Basic Search / Detailed Display

Author: 陳筱玫
Siao-Mei Chen
Thesis Title: 基於低成本RFID標籤之群組證明協定
Grouping Proof Protocols based on Low-cost RFID Tags
Advisor: 羅乃維
Nai-Wei Lo
Committee: 吳宗成
Tzong-Chen Wu
葉國暉
Kuo-Hui Yen
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2013
Graduation Academic Year: 101
Language: 英文
Pages: 37
Reference times: Clicks: 442Downloads: 5
Share:
School Collection Retrieve National Library Collection Retrieve Error Report

  • 中文摘要 I Abstract II 誌謝 III CONTENTS IV List of Figures VI List of Tables VII Chapter 1 Introduction 1 Chapter 2 Related work 5 Chapter 3 The proposed protocols 10 3.1 Description and Assumption 10 3.2 Notations 12 3.3 Mutual authentication between Verifier/Timestamp Generator and Reader 14 3.4 The proposed grouping proof protocols 16 3.4.1 Online Tag-verification-oriented Protocol (Online TVOP) 16 3.4.2 Online First-tag-authenticated Protocol (Online FTAP) 19 3.4.3 Offline Tag-verification-oriented Protocol (Offline TVOP) 22 Chapter 4 Security Analysis and Performance Evaluation 25 4.1 Security Analysis 25 4.2 Performance Analysis 29 Chapter 5 Conclusions 33 References 34

    [1] S. Piramuthu, “On Existence Proofs for Multiple RFID Tags,” In Proceedings of the 2006 IEEE International Conference on Pervasive Services, pp.26-29, June 2006.
    [2] C.-C. Lin, Y.-C. Lai, J.-D. Tygar, C.-K. Yang, C.-L. Chiang, “Coexistence proof using chain of timestamps for multiple RFID tags,” In Proceedings of the 2007 International workshop on database management and application over networks, pp. 634–643, June 2007.
    [3] H.-Y. Chien, C.-C. Yang, T.-C. Wu, and C.-F. Lee, “Two RFID-based solutions to enhance inpatient medication safety,“ Journal of Medical Systems, vol.35, pp. 369-375, June 2011.
    [4] H.-Y. Chien and S.-B. Liu, “Tree-based RFID yoking proof,” In Proceedings of the 2009 International Conference on Networks Security, Wireless Communica-tions and Trusted Computing, vol.1, pp.550–553, April 2009.
    [5] N.-W. Lo and K.-H. Yeh, ”Anonymous Coexistence Proofs for RFID Tags,” Journal of Information Science and Engineering, vol. 26, no. 4, pp. 1213-1230, July 2010.
    [6] EPCglobal Inc, Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz (version 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
    [7] P. Peris-Lopez, A. Orfila, et al., “Flaws on RFID grouping-proofs. Guidelines for future sound protocols,” Journal of Network and Computer Applications, vol. 34, no. 3, pp. 833–845, May 2011.
    [8] H.-H. Huang, and C.-Y. Ku, ”A RFID grouping proof protocol for medication safety of inpatient,” Journal of Medical Systems, vol. 33, pp. 467–474, December 2009.
    [9] A.-K. Wickboldt, and S. Piramuthu, ” Patient safety through RFID: Vulnerabili-ties in recently proposed grouping protocols,” Journal of Medical Systems, vol. 36, pp. 431-435, April 2010.
    [10] Y.-C. Yu, T.-W. Hou, and T.-C. Chiang, “Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety,“ Journal of Medical Systems, vol. 36, pp. 823-828, April 2012.
    [11] S. Wu, K. Chen, and Y. Zhu, “A Secure Lightweight RFID Binding Proof Proto-col for Medication Errors and Patient Safety,” Journal of Medical Systems, vol. 36, pp. 2743–2749, October. 2012.
    [12] C. Ma, J. Lin, Y. Wang, and M. Shang, “Offline RFID Grouping Proofs with Trusted Timestamps,” In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674-681, June 2012
    [13] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,” In Proceeding of Workshop on RFID Security – RFIDSec 06, July 2006.
    [14] M. Barasz, B. Boros, P. Ligeti, K. Loja, and D. Nagy, “Breaking LMAP,” In Proceeding of Workshop on RFID Security – RFIDSec 07, July 2007.
    [15] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez Tapiador, and A. Ribagor-da, “LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification,” Journal of Computer Standards and Interfaces, vol. 31, pp. 88–97, Jan. 2009.
    [16] P. Peris-Lopez, A. Orfila, A. Mitrokotsa, and J. C.A. van der Lubbe, “A compre-hensive RFID solution to enhance inpatient medication safety,” International Journal of Medical Informatics, vol. 80, issue 1, pp. 13–24, Jan. 2011.
    [17] A. Juels, “Yoking-proofs for RFID tags,” In Proceeding of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138–143, 2004.
    [18] J. Saito and K. Sakurai, “Grouping proof for RFID tags,” In Proceeding of the 19th International Conference on Advanced Information Networking and Appli-cations, vol. 2, pp. 621–624, 2005.
    [19] L. Bolotnyy and G. Robins, “Generalized yoking-proofs for a group of RFID tags” In Proceeding of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–4, 2006.
    [20] L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” In Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 40–48, June 2009.
    [21] Institute of Medicine of the National Academies, http://www.iom.edu/Reports.aspx.
    [22] S. Y. Crawford, M. R. Cohen, and E. Tafesse, “Systems factors in the reporting of serious medication errors in hospitals,” Journal of Medical Systems, vol. 27, Issue 6, pp.543–551, Dec . 2003.
    [23] S. M. Walton, “The pharmacist shortage and medication errors: Issues and evi-dence,” Journal of Medical Systems, vol.28, pp. 63–59, 2004.
    [24] M. Burmester, B. de Medeiros, R. Motta, “Provably secure grouping-proofs for RFID Tags,” In Proceedings of the 2008 8th smart card research and advanced applications, pp. 176-190, September2008.
    [25] X. Leng, Y. Lien, K. Mayes, K. Markantonakis, J.-H. Chiu, “Select-response grouping proof for RFID tags,” In Proceedings of the 2009 First Asian Confer-ence on Intelligent Information and Database Systems, pp.73–77, April 2009.
    [26] EPCglobal Inc, EPC Class-1 HF RFID Air Interface Protocol for Communica-tions at 13.56 MHz (version2.0.3). Retrieved from EPCglobal Inc, Class-1 Gen-eration-2 UHF RFID protocol for communications at 860 MHz - 960 MHz (ver-sion 1.2.0). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.
    [27] S.-H. Ching, and A. Tai, “HF RFID versus UHF RFID — Technology for Library Service Transformation at City University of Hong Kong,” The Journal of Academic Librarianship, vol. 35, pp. 347–359, July 2009.
    [28] EPCglobal Inc, GS1 EPC Tag Data Standard (version 1.6). Retrieved from http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_6-RatifiedStd-20110922.pdf

    QR CODE