帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):鄭偉祥
作者姓名(英文):Vincentius - Randy Christianto
論文名稱(中文):Secure BLE-based Authentication for Micropayment using Wearable Device
論文名稱(外文):Secure BLE-based Authentication for Micropayment using Wearable Device
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-Wei Lo
口試委員姓名(中文):楊傳凱
賴源正
口試委員姓名(英文):Chuan-Kai Yang
Yuan-Cheng Lai
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:M10209807
出版年(民國):105
畢業學年度:104
學期:1
語文別:英文
論文頁數:46
外文關鍵詞:Internet of ThingsWearable DeviceBLE
相關次數:
  • 推薦推薦:0
  • 點閱點閱:106
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:3
  • 收藏收藏:0
In this era, people use various technologies as their main tools to perform work and support their daily needs and life activities. A lot of new technologies have been developed and shown to the world. The Internet of Things (IoT) is an innovative technological phenomenon that involves physical objects or "things" such as smart watches, smart bands, smart glasses, being embedded with electronic sensors and connected to the Internet, thereby achieving greater value and providing better service. Bluetooth Low Energy (BLE) is a wireless personal area network technology that provides new design, increased capability, lower power consumption, and lower cost compared to previous Bluetooth technology. BLE gives developers the ability to incorporate new functionalities into IoT devices. For example, sensors in a smart watch can monitor a wearer's heart rate.
In this thesis, we propose a newly designed small payment system using BLE-based technology embedded in wearable devices. We also develop a convenient scenario for people to perform a small payment process using BLE-based wearable devices. The proposed processing system is shown to be both effective and secure.
Abstract I
Acknowledgement II
Contents III
List of Figures V
List of Tables VI
Chapter 1 Introduction 1
Chapter 2 Related Work 5
2.1 Bluetoooth Low Energy (BLE) 5
2.2 Micropayment Mechanism 6
2.3 Authentication Scheme using Bluetooth Low Energy (BLE) 8
Chapter 3 System Environment and Design 11
3.1 Assumptions11
3.2 Applicable Scenario12
3.3 System Architecture14
Chapter 4 BLE-based Authentication Protocol 18
4.1 The Proposed Protocol 18
4.2 Prototype Design 24
4.3 Implementation and Experiments 29
Chapter 5 Security Analysis 33
5.1 Security against attacks before BLE connection 33
5.2 Security against attacks within an authentication session 34
Chapter 6 Conclusion 36
References 38
Appendix A Prototype Pseudocodes 43
A.1 Initialization of Wearable Device to establish a connection43
A.2 Initialization of Wearable Payment Counter for waiting for connection to a Wearable Device 44
A.3 The function to process the Hash Function with Session Key 46
[1]Atzori, L. et al. 2010. The Internet of Things: A survey. Computer Networks. 54, (2010), 2787–2805. DOI= http://linkinghub.elsevier.com/retrieve/pii/S1389128610001568
[2]Miorandi, D. et al. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks. 10, 7 (Sep. 2012), 1497–1516. DOI= http://linkinghub.elsevier.com/retrieve/pii/S1570870512000674
[3]Freescale Overcoming the Size and Power Trade off in Wearable Designs.
[4]Processor IP Enabling the Wearable Trend: 2014. http://semiengineering.com/processor-ip-enabling-the-wearable-trend/. Accessed: 2015-05-21.
[5]Mi Band - Mi Singapore: http://www.mi.com/sg/miband/ - 05. Accessed: 2015-08-26.
[6]Wearable Payments: Failure in 2011, Success in 2015? http://vision.visaeurope.com/wearable-payments-failure-in-2011-success-in-2015/. Accessed: 2015-07-13.
[7]Bluetooth SIG 2014. Bluetooth Core Specification Version 4.2.
[8]Bluetooth Smart: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx. Accessed: 2015-07-12.
[9]Dementyev, A. et al. 2013. Power consumption analysis of Bluetooth Low Energy, ZigBee and ANT sensor nodes in a cyclic sleep scenario. 2013 IEEE International Wireless Symposium (IWS) (Apr. 2013), 1–4. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6616827
[10]100 Swedish Eurocard Customers Test Mobile Payment With Mobile Telephones Equipped With Bluetooth: 2001. http://www.wirelessdevnet.com/news/2001/136/news8.html. Accessed: 2015-08-05.
[11]Eurocard to test wireless payment in Swedish stores: 2001. http://www.mycustomer.com/topic/technology/eurocard-test-wireless-payment-swedish-stores. Accessed: 2015-08-05.
[12]Finextra news: Ericsson and Eurocard to test Bluetooth payments: 2001. http://www.finextra.com/news/fullstory.aspx?newsitemid=1771. Accessed: 2015-08-05.
[13]Hedman, J. and Henningsson, S. 2012. Competition and collaboration shaping the digital payment infrastructure. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 178–185. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346571
[14]Zolfaghar, K. and Mohammadi, S. 2009. Securing Bluetooth-based payment system using honeypot. 2009 International Conference on Innovations in Information Technology (IIT) (Dec. 2009), 21–25. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5413764
[15]Nan, J. et al. 2009. A mobile Micropayment Protocol Based on Chaos. 2009 Eighth International Conference on Mobile Business. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5169273
[16]Xu, J. et al. 2013. Pairing and Authentication Security Technologies in Low-Power Bluetooth. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (Aug. 2013), 1081–1085. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6682199
[17]Saravanan, K. and Yuvaraj, D. 2010. An new secure mechanism for bluetooth network. 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE) (Feb. 2010), 202–205. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5451967
[18]Xin, Y. and Ting, Y. A Security Architecture Based on User Authentication of Bluetooth. 2009 International Forum on Information Technology and Applications. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5232204
[19]Xu, G. L. and Yu, B. Security Enhanced Design of the Bluetooth Simple Pairing Protocol. 2011 International Conference on Computer Science and Network Technology. DOI= http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6181960
[20]Diallo, A.S. et al. 2014. A Secure Authentication Scheme for Bluetooth Connection. 2014 International Conference on Computer and Communication Engineering (Sep. 2014), 60–63. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7031600
[21]Bluetooth 4.0: Low Energy: 2010. http://chapters.comsoc.org/vancouver/BTLER3.pdf. Accessed: 2015-06-16.
[22]WiFi Jammer - Bluetooth Jammer - WiFi Blocker Wholesales: http://www.jammerfromchina.com/categories/WiFi%7B47%7DBluetooth_Jammers/. Accessed: 2015-08-21.
[23]WiFi Jammers, Bluetooth blockers, 2.4 GHz 5 GHz signal jamming devices: http://www.jammer-store.com/wifi-bluetooth-jammers-blockers.html. Accessed: 2015-08-21.
[24]WiFi Signal Jammer - Bluetooth Signal Jammer - WiFi Signal Blocker Wholesales: http://www.jammerinthebox.com/categories/WiFi_%26_Bluetooth_Signal_Jammer/. Accessed: 2015-08-21.
[25]Yu, B. and Li, H. 2008. Research and Design of One Key Agreement Scheme in Bluetooth. 2008 International Conference on Computer Science and Software Engineering (2008), 665–668. DOI= http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4722430
[26]Blass, E.-O. et al. 2009. PSP. Proceedings of the 8th ACM workshop on Privacy in the electronic society - WPES ’09 (New York, New York, USA, Nov. 2009), 51. DOI= http://dl.acm.org/citation.cfm?id=1655188.1655196
[27]Gaur, A. and Ondrus, J. 2012. The role of banks in the mobile payment ecosystem. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 171–177. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346570
[28]Hedman, J. and Henningsson, S. 2012. Competition and collaboration shaping the digital payment infrastructure. Proceedings of the 14th Annual International Conference on Electronic Commerce - ICEC ’12 (New York, New York, USA, Aug. 2012), 178–185. DOI= http://dl.acm.org/citation.cfm?id=2346536.2346571
[29]Lehdonvirta, V. et al. 2009. UbiPay. Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility ’09 (New York, New York, USA, Sep. 2009), 1–7. DOI= http://dl.acm.org/citation.cfm?id=1710035.1710036
[30]Oracle Java Platform (JDK), Java SE Library. http://www.oracle.com/technetwork/java/javase/downloads/index.html/
Accessed: 2015-12-15.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *