簡易檢索 / 詳目顯示

研究生: 鄔喬妤
WU, - CHIAO-YU
論文名稱: 行動裝置指紋辨識於車聯網之應用
The Application of Fingerprint Recognition on Mobile Device in Internet of Vehicles
指導教授: 陳俊良
Jiann-Liang Chen
口試委員: 郭斯彥
Sy-Yen Kuo
黎碧煌
Bih-Hwang Lee
張耀中
Yao-Chung Chang
馬奕葳
Yi-Wei Ma
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2017
畢業學年度: 105
語文別: 中文
論文頁數: 88
中文關鍵詞: NFC車聯網生物特徵驗證社群網站物聯網智慧型手機
外文關鍵詞: Biometric authentication, Community Website
相關次數: 點閱:417下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著行動無線通訊技術的發展,手機不再只是可以帶著走的電話,大量資料交換同時身分驗證成了很重要的議題,本論文著重在生物特徵認證,提出「計程車安全認證系統」,透過無線通訊技術將指紋傳遞給無生物特徵認證能力的機器端,在機器端進行辨識,使機器端無須具備有生物特徵讀取的能力也享有生物特徵身份辨識的方便與安全。本論文將所提出之「計程車安全認證系統」以實作呈現,計程車端僅須具備有對外網路與NFC通訊功能,即可利用手機上的指紋模組進行身分辨識,系統主要流程著重於司機端的身分認證,使司機可以通過一台智慧型手機來實現對計程車的操縱,包括鎖定和解鎖汽車。本論文透過App將手機指紋辨識系統綁定車鑰匙,使用近場通訊技術解鎖汽車。指紋具有唯一性,即使車主手機遺失,也不具備有車輛被盜竊之風險。從實際測試來看,使用指紋通過NFC操作進行開/鎖車門,與遙控鑰匙相比,反應速度和操作時間稍久,但從效果上來看,可以在保證安全的情況下得到更多的控制方式和更大的自由度。


    With the rapid progress of mobile wireless communication technology, cell phone is not only a handheld mobile device but also a platform for data exchanging. Therefore, it is a vital issue how to authenticate identity while dealing with large amounts of data. This thesis focuses on the biometric authentication and proposed a “Taxi Safety Certification System”. Through wireless communication, this study transfers the fingerprints to machine without biometrics identification technology and authenticate user identity on device. There is no need to equip biometrics identification system for safety and convenience benefits. The main process of the proposed system focuses on the identity authentication of the driver. It allows drivers to steer a taxi via smartphones, which includes both locking and unlocking the vehicle. This system is used to unlock the car door by near field communication technology which combines car keys with the fingerprint identification system. Even though the smartphone is lost, the car isn't under the risk of theft. From a practical point of view, compared with remote key, the action speed and operating time in report of passing fingerprint to lock/unlock car door by NFC are both slightly longer, but in terms of effect, it can get more control methods and more freedom with safety guaranteed.

    目錄 摘要 III Abstract IV 致謝 VI 目錄 VI 圖目錄 VIII 表目錄 XI 第一章 緒 論 1 1.1 研究動機 1 1.2 研究方法 2 1.3 研究貢獻 3 1.4 論文架構 4 第二章 背景知識 5 2.1 生物識別 (Biometric Recognition) 5 2.1.1 生物識別系統 (Biometric Systems) 5 2.1.2 系統錯誤 (System Errors) 6 2.2 指紋的歷史(History of Fingerprints) 10 2.2.1 指紋分類 (Basic Fingerprint Patterns) 13 2.2.2 指紋匹配 (Fingerprint Matching) 13 2.2.3 指紋掃描技術 (Fingerprint sensing techniques) 13 2.3 近場通訊 (Near Field Communication , NFC) 15 2.3.1 NFC架構 (The Architecture of NFC) 18 2.3.2 NFC資料交換格式 (NFC Data Exchange Format) 20 2.3.3 NFC智慧型手機 (NFC Smartphone) 22 2.4 車聯網 (Internet of Vehicle , IoV) 23 2.4.1 車聯網影響 (The Influences of IoV) 24 2.4.2 車聯網架構 (The Architecture of IoV) 25 2.4.3 車聯網網路模型 (Network Model of IoV) 26 2.4.4 物聯網關鍵技術 (The Technology of IoT) 28 第三章 系統架構與功能設計 28 3.1 系統架構及軟硬體介紹 28 3.2 公司端 35 3.3 司機端 39 3.4 計程車端 41 3.5 乘客端 43 3.6 與車聯網之關聯分析 45 第四章 系統驗證與實驗結果 48 4.1 驗證環境及使用工具 48 4.2 實測驗證項目與實驗結果 56 4.2.1 司機端手機指紋驗證 58 4.2.2 計程車端指紋驗證 61 4.2.3 操作時間 64 4.2.4 司機端手機指紋之誤放率 65 4.2.5 誤拒率之改善 66 4.2.6 其他開車門方式之比較 69 第五章 結論與未來展望 71 5.1 結論 71 5.2 未來展望 72 參考文獻 74

    參考文獻
    [1] F. Yang,S.Wang, J. Li, Z.S.Q. Liu, “An overview of Internet of Vehicles, ”Proceedings of the China Communications, pp. 1-15, 2014.

