簡易檢索 / 詳目顯示

研究生: 林彥谷
Yan-Gu Lin
論文名稱: NFC行動裝置授權遠端資源安全存取控制之機制
An approach for near field communication devices to access remote resources
指導教授: 查士朝
Shi-Cho Cha
口試委員: 羅乃維
Nai-Wei Lo
楊立偉
Li-Wei Yang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 44
中文關鍵詞: 近場通訊安全通道存取控制
外文關鍵詞: Near Field Communication, Secure Tunnel, Security Access Control
相關次數: 點閱:217下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著智慧型手機普及率的提升,越來越多的智慧型手機應用產生,而NFC技術的出現,更促成了使用者手持智慧型裝置,透過NFC存取周邊商家所提供的像是自動櫃員機等資訊服務。然而,NFC行動裝置在使用商家提供的資訊服務時,有時會需要存取遠端資源。在使用者的 NFC 裝置是透過商家的資訊設備去連接到遠端伺服器而去取得遠端資源時,因為遠端伺服器會需要取得使用者的帳號密碼等認證資訊去認證使用者,此時商家的資訊設備就有可能擷取到這些認證資訊,而使得使用者認證資訊遭遇到資料機密性與完整性受到侵害的威脅。雖然現行已經有技術在探討安全地分享遠端資源的議題,例如OAuth,但OAuth技術假設參與者可以直接對於資源提供者進行連線,OAuth協定是針對使用者的裝置直接取得遠端資源的情境,並未考慮到可能是經過不可信賴的第三方存取資源的情況。因此,本研究提出NFC行動裝置授權遠端資源安全存取控制機制,透過NFC行動裝置與遠端資源中心建立安全通道,資料交換皆透過安全通道作傳輸。透過本研究機制,NFC行動裝置可以授權資源中心將使用者同意給予的資源提供給服務提供者,以便使用者在不洩漏機密資訊的情況下,使用服務提供者的服務。換句話說,在商家的資訊服務可能需要遠端資源的情況下,可以在不知道使用者與遠端資源提供者溝通內容的情況下,取得使用者的遠端資源而提供服務。
    關鍵字:近場通訊、近場通訊安全通道、安全存取控制


    As the development of NFC technologies, several NFC applications emerge recently. NFC technologies enable mobile devices to use NFC services quickly and user-friendly. NFC services may need user resources stored in remote servers. In this case, remote servers may need user credential information to authenticate the user. Although user credential information may be transmitted between NFC-enabled devices and remote servers through NFC service providers, service providers should not obtain the credential data.
    To address this issue, our approach establishes a secure tunnel between users’ NFC-enabled devices and remote servers. With our approach, sensitive information, such as personal identification information, is encrypted and transferred to remote servers through the secure tunnel. Therefore, NFC-enabled devices can exchange sensitive data with remote servers securely while using NFC services.
    Keywords:Near Field Communication, Secure Tunnel, Security Access Control

    第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的與貢獻 4 1.3 章節介紹 5 第二章 背景知識與文獻探討 6 2.1 近場通訊(NFC)概念與傳輸方式介紹 6 2.2 NFC資料封包格式 7 2.3 NFC智慧型手機與應用 8 2.4 常見的NFC威脅與解決方法 12 2.5 安全通道 14 2.6 秘密金鑰密碼系統與公開金鑰密碼系統 16 2.7 OAuth 21 第三章 問題定義 25 第四章 NFC裝置與遠端資源伺服器安全連線機制 27 4.1 NFC裝置與遠端資源伺服器安全連線機制 27 4.2 安全性說明 32 第五章 系統實作 33 5.1 系統建置環境 33 5.2 系統使用情境 34 5.3 實驗結果 37 第六章 結論與未來方向 42 參考文獻 43

    [1] C. Albanesius, "Apple Awarded iWallet Patent", 2012.
    [2] C. Mulliner. "Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones", In Proceedings of the 1st International Workshop on Sensor Security at ARES, Fukuoka, Japan, 2009.
    [3] E. Haselsteiner and K. Breitfuß, "Security in Near Field Communication(NFC)", in workshop on RFID Security, 2006.
    [4] Forum.Nokia, "Introduction to NFC", 2011.
    [5] F. Resatsch, S. Karpischek, S. Hamacher, U. Sandner, "Mobile sales assistant: NFC for retailers", MobileHCI 2007, Singapore, September 2007.
    [6] Google Wallet, http://www.google.com/wallet/.
    [7] G. Van Damme, K. Wouters, H. Karahan, B. Preneel, "Offline NFC Payments with Electronic Vouchers. In", Proceedings of the 1st ACM Workshop on Net-working, Systems, and Applications for Mobile Handhelds (MobiHeld 2009), 6 pages, ACM, New York (2009).
    [8] ISO/IEC 18092, "Information Technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1)", 2004.
    [9] J. Sidén, V. Skerved, J. Gao, S. Forsström, H. Nilsson, T. Kanter, M. Gulliksson, "Home Care with NFC Sensors and a Smart Phone", Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ACM New York, NY, USA(2011), ISBN: 978-1-4503-0913-4.
    [10] K. S. Kadambi, J. Li, A. H. Karp, "Near-Field Communication-Based Secure Mobile Payment Service", Proceedings of the 11th International Conference on Ecommerce, ISBN: 978-1-60558-586-4, 12-15 August 2009, Taipei, Taiwan,142-151.
    [11] K. Seewoonauth, E. Rukzio, R. Hardy, and P. Holleis, "Two NFC interaction techniques for quickly exchanging pictures between a mobile phone and a computer", in Proceedings of the 11th International Conference on Human Computer Interaction with Mobile Devices and Services, ser.MobileHCI’09. New York, NY, USA: ACM, 2009, pp. 39:1–39:4.
    [12] M. Sallinen , E. Strömmer , A. Ylisaukkooja, "Application Scenario for NFC: Mobile Tool for Industrial Worker", Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications, p.586-591, August 25-31, 2008.
    [13] NFC Forum, http://www.nfc-forum.org/home.
    [14] NFC Forum, "NFC Data Exchange Format (NDEF) Technical Specification", 2006.
    [15] NFC World, http://www.nfcworld.com.
    [16] nfctools, https://www.github.com/grundid/nfctools.
    [17] OAuth, http://oauth.net/.
    [18] RFC2401, "Security Architecture for the Internet Protocol", 1998.
    [19] RFC2637, "Point-to-Point Tunneling Protocol (PPTP)", 1999.
    [20] RFC3193, "Layer Two Tunneling Protocol (L2TP)", 1999.
    [21] R. L. Rivest , A. Shamir , L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, v.26 n.1, p.96-99, Jan. 1983.
    [22] S. Tamrakar, Jan-Erik Ekberg and N. Asokan, "Identity Verification Schemes for Public Transport Ticketing with NFC Phones", in proceedings of the sixth ACM workshop on Scalable trusted computing(STC'11), 2011, pp. 37-48.
    [23] W. Diffie, M. Hellman, "New directions in cryptography". IEEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.

    無法下載圖示 全文公開日期 2017/07/20 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE