver, ISO, and other styles
29

Wei-LiHuang and 黃為立. "RFID Privacy Protection Authentication Protocol with Staying Tags." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bfazgv.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wu, Cheng-lun, and 吳政倫. "An efficient RFID mutual authentication scheme based on ECC." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/54807303314958452676.

Full text
Abstract:
碩士
南華大學
資訊管理學系碩士班
99
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs which use RFID to manage the placing of drugs and amusement park using RFID to search for missing children. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy problem. Therefore, researchers tried to resolve this problem. Most of them investigated on how low-cost RFID tags can be used in large-scale systems. However, after analyses, we found these studies have some problems, such as suffering physical attack, or de-synch attack. Hence, in this paper, we try to design an efficient RFID scheme based on Elliptic Curve Cryptography (ECC) to avoid these problems. After analyses, we conclude that our scheme not only can resist various kinds of attacks but also outperforms the other ECC based RFID schemes in security requirements with needing only little extra elliptic curve point multiplications.
APA, Harvard, Vancouver, ISO, and other styles
31

Edelev, Sviatoslav. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol." Doctoral thesis, 2015. http://hdl.handle.net/11858/00-1735-0000-0023-9618-D.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

陳培郁. "A Study on ECC-Based RFID Lightweight Authentication Protocol." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/63612131090957109939.

Full text
Abstract:
碩士
國立清華大學
資訊工程學系
98
RFID technology has become popular in many applications, but it also raised security and privacy concerns. Many people worry about the disadvantages which brought by RFID technology, such as leaking their location privacy and confidentiality of private information. However, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure the RFID systems with untraceability, which is one of the most critical privacy issues in RFID. But we found that this protocol is still vulnerable to tracing attacks, and two variant attacks are presented to break Chien’s protocol. In this thesis, we propose an ECC-based mutual uthentication protocol for RFID. Our protocol requires only lightweight operations that can be mounted on the low-cost tags. With an ECC-based filtering mechanism applied, the computational load on the RFID reader can be reduced. Therefore, our protocol is appropriate for the real-world applications. Further analysis shows that the protocol is secure against the common security threats of RFID systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Hsiao, Chin-Wen, and 蕭景文. "A Low Cost RFID Authentication Protocol and its Application." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/cc262v.

Full text
Abstract:
碩士
國立中興大學
資訊科學與工程學系所
101
Radio Frequency Identification (RFID) system is composed of electronic tags, the reader and back-end database server, and has been widely used in daily life. This thesis presents a low-cost authentication protocol, with simple XOR operation and shift operation. When applying it in daily shopping, Customers can quickly get access to Daily Sales and Deals messages, and Shops can save money in printing and dispatching Ads and increase revenue at the same time, thus creating a win-win solution. Reducing the amount of Ads and flyers is also being friendly to the environment.
APA, Harvard, Vancouver, ISO, and other styles
34

Yu, Po-Kai, and 游柏凱. "A Privacy and Authentication Protocol for Mobile RFID Systems." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5gkgsh.

Full text
Abstract:
碩士
國立臺中科技大學
資訊工程系碩士班
102
Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed schemes do not conform to the EPC Class-1 GEN-2 standard for passive RFID tags as they require the implementation of hash functions on the tags. Furthermore, due to secure channel assumptions previously proposed schemes are not suitable for wireless/mobile reader applications. In 2013, Doss et al. proposed the mutual authentication for the tags, the reader, and the back-end server in the RFID system. Their scheme is the first quadratic residues based to achieve compliance to EPC Class-1 GEN-2 specification and the security of the server-reader channel may not be guaranteed. However, this article will show that the computational requirements and bandwidth consumption are quite demanding in Doss et al.’s scheme. It is not practical for the server and the reader to obtain the information of tags for the quality of services. To improve Doss et al.’s protocol, this study proposes a new efficient RFID system where both the tag-reader channel and the reader-server channel are insecure. The proposed method is not only satisfies all the security requirements for the reader and tag but also achieve compliance to EPC Class-1 GEN-2 specification. Moreover, the proposed scheme can be used in a large-scale RFID system.
APA, Harvard, Vancouver, ISO, and other styles
35

WU, KUAN-LIANG, and 吳冠良. "The Research of RFID Lightweight Authentication Protocol for VANETs." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/42297940033975624068.

Full text
Abstract:
碩士
中華大學
資訊工程學系
104
With the advancement of technology, Radio Frequency Identification (RFID) system for the convenience in our life have been deeply affected. In the case of daily life, almost everyone has some RFID proximity cards, but there are some important personal privacy or information security issues. Because of the RFID tag is to transmit signal to the reader by using wireless channel, it is likely to suffer malicious user to track, eavesdrop, replay or denial of service attacks, etc.. To solve the above security issues, many scholars have proposed different RFID authentication protocols. In 2012, Caballero-Gil et al. presented CG authentication protocol to solve replay attack and track attacks, but their protocol cannot resist the problem of brute force and de-synchronization attacks. Fereidoun Moradi et al. proposed CG+ authentication protocol to solve the de-synchronization problem in CG authentication protocol. But we found that CG+ authentication protocol may still allow the attacker through denial of service attack to cause de-synchronization attack between by database and tag. Therefore, an improved method will be analyzed and submitted in this research. At the same time, our method can effectively reduce the tag and database computation overheads and it comply EPCglobal Class1 Generation2 standard. We expect our research results can be applied to VANETs(Vehicular Ad Hoc Networks) in the future.
APA, Harvard, Vancouver, ISO, and other styles
36

Cai, Jhong-Heng, and 蔡仲恆. "The Research of Lightweight Mutual Authentication Protocol for Mobile Payment." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/76084473635154181926.

Full text
Abstract:
碩士
義守大學
電機工程學系
104
Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods. Although the concept of using non-coin-based currency systems has a long history, it is only recently that the technology to support such systems has become widely available. NFC is used mostly in paying for purchases made in physical stores or transportation services. Most transactions do not require authentication, but some require authentication using PIN, before transaction is completed. Mobile payment method via NFC faces significant challenges for wide and fast adoption, due to lack of supporting infrastructure, complex ecosystem of stakeholders, and standards. Due to the need of a safer NFC mobile payment system with low computational complexity, an XOR-based mutual authentication protocol is developed in this thesis. In order to demonstrate the superiority on computational complexity and security of proposed protocol, four other authentication protocols have been surveyed and numerical experiments have also been conducted to provide the performance comparison. EPCglobal Class-1 Gen-2 need other method to improve its encryption process, and it is not a mutual authentication protocol. Tag-Reader Mutual Authentication need a lot of input parameters to support its encryption process. IOT lightweight authentication protocol will expose all its parameters and messages during message exchange. ECMA-386 do many Complex calculations during encryption process. All of those are the purpose of published this thesis.
APA, Harvard, Vancouver, ISO, and other styles
37

Chiou, Huan-Shiun, and 邱煥訓. "An Efficient RFID Authentication Protocol based on Quadratic Residue Cryptosystem." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/49995145522923900172.

Full text
Abstract:
碩士
中華大學
資訊工程學系碩士班
99
Radio Frequency Identification (RFID) is the popular technology in recent years. Wal-Mart is the leader of department store in the U.S., and it requests all goods for the top 100 suppliers must be attached RFID tag before 2006. It produces a serious change with the supply chain management of RFID technology. Moreover, Ministry of Economic Affairs takes the lead promote a plan in 2005 that uses the RFID in the public places. It also guides the development of private enterprises. They raise the concerns of industry and academia. The RFID technology will be applied in each kind of domain in the future. Recently, the popularity of RFID applications creates a convenient life. It also brings various security issues. There are many scholars presented solutions to improve these problems. In this paper, we will review some recent RFID authentication protocols. In 2008, Chen et al. presented the authentication protocol based on quadratic residue cryptosystem. Yeh et al.’s pointed out that Chen et al.’s scheme is vulnerable to impersonation attack and replay attack and submitted the improved scheme in 2010. Our proposed scheme is not only increase efficiency in RFID, but also retains the same safety properties. It needs only one quadratic residual operation in the tag and server respectively. The total numbers of operations in our scheme are less than Chen et al.’s and Yeh et al.’s schemes. Therefore, the proposed RFID authentication scheme is better in efficiency based on quadratic residue cryptosystem.
APA, Harvard, Vancouver, ISO, and other styles
38

CHEN, CHIEN-JU, and 陳健儒. "A Low-Cost Security Authentication Protocol Against RFID Common Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/96531132481673890358.

Full text
Abstract:
碩士
中華大學
資訊工程學系碩士班
100
ABSTRACT In recent years, Radio Frequency Identification (RFID) is gaining popularity. It has a wide range of applications in consumer market, such as supply chain management, warehouse management, healthcare, door access management and animal tracing chip, etc. in recent years. However, the RFID system is used to wireless communication technology transferring data. Therefore, it may have many potential security and privacy issues. Currently, there are many scholars that propose the methods of RFID security and privacy issues, but it still has many issues unresolved. In 2009, Lei et al proposed a revised efficient authentication protocol for low-cost RFID system (R-LCAP). He claimed to solve Lee’s authentication protocol (LCAP) forward security of issues. After our analysis of security, we still found security vulnerabilities of tracing privacy and de-synchronization problem in R-LCAP. Therefore, we propose an improved RFID security authentication protocol for R-LCAP in this paper. We solve tracing privacy and denial of service (DoS) attack that cause data not being synchronized in security issues. Our protocols enough to resist RFID common methods of attacks, contains(形容詞) Information leakage, Mutual authentication, Replay attack, Forward security, Untraceability and Denial of Service to cause De-synchronization. We also enhance RFID security and privacy. Our protocols computation cost is lower than Lei’s protocol. The proposed protocol satisfies the security property and conforms to the low cost authentication protocol to provide security design and applications. Keywords:RFID、Authentication、De-synchronization、Security
APA, Harvard, Vancouver, ISO, and other styles
39

LU, SHU-YING, and 呂淑瑛. "An improvement to a secret key changing RFID authentication protocol." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/avx79r.

Full text
Abstract:
碩士
中國文化大學
資訊管理學系
107
With the rapid development of technology, RFID (Radio Frequency Identification) has been widely used in everything of life. Also, the more massive using of RFID, the authentication protocol to secure information transmitted by the network are more important. The effective and efficient scheme can protect users from maliciously falsified, impersonated and unusable attacks that result in huge economic losses. This study explores how to use the schemes of key changes in RFID authentication protocols to defense tag spoofing and Denial-of-Service attacks. Firstly, we find the Dass and Oms and Yu and Zhangs RFID authentication protocols still have some security weaknesses. Secondly, we propose a light improved protocol for Dass and Oms scheme to resist attacks. Finally, we compare the improvement protocol with the Dass and Oms and Yu and Zhangs schemes with security and performance analysis that show the improved protocol has better performance and can effectively resist tag counterfeited and Dos attacks.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Yu-Hsien, and 李育賢. "The Study of Off-Line Authentication Protocol for RFID tags." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/73853308271854010380.

Full text
Abstract:
碩士
南台科技大學
資訊管理系
96
Recently, RFID researches have been considered as the main development by the government. Basically, RFID sends messages through radio wave. Therefore, how to recognize the tag information correctly and protect users’ privacy have become important issues. For solving these security issues, many scholars proposed some RFID protocols. However, most protocols are relying on one on-line backend server and cannot work on an off-line environment. In 2007, Fouladgar and Afifi first proposed the off-line SiDES protocol. Later, Lin proposed a TCD-RP protocol. They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi’s SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin’s protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame. Therefore, this thesis designs a more secure RFID protocol to fix these security flaws. In 2007, Fouladgar and Afifi also proposed EDTOP protocol which is based on AES and keeps higher performance on the operations of tag ownership transform. However, it also fails to achieve the forward security. Therefore, this thesis further proposes an improved protocol which can achieve the forward security.
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, Shiow-Hsiang, and 李秀香. "A Study of Mutual Authentication on RFID Security and Its Applications." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/50583768046013253571.

Full text
Abstract:
碩士
國立中興大學
資訊科學系所
95
Including Japan , Korea S. and our national capital promote the ubiquitous network society in a more cost-effective manner at pr esent, the ones that hoped with new science and technology , such as the mobile communication, wireless network ,etc. are auxiliary , strengthen management and working efficiency, and then improve the output value of enterprise. And Radio Frequency Identification (RFID) system vigorous a technology continuously at present among them. As RFID is used extensivly day by day, its safe mechanism can be met and manager'' s and consumer''s demand, is the key factor of this application can be survived. In the application of RFID, because the relevant software and hardware environment is excellent in the active system, can use the tight security certification mechanism, but the cost raises much more relatively; And the passive form system used extensively, its advantage is relatively low for cost, but because the factors of the electric energy consumed and memory or storage capacity, etc., it is relatively limited too that its security mechanism adopted selects. This thesis briefly presents the current problems and solution to RFID security and privacy, and will propose an improved protocol with mutual authentication, the methos that we design, can increase the security of back-end system, reader and tag by verifying each other at the same time, and can prevent the Denial of Service (DoS) attacks. In addition, the computation loads of the back-end system is also reduced, thus we can reach the demands of a secure RFID system including security, efficiency and low cost.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Shen yi, and 王聖懿. "Extended mutual authentication protocol for Radio Frequency Identification under insecure communication." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/64176559863909801632.

