英文摘要
|
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. However, because of the contact-less retrieval, the transmission of data in the air is very vulnerable to eavesdropping or appropriation. A primary security concern surrounding RFID technology is the illicit tracking of consumer location and analyzing of their shopping habits or behavior.
Recently, there are many solutions are proposed for RFID security, but most of the existing solutions assume the channel between RFID reader and the back-end database is secure, for it is structured in the wired environment of enterprise's interior. However, nowadays the wireless portable RFID readers are widely used to connect back-end databases. Therefore, this research will propose a lightweight secure protocol using randomized hash lock method without depending on the assumption mentioned above.
|
参考文献
|
-
EPCglobal
-
National Institute of Standards and Technology
-
GS1 Taiwan
-
Forrester Research
-
IDTechEx
-
Alfonsi, B. J.(2004).Privacy Debate Centers on Radio Frequency Identification.IEEE Security & Privacy,2(2),12.
-
Alippi, C.,Vanini, G.(2004).A Genetic-based Application Oriented Approach to Optimize RFID-like Passive Sensor Devices for Homeland Security.Computational Intelligence for Homeland Security and Personal Safety, 2004. CIHSPS 2004. Proceedings of the 2004 IEEE International Conference on
-
Auto-ID Center(2002).Technical Report MIT-AUTOID-TR-007Technical Report MIT-AUTOID-TR-007,未出版
-
Ayoade, John(2005).Security implications in RFID and authentication processing framework.Computers & Security,25(3),207-212.
-
Bansal R.(2004).Microwave Surfing.IEEE microwave magazine,9(2),28-30.
-
Bridgelall R.(2003).Enabling Mobile Commerce Through Pervasive Communications with Ubiquitous RF Tags.Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE,3,2041-2046.
-
Conti M.,Pietro R.D.,Mancini L.V.,Spognardi A(2007).RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on
-
IBM alphaWorks
-
Gao X.,Zhe X.,Wang H.,Shen J.,Huang J.,Song S.(2004).An Approach to Security and Privacy of RFID System for Supply Chain.E-Commerce Technology for Dynamic E-Business, 2004. IEEE International Conference on
-
Henrici D.,Muller P.(2004).Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers.Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on
-
Huang X.(2008).Quantifying Information Leakage in RFID Systems.Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
-
Inoue S.,Konomi S.,Yasuura H.(2002).Privacy in the Digitally Named World with RFID Tags.Workshop on Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing
-
Inoue S.,Yasuura H.(2003).RFID Privacy Using User-Controllable Uniqueness.RFID Privacy Workshop@MIT.
-
Juels A.,Rivest R.L.,Szydlo M.(2003).The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.8th ACM Conference on Computer and Communications Security
-
Karjoth G.,Moskowitz P.A(2005).Disabling RFID Tags with Visible Confirmation:Clipped Tags Are Silenced.Workshop On Privacy In The Electronic Society Proceedings of the 2005 ACM workshop on Privacy in the electronic society
-
Karthikeyan S.,Nesterenko M.(2005).RFID Security without Extensive Cryptography.Workshop on Security of ad hoc and Sensor Networks Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
-
Kinosita S.,Hoshino F.,Komuro T.,Fujimura A.,Ohkubo A.(2005).Non-identifiable Anonymous-ID Scheme for RFID Privacy Protection.Proc. Of CSS'03.
-
Knospe H.,Pohl H.(2004).RFID Security.Information Security Technical Report.
-
Lin H.C.,Leu H.(2005).Using AHP Approach to Establish a Decision Analysis Mechanism for Adopting RFID Systems.Communications of IICM (Institute of Information and Computing Machinery,8
-
Ni L. M.,Liu Y.,Lau Y. C.,Patil A. P.(2004).LANDMARC: Indoor Location Sensing Using Active RFID.Wireless Networks,10(6),701-710.
-
Ohkubo M.,Suzuki K.,Kinoshita S.(2005).RFID privacy issues and technical challenges.Communications of the ACM,48(9),66-71.
-
Ortiz S.(2006).How Secure Is RFID?.Computer,39(7),17-19.
-
Phillips T.,Karygiannis T.,Huhn R.(2005).Security Standards for the RFID Market.IEEE Security and Privacy,3(6),85-89.
-
Piramuthu S.(2007).Protocols for RFID tag/reader authentication.Decision Support Systems,43(3),897-914.
-
Simple Lightweight RFID Reader Protocol (slrrp)
-
Roy W.(2004).Enabling Ubiquitous Sensing with RFID.Computer,37(4),84-86.
-
Song B.,Mitchell C.J.(2008).RFID authentication protocol for low-cost tags.Conference On Wireless Network Security Proceedings of the first ACM conference on Wireless network security
-
Staake T.,Thiesse F.,Fleisch E.(2005).Extending the EPC Network-The Potential of RFID in Anti-counterfeiting.Symposium on Applied Computing Proceedings of the 2005 ACM symposium on Applied computing
-
Thornton F.,Haines B.,Das A. M.(2006).RFID Security-Chapter 3 Threat and Target Identification.Syngress
-
RFID Journal
-
Weis S.A.,Sarma S.E.,Rivest R.,Engels D.W..Proceedings of the 1st Security in Pervasive Computing.LNCS.
-
William K.(2006).RFID-another technology, another security mess?.Infosecurity Today,3(3),35-37.
-
Zhai J.,Park C.M.,Wang G. N.(2006).Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.Computational Science and Its Applications-ICCSA 2006.
-
日經BP RFID編輯部著(2004)。RFID技術與應用。台北市:旗標。
-
王明德(2005)。RFID全面參與企業生產流程。DigiTimes。
-
王玫文(2004)。國際標準底定RFID市場起飛。iThome電腦報。
-
何玉美(2004)。RFID帶給半導體業者無限商機。iThome電腦報。
-
奚正德、張克章(2006)。RFID相關應用與安全機制簡介。長庚大學。
-
莊裕澤、王蒼仁、簡雄飛(2005)。RFID簡介。台灣大學。
-
經濟日報(2004/11/09)
-
鄭吉宏(2004)。RFID為全球163.8億個貨品換發身分證。iThome電腦報。
-
鄭吉宏(2004)。何謂RFID。iThome電腦報。
-
鄭吉宏(2004)。昇陽積極布署臺灣RFID商機。iThome電腦報。
-
鄭吉宏(2004)。臺灣RFID的機會不只在晶片。iThome電腦報。
-
鄭同伯(2004)。RFID EPC無線射頻辨識完全剖析。台北縣:博碩文化。
-
CNET Taiwan
|