题名

物聯網安全的現況與挑戰

作者

莊祐軒;羅乃維

关键词

Internet of Things ; RFID ; Wireless Sensor Network ; Security

期刊名称

資訊安全通訊

卷期/出版年月

19卷4期(2013 / 10 / 01)

页次

16 - 29

内容语文

繁體中文

中文摘要

物聯網(Internet of Things,IoT)並非單一網路的延伸,而是與網際網路、行動通訊等網路並存的體系。物聯網藉由RFID讓物體負載資訊,或以無線感測技術讓物體得以感測取得環境狀態參數,並傳輸資訊至網路連結的系統平台,讓物體本身因為附加資訊而增加價值,甚至透過物體所匯集的資訊,做出更高價值的應用。但也因為如此,所有物體任何時間點的行為資訊都會被某些裝置記錄並保存下來,若有心人士想藉此造成其他人事物安全上的威脅,所帶來的嚴重後果將會無法想像且可能難以復原。所以物聯網不僅帶來了智慧生活,也帶來了更多的威脅,要如何建構出一個安全又便利的物聯網環境將是刻不容緩的議題。本篇論文就學者們對於物聯網安全的現況與未來安全上的挑戰做一個彙整。

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2009:0278:FIN:EN:PDF (2013/9).
  2. http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_V1-1.pdf (2013/9).
  3. http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf (2013/9).
  4. Atzori, L.,Iera, A.,Nirabuti, G.(2010).The Internet of Things: A Survey.Computer Network,54,2787-2805.
  5. Birari, S.M.,Iyer, S.(2005).PULSE: A MAC Protocol for RFID Networks.Lecture Notes Computer Science,3823,1036-1046.
  6. de Leusse, P.,Periorellis, P.,Dimitrakos, T.,Nair, S.K.(2009).Self Managed Security Cell - a Security Model for the Internet of Things and Services.First International Conference on Advances in Future Internet
  7. Fung, B.,Al-hussaeni, K.,Cao, M.(2009).Preserving RFID Data Privacy.IEEE International Conference on RFID
  8. Gu, Y.,Wu, W.(2009).Mutual Authentication Protocol based on Tag ID Number Updating for Low-cost RFID.IEEE International Conference on Network Infrastructure and Digital Content (ICNIDC 09)
  9. Hwang, K.,Kim, K.,Eom, D.(2006).DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.Lecture Notes Computer Science,4097,413-422.
  10. Juels, A.,Rivest, R.L.,Szydlo, M.(2003).The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.Proceedings of the 10th ACM Conference on Computer and Communications Security
  11. Julius, Ho,Engels, D.W.,Sarma, S.E.(2006).HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem.Proceedings of the International Symposium on Applications and the Internet Workshops
  12. Karabat, C.(2009).A Novel Secure RFID System to Ensure Privacy.Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 09)
  13. Kim, E.,Kwon, T.,Yi, J.H.(2010).A Study of Mobile Proxy for Privacy Enhancement.Digest of Technical Papers International Conference on Consumer Electronics
  14. Kim, J.,Lee, W.,Jung, J.,Choi, J.,Kim, E.,Kim, J.(2005).Weighted Localized Clustering: A Coverage-Aware Reader Collision Arbitration Protocol in RFID Networks.Embedded Software and Systems, Proceedings
  15. Kim, J.,Lee, W.,Yu, J.,Myung, J.,Kim, E.,Lee, C.(2005).Effect of Localized Optimal Clustering for Reader Anti-collision in RFID Networks: Fairness Aspects to the Readers.IEEE International Conference on Computer Communications and Networks
  16. Lai, Y.C.,Hsiao, L.Y.(2010).General Binary Tree Protocol for Coping with the Capture Effect in RFID Tag Identification.Communication Letters, IEEE,14,208-210.
  17. Lee, Y.C.,Hsieh, Y.C.,You, P.S.,Chen, T.C.(2009).A New Ultralightweight RFID Protocol with Mutual Authentication.International Conference on Information Engineering (ICIE 09)
  18. Lin, C.F.,Lin, Y.S.(2007).A Simulated Annealing Algorithm for RFID Reader Networks.IEEE Wireless Communications and Networking Conference (WCNC 07)