    [2] NFC Forum, ‘NFC Data Exchange Format (NDEF) Technical Specification,’ [Online]. Available: http://nfc-forum.org/.
    [3] Stack Overflow, ‘NFC standards (NFC Forum, ISO/IEC, ECMA),’ [Online]. Available: http://stackoverflow.com/ questions/10186887/nfc-standards-nfc-forum-iso-iec-ecma.
    [4] NFC Forum, ‘ NFC Forum Technical Specifications,’ [Online]. Available: http://nfc-forum.org/.
    [5] R. Boden, ‘NFC World, PayPal introduces one touch mobile payments,’ [Online]. Available:
    http://www.nfcworld.com/2014/08/21/330961/paypal-introduces-one-touch-mobile-payments/
    [6] N. Chandler, ‘What Is Google Wallet? ’ [Online]. Available: http://electronics.howstuffworks.com/google-wallet.htm.
    [7] M.V. Bueno-Delgado, P. Pavón-Marino, A. De-Gea-García and A. Dolón-García, “The Smart University experience: A NFC-based ubiquitous environment”, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 799- 804, 2012.
    [8] Nearfieldcommunication.Org, ‘Security Concerns with NFC Technology, ’ [Online]. Available: http://www.nearfield communication.org/nfc-security.html.
    [9] S. Ghosh, J. Goswami, A. Kumar and A. Majumder, “Issues in NFC as a Form of Contactless Communication:A Comprehensive Survey,” Proceeding of Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on, pp.1-8, 2015.

    [10] L. Jing-Lin, L. Zhi-Han, and Y. Fang-Chun, “In-ternet of Vehicles: The Framework and Key
    Technologies,” Journal Of Beijing Universi-Ty Of Posts And Telecom, vol. [Online]. Available: http://www.buptjournal.cn/CN/abstract/abstract1895.shtml, 2014.
    [11] C. Chao and Z. Yanmin, “Augmenting vehicular 3G users through inter-vehicle communica-
    tions,” in Wireless Communications and Net-working Conference (WCNC), 2013 IEEE, pp. 1651-1656, 2013.
    [12] J. Chennikara-Varghese, C. Wai, O. Altintas, and C. Shengwei, “Survey of Routing Protocols for Inter-Vehicle Communications,” in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, pp. 1-5, 2006.
    [13] O. Mourad, P. Le Thuc, R. Staraj and P. Iliev, "System Modeling of the RFID Contactless Inductive Coupling Using 13.56 MHz Loop Antennas," The 8th European Conference on Antennas and Propagation (EuCAP 2014), pp. 2034- 2038, 2014.
    [14] Y.S. Chen, S.Y. Chen and H.J. Li, "Analysis of Antenna Coupling in Near-Field Communication Systems," IEEE Transactions on Antennas and Propagation, vol. 58, no. 10, pp. 3327-3335, 2010.
    [15] V. Coskun, B. Ozdenizci, and K. (2013). A Survey on Near Field Communication (NFC) Technology. Wireless personal communications, 71(3), 2259-2294.
    [16] NFC Forum, ‘Near_Field_Communication_In_Cell_Phones,’ [Online]. Available: http://nfc-forum.org/.
    [17] NFC Forum, ‘NFC_Smart_Posters_White_Paper,’ [Online]. Available: http://nfc-forum.org/.
    [18] Pedro Jose´ Sousa, Rafael Tavares Paulo Abreu, Manuel Quintas, Ana Reis, Maria Teresa RestivoLAETA – INEGI, “ Wireless control and network management of door locks,” Proceedings of the IEEE International, pp.1-2, 2016.
    [19] R. CAppelli, M. Ferrara, and D. Maltoni. “ Minutia cylinder-code: A new representation and matching technique forfingerprint recognition,” IEEE Transactions on PatternAnalysis and Machine Intelligence, 32(12):2128–2141, 2010.
    [20] ‘Htc – One – Max, Super Simple Accesibility,’ [Online]. Available: http://www.htc.com/us/
    smartphones/htc-one-max/#/.
    [21] ‘Samsung – Your finger is your key,’ [Online]. Available: http://www.samsung.com/
    global/microsite/galaxys5/features.html.
    [22] J. Feng, “Combining minutiae descriptors for fingerprint matching,” Pattern Recognition, vol. 41, issue 1, pp. 342-352, 2009.
    [23] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Handbook of Fingerprint Recognition,” Pattern Recognition, vol. 41, issue 1, pp. 342-352, 2008.
    [24] X. D. Jiang, and W. Y. Yau, “Fingerprint minutiae matching based on the local and global structures,” 15th International Conference on Pattern Recognition, vol. 2, pp. 1038-1041, 2000.
    [25] H. Arasteh,V. Hosseinnezhad,V. Loia,A. Tommasetti,O. Troisi,M. Shafie-khah,P. Siano, “Iot-based smart cities: A survey, ”Proceedings of t Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, pp. 122–125, 2015.

    [26] M. M. Monwar, and M. L. Gavrilova, “Multimodal Biometric System Using Rank-Level Fusion Approach,” IEEE Trans. On Sysgtems, Man And Cybernetics-Part B: Cybernetics, vol. 39, no. 4, pp. 867 - 878, 2009.
    [27] A. Arakala, J. Jeffers, and K. Horadam. Fuzzy extractorsfor minutiae-based fingerprint authentication. In ICB 2007,LNCS 4642, pages 760–769. Springer-Verlag, 2007
    [28] G. Kumar, S. Tulyakov, and V. Govindaraju. Combinationof symmetric hash functions for secure fingerprint matching.In ICPR, pages 890 –893, aug. 2010.
    [29] J. Merkle, M. Niesing, M. Schwaiger, H. Ihmor, and U. Ko-rte. Security capacity of the fuzzy fingerprint vault. Interna-tional Journal on Advances in Security, 3(3 & 4):146–168,
    2010.
    [30] C.J. Ran and M. Xie, “A New Fingerprint Matching Method Based On Ridge Tracing,” Proceedings of the Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on, pp.1-6, 2007.

    無法下載圖示 全文公開日期 2019/01/17 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE