簡易檢索 / 詳目顯示

研究生: 陳筱玫
Siao-Mei Chen
論文名稱: 基於低成本RFID標籤之群組證明協定
Grouping Proof Protocols based on Low-cost RFID Tags
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 吳宗成
Tzong-Chen Wu
葉國暉
Kuo-Hui Yen
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 37
中文關鍵詞: 無線射頻標籤群組證明EPC C1G2標籤HF 標籤
外文關鍵詞: RFID, Grouping Proof, EPC C1G2 Tag, HF Tag
相關次數: 點閱:312下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線射頻辨識 (Radio Frequency Identification, RFID) 是採用非接觸式的方式對無線射頻標籤達成自動化識別的技術,此技術已運用在不同領域上如物流供應鏈、門禁管制及醫療照護等。伴隨著RFID無線射頻標籤成本下降之趨勢,RFID標籤將會逐漸普及於日常生活中,並成為企業相繼引進的技術。
    近年來無線射頻辨識技術已經使用於醫療中心,利用RFID系統並將無線射頻標籤附著於藥罐或醫療設備上,在病人領藥或醫生行手術時,採用群證明的機制進行掃描並記錄當下附著無線射頻標籤的藥罐/醫療設備,並驗證這些藥罐/醫療設備出現的位置是否屬於合法的範圍。在本篇論文中,我們提出一新的基於低成本無線射頻辨識標籤之無線射頻辨識群組證明協定,且對於已知的無線射頻辨識群組證明的攻擊,已經加以防範以示協定之安全。由於我們的協定採用EPC Class-1Generation-2和 Class-1 HF標準的低成本無線射頻辨識標籤,可以有效率的使用於醫療中心外,也在低成本下促進增強病人的安全與減少醫療操作上的錯誤。


    Radio Frequency Identification (RFID) is a contactless automatic identification technology. With the low cost and advancement of technology, RFID has been applied in various fields, including supply chain management, access control scheme, and medical care system. RFID technology has been considered as the next generation of technology for hospital environment to provide more convenience and comfort for patients, and reduce medication and treatment errors in recent years. One of possible RFID applications for hospitals is to attach RFID tags to medicine bags or treatment tools, and adopt a well-designed grouping proof protocol to record and verify the cor-responding medicine bags or treatment tools are in position. This study proposes new RFID grouping proof protocols for low-cost RFID tags. Our security analysis has in-dicated that the proposed schemes are secure. Since the proposed protocols are com-patible to EPC Class-1 Generation-2 UHF and Class-1 HF standards which are the most relevant standards for low-cost RFID tags, we believe that the proposed proto-cols are well-suitable for hospital environment to improve patient safety and hospital administration.

    中文摘要 I Abstract II 誌謝 III CONTENTS IV List of Figures VI List of Tables VII Chapter 1 Introduction 1 Chapter 2 Related work 5 Chapter 3 The proposed protocols 10 3.1 Description and Assumption 10 3.2 Notations 12 3.3 Mutual authentication between Verifier/Timestamp Generator and Reader 14 3.4 The proposed grouping proof protocols 16 3.4.1 Online Tag-verification-oriented Protocol (Online TVOP) 16 3.4.2 Online First-tag-authenticated Protocol (Online FTAP) 19 3.4.3 Offline Tag-verification-oriented Protocol (Offline TVOP) 22 Chapter 4 Security Analysis and Performance Evaluation 25 4.1 Security Analysis 25 4.2 Performance Analysis 29 Chapter 5 Conclusions 33 References 34

    [1] S. Piramuthu, “On Existence Proofs for Multiple RFID Tags,” In Proceedings of the 2006 IEEE International Conference on Pervasive Services, pp.26-29, June 2006.
    [2] C.-C. Lin, Y.-C. Lai, J.-D. Tygar, C.-K. Yang, C.-L. Chiang, “Coexistence proof using chain of timestamps for multiple RFID tags,” In Proceedings of the 2007 International workshop on database management and application over networks, pp. 634–643, June 2007.
    [3] H.-Y. Chien, C.-C. Yang, T.-C. Wu, and C.-F. Lee, “Two RFID-based solutions to enhance inpatient medication safety,“ Journal of Medical Systems, vol.35, pp. 369-375, June 2011.
    [4] H.-Y. Chien and S.-B. Liu, “Tree-based RFID yoking proof,” In Proceedings of the 2009 International Conference on Networks Security, Wireless Communica-tions and Trusted Computing, vol.1, pp.550–553, April 2009.
    [5] N.-W. Lo and K.-H. Yeh, ”Anonymous Coexistence Proofs for RFID Tags,” Journal of Information Science and Engineering, vol. 26, no. 4, pp. 1213-1230, July 2010.
    [6] EPCglobal Inc, Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz (version 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
    [7] P. Peris-Lopez, A. Orfila, et al., “Flaws on RFID grouping-proofs. Guidelines for future sound protocols,” Journal of Network and Computer Applications, vol. 34, no. 3, pp. 833–845, May 2011.
    [8] H.-H. Huang, and C.-Y. Ku, ”A RFID grouping proof protocol for medication safety of inpatient,” Journal of Medical Systems, vol. 33, pp. 467–474, December 2009.
    [9] A.-K. Wickboldt, and S. Piramuthu, ” Patient safety through RFID: Vulnerabili-ties in recently proposed grouping protocols,” Journal of Medical Systems, vol. 36, pp. 431-435, April 2010.
    [10] Y.-C. Yu, T.-W. Hou, and T.-C. Chiang, “Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety,“ Journal of Medical Systems, vol. 36, pp. 823-828, April 2012.
    [11] S. Wu, K. Chen, and Y. Zhu, “A Secure Lightweight RFID Binding Proof Proto-col for Medication Errors and Patient Safety,” Journal of Medical Systems, vol. 36, pp. 2743–2749, October. 2012.
    [12] C. Ma, J. Lin, Y. Wang, and M. Shang, “Offline RFID Grouping Proofs with Trusted Timestamps,” In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674-681, June 2012
    [13] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,” In Proceeding of Workshop on RFID Security – RFIDSec 06, July 2006.
    [14] M. Barasz, B. Boros, P. Ligeti, K. Loja, and D. Nagy, “Breaking LMAP,” In Proceeding of Workshop on RFID Security – RFIDSec 07, July 2007.
    [15] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification,” Journal of Computer Standards and Interfaces, vol. 31, pp. 88–97, Jan. 2009.
    [16] P. Peris-Lopez, A. Orfila, A. Mitrokotsa, and J. C.A. van der Lubbe, “A compre-hensive RFID solution to enhance inpatient medication safety,” International Journal of Medical Informatics, vol. 80, issue 1, pp. 13–24, Jan. 2011.
    [17] A. Juels, “Yoking-proofs for RFID tags,” In Proceeding of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138–143, 2004.
    [18] J. Saito and K. Sakurai, “Grouping proof for RFID tags,” In Proceeding of the 19th International Conference on Advanced Information Networking and Appli-cations, vol. 2, pp. 621–624, 2005.
    [19] L. Bolotnyy and G. Robins, “Generalized yoking-proofs for a group of RFID tags” In Proceeding of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–4, 2006.
    [20] L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” In Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 40–48, June 2009.
    [21] Institute of Medicine of the National Academies, http://www.iom.edu/Reports.aspx.
    [22] S. Y. Crawford, M. R. Cohen, and E. Tafesse, “Systems factors in the reporting of serious medication errors in hospitals,” Journal of Medical Systems, vol. 27, Issue 6, pp.543–551, Dec . 2003.
    [23] S. M. Walton, “The pharmacist shortage and medication errors: Issues and evi-dence,” Journal of Medical Systems, vol.28, pp. 63–59, 2004.
    [24] M. Burmester, B. de Medeiros, R. Motta, “Provably secure grouping-proofs for RFID Tags,” In Proceedings of the 2008 8th smart card research and advanced applications, pp. 176-190, September2008.
    [25] X. Leng, Y. Lien, K. Mayes, K. Markantonakis, J.-H. Chiu, “Select-response grouping proof for RFID tags,” In Proceedings of the 2009 First Asian Confer-ence on Intelligent Information and Database Systems, pp.73–77, April 2009.
    [26] EPCglobal Inc, EPC Class-1 HF RFID Air Interface Protocol for Communica-tions at 13.56 MHz (version2.0.3). Retrieved from EPCglobal Inc, Class-1 Gen-eration-2 UHF RFID protocol for communications at 860 MHz - 960 MHz (ver-sion 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
    [27] S.-H. Ching, and A. Tai, “HF RFID versus UHF RFID — Technology for Library Service Transformation at City University of Hong Kong,” The Journal of Academic Librarianship, vol. 35, pp. 347–359, July 2009.
    [28] EPCglobal Inc, GS1 EPC Tag Data Standard (version 1.6). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_6-RatifiedStd-20110922.pdf

    QR CODE