  19. Miorandi, D.,Sicari, S.,De Pellegrini, F.,Chlamtac, I.(2012).Internet of Things: Vision, Applications and Research Challenges.Ad Hoc Networks,10,1497-1516.
  20. Mohammed, U.S.,Salah, M.(2009).Parallel Binary Tree Splitting Protocol for Tag Anti-collision in RFID Systems.4th International Design and Test Workshop (IDT)
  21. O'Neill, M.,Robshaw, M.J.B.(2010).Low-cost Digital Signature Architecture Suitable for Radio Frequency Identification Tags.Computers & Digital Techniques, IET,4,14-26.
  22. Roman, R.,Najera, P.,Kioez, J.(2011).Securing the Internet of Things.IEEE Computer,44,51-58.
  23. Sadighian, A.,Jalili, R.(2009).AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems.Third International Conference on Emerging Security Information, Systems and Technologies
  24. Sarma, S. E.,Weis, S. A.,Engels, D. W.(2003).Radio-frequency Identification: Secure Risks and Challenges.RSA Laboratories Cryptobytes,6,2-9.
  25. Song, I.C.,Hong, S.H.,Chang, K.H.(2009).An Improved Reader Anti-collision Algorithm based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode.IEEE 69th Vehicular Technology Conference
  26. Tong, Q.,Zou, X.,Tong, H.(2009).Dynamic Framed Slotted ALOHA Algorithm Based on Bayesian Estimation in RFID System.2009 WRI World Congress on Computer Science and Information Engineering(CSIE)
  27. Urien, P.,Chabanne, H.,Bouet, M.,de Cunha, D.O.,Guyot, V.,Pujolle, G.,Paradinas, P.,Gressier, E.,Susini, J.F.(2007).HIP-based RFID Networking Architecture.IFIP International Conference on Wireless and Optical Communications Networks
  28. Urien, P.,Elrharbi, S.,Nyamy, D.,Chabanne, H.,Icart, T.,Pepin, C.,Bouet, M.,Cunha, D.,Guyot, V.,Krznik, P.,Susini, J.F.(2008).HIP-Tags: a New Paradigm for the Internet of Things.WirelessDays, 1st IFIP
  29. Urien, P.,Elrharbi, S.,Nyamy, D.,Chabanne, H.,Icart, T.,Pepin, C.,Bouet, M.,Cunha, D.,Guyot, V.,Krznik, P.,Susini, J.F.(2009).HIP-Tags Architecture Implementation for the Internet of Things.First Asian Himaalayas International Conference on Internet
  30. Waldrop, J.,Engels, D.W.,Sanna, S.E.(2003).Colorwave: An Anti-collision Algorithm for the Reader Collision Problem.IEEE International Conference on Communications(ICC 03)
  31. Wang, D.,Wang, J.W.,Zhao, Y.P.(2006).A Novel Solution to the Reader Collision Problem in RFID System.Proc. IEEE Wireless Communications, Networking and Mobile Computing(WiCOM 06)
  32. Weber, R. H.(2010).Internet of Things - New Security and Privacy Challenges.Ad Hoc Networks,26,23-30.
  33. Weis, S.A.,Sarma, S.E.,Rivest, R.L.,Engels, D.W.(2004).Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems.Security in Pervasive Computing,2802,201-212.
  34. WU, K.,Liu, Y.(2010).A New Energy-Aware Scheme for RFID System Based on ALOHA.The second International Conference on Future Networks(ICFN 10)
  35. Yang, M.H.,Luo, J.N.(2009).Authentication Protocol in Mobile RFID Network.Fourth International Conference on Systems
  36. Yao, Q.,Qi, Y.,Han, J.,Zhao, J.,Li, X.,Liu, Y.(2009).Randomizing RFID Private Authentication.IEEE International Conference on Pervasive Computing and Communications
  37. 周洪波、李吉生、趙曉波(2010)。輕鬆讀懂物聯網─技術、應用、標準和商業模式。臺北:博碩文化股份有限公司。
被引用次数
  1. 張啓傳(2016)。台灣自動化設備產業推動智慧工廠專案成功之關鍵因素之探討—FAHP應用之研究。中原大學會計學系學位論文。2016。1-86。