Full text
Abstract:
碩士
長庚大學
資訊管理學系
98
Radio Frequency Identification (RFID) is a form of automatic identification and data capture technique. RFID is recently being used in a wide range of areas such as supply chain management (SCM), health care, retail, entrance guard management, identity identification, luggage management and access control, etc. The ability to store large amounts of data and identify items which are not in the line of sight has given RFID technology an edge over other automatic identification approaches such as the barcode systems and optical character recognition systems (OCR). As an example, RFID technology in the SCM systems has resulted in the reduced loss, and improved visibility in various stages of SCM. However, the broadcast of wireless signal during RFID raises important security issues. This is a problem on how to design an efficient authentication protocol for RFID systems. Form the past researches, include some important topic like the topic of owner transfer information, it is a key point we want to exchange. To modify the scheme of Yoon and Yoo which revised the disadvantage of Osaka’s approach, increase base on unique ID value of field address, combination of a new virtual ID value, as a verification method, and the given recommendations. To prevent is attack of the power analysis. Let power analysis can not directly attack and collection ID information. After virtual treatment which is by the reality ID information. We propose an effective protection against a variety of attacks and threats through mutual authentication protocols approach: (1) To strengthen the ownership transfer of security reasons. (2) To improve the feasibility of encryption algorithms and more. (3)To improve after the produce of random variable transmission privacy issue. We can apply the different researches like the RFID system can ensure that the information in the transmission or exchange to be more secure, and to protect privacy and confidentiality. We propose the security method to achieve the following security requirements such as (1) Forward security, (2) Replay attack, (3) Tag killing, and (4) Ownership transfer. Then Cryptographic complexity and efficiency message protocol can also be reduced. We believe that the transmission and access security to back-end database server are secure enough. The main purpose of our study is to prevent power analysis. Between the database and the tag transfer, and ownership transfer between the database and owner. And the new owner user to communicate with the database, database will be a security mutual authentication mechanism.
APA, Harvard, Vancouver, ISO, and other styles
43

Yang, Shun-Miao, and 楊舜淼. "A Lightweight RFID Authentication Protocol with Collision-Free Based on CDMA." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/74417138417627611086.

Full text
Abstract:
碩士
雲林科技大學
資訊工程研究所
98
Radio Frequency IDentification(RFID) is an automatic identification system, it’s said that a RFID reader can identify a large number of tags simultaneously. For commercial products, however, a RFID reader identifies tags one by one. This is because collisions occur when several tags send their data at the same time. The RFID authentication protocols[7][8][9] put heavy computational overhead on low-cost tags, which don’t have the ability to perform complex operations. To overcome the collision and computation overhead problems, we propose a lightweight RFID mutual authentication protocol with collision-free based on CDMA. By CDMA Technology, the scheme allows many tags to send their data simultaneously without collision. The proposed scheme requires a tag to perform 2~4 hash operations during authentication phase and has the following secure properties: tag anonymity, indistinguishability, robustness, forward secrecy and mutual authentication. In addition, the scheme can also resist the following attacks: eavesdropping, replay attack, forgery attack, tracking attack and de-synchronization attack.
APA, Harvard, Vancouver, ISO, and other styles
44

YU, HSIANG-CHENG, and 游翔晨. "Resist Common Attacks on RFID Authentication Protocol Conforming to EPCglobal Standard." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/44003131741767942572.

Full text
Abstract:
碩士
中華大學
資訊工程學系碩士班
100
Radio Frequency Identification (RFID) system is most concerned to the academia and industry in recent years. It is not only replacing the bar code system but also taking more applications in our life. For example it is used in automatic parking payment system, public transport system, entry control system, supply chain management, e-passports and credit card. While RFID technology is growing quickly, and people begin to pay attention on consideration of the RFID technology. However, it will bring some security and privacy problems. Recently, many scholars were researching the RFID security and privacy issues. In 2003, Weis etc. proposed the RFID authentication protocol. They are started the research direction of RFID system security. In 2007, Chien and Chen designed the RFID authentication protocol by using random number and Cyclic Redundancy Code (CRC), which is conforming to EPC Class 1 Generation 2 Standard. In 2010, Yeh etc. pointed out the Chien and Chen’s protocol still have some problems include Denial of Service attack, privacy issue and database loading. Yeh etc. proposed an improvement protocol to correct the problem later. However, we have researched the authentication protocol of Yeh etc. and we discover that their protocol still have some problems. In this paper, we indicated the Yeh etc. protocol is still suffering replay attack. We will propose a new authentication protocol to fix their weakness. Our protocol does not require additional memory cost. Our proposed protocol can provide strong privacy protection and data security including to resist replay attack, resist eavesdropping attack, resist tracking, resist DoS attack, obtain forward security, privacy issue and lower database loading. Our method is secure to protect important RFID information in the future.
APA, Harvard, Vancouver, ISO, and other styles
45

Chuang, Tsung-i., and 莊聰益. "An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/57064410474347881584.

Full text
Abstract:
博士
國立臺灣科技大學
管理研究所
103
As RFID technology has emerged in our daily life, the prevention of illegal access and information leakage of RFID based applications becomes a practical requirement. A more secure and privacy aware RFID authentication protocol is devastatingly needed. Recently, Lin et al. proposed a mutual RFID authentication scheme conforming EPC Class 1 Generation 2 (EPC GEN 2) standard to deliver strong data privacy, robust system security and computation efficiency. However, their claimed security cannot hold. In this dissertation, we demonstrate how to break through Lin et al.’s authentication scheme by engaging a series of active attack procedures. The computational complexities of identified attacks are practical so that Lin et al.’s scheme cannot improve security any more than the EPC GEN 2 standard. Furthermore, we develop a new RFID authentication protocol to enhance security density, prevent threats of tag tracing and secrecy disclosure, and achieve the similar computational cost as Lin et al.’s protocol does.
APA, Harvard, Vancouver, ISO, and other styles
46

Ho, Huang-Kuan, and 何皇寬. "A Combined Low Cost RFID Tag Collision Resolution Protocol with Authentication." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/17756594656489648486.

Full text
Abstract:
碩士
國立臺灣科技大學
電機工程系
96
Radio Frequency Identification (RFID) system has been widely used in many different areas. Its main purpose is to identify an object quickly. The most popular application of RFID is in supply chain management for barcode replacement. Different from traditional barcode, RFID has many advantages such as no line-of-sight requirement, high toleration of harsh environments, long read range, large storage space, traceability, and multiple reads at once. A RFID system consists of the Reader(s) (or Interrogator), the Tag(s) (or Transponder) and the back-end host system. Usually a reader sends a RF signal at the working frequency, and then the tag responds with a RF signal at different frequency. Because the information conveyed between the reader and the tag is through RF channel, if multiple readers or tags transmit data simultaneously, then these data may interfere with one another and can not be recognized. Multiple readers can communicate with each other via physical lines, however tags won’t be able to do that due to their limited resources (e.g., most tags do not have internal power). Therefore in order to singulate each tag by the reader successfully, we need a specific method, which is the anti-collision protocol to achieve this goal. First, we present an overview of the existing anti-collision protocols and then we classify and compare them according to their major characteristics. The existing multiple access techniques in RFID system include Space Division Multiple Access (SDMA), Time Domain Multiple Access (TDMA), Frequency Domain Multiple Access (FDMA) and Code Division Multiple Access (CDMA) four major categories. TDMA is the most popular approach to achieve anti-collision and further divided into Reader-driven and Tag-driven. Because it is hard for a RFID passive tag without internal power to drive anti-collision actions, therefore we will concentrate our discussions only on the Reader-driven anti-collision schemes, which are the main streams in the passive tags environment. In those schemes, a reader must dominate the anti-collision protocol and tell the tags what they should do. Reader-driven protocols could be classified into two major approaches, one is tree-style since it uses the tag ID to build a binary tree, while the other is ALOHA-style since it uses a contention-based multiple access scheme to assign each tag into a unique timeslot. They are both widely used in today’s RFID standards and specifications (e.g., the EPCglobal Class 1 Generation 2 uses an anti-collision protocol named Q-Algorithm, which is an ALOHA-style protocol), therefore this thesis mainly addresses the tree-style protocols and ALOHA-style protocols. Although there already exist several taxonomies on the anti-collision protocols for RFID system, none of them has incorporated all the latest proposed protocols. Therefore, we enhance the existing taxonomies especially with a special focus on tree-style protocols and ALOHA-style protocols, and also add a recently proposed SDMA based anti-collision protocol which is different to the mainstream TDMA. Besides the collision problem, RFID applications today also face the threats of security and privacy. A tag may leak the information of the tagged item if an invisible adversary could trace or monitor this item surreptitiously. In order to prevent either a fraudster who uses a counterfeit tag to cheat a legitimate reader into believing it is an authorized tag, or a fake reader intends to obtain the sensitive information from a legitimate tag, we need an authentication protocol to protect the security and privacy of the RFID system especially in the tags. Although many authentication protocols have been proposed, none of them is perfect and not suitable to be deployed in many different scenarios. The authentication protocol usually starts by sending a challenge from an authentication server / verifier (a person or a device) to a party who is to be authenticated. For instance, if the reader sends a challenge to the tag, then the tag computes a response by using a pre-shared secret key in combination with the challenge as a feedback reply to the reader. Subsequently the reader verifies whether the received response is a correct to determine the tag’s legitimacy. If true, the reader provides the service that the tag requested or denies its request if false. This thesis discusses an authentication protocol proposed by Hopper and Blum, named HB protocol. The security of HB protocol is based on the conjectured hardness of the “Learning Parity with Noise” (LPN) problem. HB protocol can combine with anti-collision protocol that is different to other authentication protocol. We will also show other HB protocol variants and then compare the security and efficiency of these protocols. In the past, the anti-collision protocol and authentication protocol are usually treated separately. Normally, an authentication protocol will begin when an anti-collision protocol ends. In fact, it costs the RFID system too much resources and time to accomplish both purposes when there are many tags present on the scene. Therefore we propose a new protocol called CRPA (Collision Resolution Protocol with Authentication) to make both of them working together. While the anti-collision protocol is progressing, the authentication challenges are piggybacked with the anti-collision commands sent by the reader and the tag will reply the answers after finishing anti-collision. This combined approach can kill two birds with one stone by achieving both anti-collision and authentication at the same time. The security of the proposed protocol is still based on the conjectured hardness of the LPN problem. Let the anti-collision commands piggybacking the authentication challenges can share the transmission resources by streamlining their overall operations. Compared to the traditional separate anti-collision and authentication schemes, this combined approach can complete most of the authentication procedure by the time anti-collision process is finished. It saves a lot of time and message overheads to authenticate the tags due to the parallel processing of the authentication and anti-collision protocols. Furthermore, CRPA doesn’t make use of any complicated mathematical operations (e.g. cryptographic primitives). All the required functions of CRPA are supported by the standard equipments of EPCglobal Class 1 Generation 2. The proposed CRPA protocol is especially applicable to multiple tags scenario that requires anti-collision and authentication. The proposed CRPA protocol will perform the best, if all the challenges sent out are within the timeslot allocations that are required to resolve the anti-collisions. For example, if the tag population on the scene is more than 100, then the proposed CRPA protocol will perform the best for the anti-collision protocol “Q-Algorithm” in EPCglobal Class 1 Generation 2. We will also verify the feasibility and practicability of the proposed CRPA protocol in this thesis, and ensure its security, privacy and un-traceability under passive attacks. In addition, we also propose an extended CRPA, called ECRPA. The ECRPA flips answers using a deterministic probability. The error rate of the answers which received by the reader is identical to the flipping probability. Therefore, the reader can authenticate the same number of tags by fewer answers. Although the reduced answers may lower the overall security, it is more applicable to the low cost RFID tags applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Hung-Lin, and 李泓霖. "Design and Hardware Implementation of Hybrid RFID and WSN Mutual Authentication System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/30489901199764949929.

Full text
Abstract:
碩士
義守大學
電子工程學系碩士班
98
In the past few years, radio frequency identification (RFID; Radio Frequency Identification) and wireless sensor networks Road (WSN; Wireless Sensor Network) has been parallel studied. RFID radio frequency identification system consists of tags and readers (antennas), and composed of middleware, while the wireless sensor network system consists of processing capability, memory, a radio frequency (RF) transceiver and a sensor unit. As the RFID technology mainly used in object tracking and data management. In contrast, WSN is much more mature in source information collection and data transmission routing. The integration of RFID and WSN technologies can achieve better applications. RFID can no longer be limited by its communication range. Through a better WSN communications network, it can improve the performance of RFID tracking ability. In addition, with the combination of smart tags and sensors, WSN can generate the ability to track and identify the object, rather than just monitoring the object. Therefore, it will be able to greatly enhance the performance of wireless sensor networks. Because the WSN itself transmit messages through the wireless communication media, the attacker can access to make anonymous connections or speculation sent the message is vulnerable to eavesdropping, interception and tampering. It is therefore very important to protect the confidentiality of information and privacy for WSN network. In this thesis, the lightweight mutual authentication protocol RFID tags and wireless sensor networks Dynamic User Authentication Scheme have been proposed. To enhance the security and privacy, a proposed mask function is used to establish mutual authentication protocol for WSN application. The simulation results of the proposed mutual authentication protocol are presented. The hardware verification of the proposed mask function is demonstrated on Altera DE2 demo board.
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Shin-Yu, and 陳欣郁. "A Study of Untraceability and Mutual Authentication in RFID Supply Chain System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34072384006151116592.

Full text
Abstract:
碩士
淡江大學
資訊管理學系碩士班
100
Radio Frequency Identity (RFID) has become more popular day after day in supply chain. However, because of its contact-less retrieval and substantial commercial interests in the supply chain, attackers would seek market intelligence or privacy over RFID. In order to protect commercial benefits, how to ensure the security of RFID system is extremely important. In this paper, based on Liu’s et al. and Yu-Hung Peng’s schemes, we propose a more secure RFID authentication scheme. Proposed scheme add into the reader-to-tag authentication, which eliminate the possibility of hostile reader attack. Furthermore, by equipping hash lock method with random number, our scheme also supports untraceability. Security analysis indicates that the proposed scheme has the highest security.
APA, Harvard, Vancouver, ISO, and other styles
49

Lo, Yuan Shiang, and 羅元翔. "Enhancing the Privacy of Low Cost RFID Tag with Mutual Authentication Mechanism." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/25797045643167634621.

Full text
Abstract:
碩士
長庚大學
資訊管理學研究所
97
The main function of RFID system is to provide automation identification of the product or people using radio wave. Many organizations plan RFID technology to enhance the performance of automated management, improve business process, and services. The industry wants to use RFID system that will bring more developments and applications, including supply chain management, warehouse management, retail stores, access control, healthcare, etc. With the advent of wireless communications environment, the exchange of information between the components should be effectively protected. This paper proposes a secure RFID system based on reduced costs and resource constraints, which consider the low-cost and privacy protection of tags using XOR operations. A mutual authentication is also implemented to apply the XOR operations, thus still achieving effective protection against a variety of attacks and threats through mutual authentication protocols. The RFID system can ensure that the information in the transmission or exchange is more secure, and to protect privacy and confidentiality. For future development, researchers continue to improve the performance of the RFID system components to enhance security and privacy protection mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
50

Luo, Rui-Kun, and 羅瑞昆. "The Study of Mutual Authentication and Multi-Contents Mechanism for RFID System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/54274614996624134490.

Full text
Abstract:
碩士
亞洲大學
資訊工程學系碩士班
97
After the world’s largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints. RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made orders, and decreasing excess inventory. The thesis is to explore the security issues of the RFID EPC Class 1 Generation 2. RFID transmits information wirelessly, and therefore information can be captured. In order to protect data privacy, many scholars have proposed their own ways to improve. This thesis has extended the scheme of Duc et al., and made a more efficient version. However, previously in radio frequency identification (RFID), a single RFID tag is only one purpose. Since previous scheme to achieve multi-contents needs one purpose stored one key in tag and in server, otherwise there will be security issues. In this thesis, we propose a multi-contents RFID tags scheme and it is can be dynamic join-and-leave. In our scheme, tag can choice adding different proposes in multiple applications. Moreover, just authorized tags can be accessed. Our scheme is capable of applying multi-contents tags, and we just need to store one key in tag. Our approach will not cause the large computations of the server.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography