研究生: |
鄔喬妤 WU, - CHIAO-YU |
---|---|
論文名稱: |
行動裝置指紋辨識於車聯網之應用 The Application of Fingerprint Recognition on Mobile Device in Internet of Vehicles |
指導教授: |
陳俊良
Jiann-Liang Chen |
口試委員: |
郭斯彥
Sy-Yen Kuo 黎碧煌 Bih-Hwang Lee 張耀中 Yao-Chung Chang 馬奕葳 Yi-Wei Ma |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 中文 |
論文頁數: | 88 |
中文關鍵詞: | NFC 、車聯網 、生物特徵驗證 、社群網站 、物聯網 、智慧型手機 |
外文關鍵詞: | Biometric authentication, Community Website |
相關次數: | 點閱:417 下載:1 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著行動無線通訊技術的發展,手機不再只是可以帶著走的電話,大量資料交換同時身分驗證成了很重要的議題,本論文著重在生物特徵認證,提出「計程車安全認證系統」,透過無線通訊技術將指紋傳遞給無生物特徵認證能力的機器端,在機器端進行辨識,使機器端無須具備有生物特徵讀取的能力也享有生物特徵身份辨識的方便與安全。本論文將所提出之「計程車安全認證系統」以實作呈現,計程車端僅須具備有對外網路與NFC通訊功能,即可利用手機上的指紋模組進行身分辨識,系統主要流程著重於司機端的身分認證,使司機可以通過一台智慧型手機來實現對計程車的操縱,包括鎖定和解鎖汽車。本論文透過App將手機指紋辨識系統綁定車鑰匙,使用近場通訊技術解鎖汽車。指紋具有唯一性,即使車主手機遺失,也不具備有車輛被盜竊之風險。從實際測試來看,使用指紋通過NFC操作進行開/鎖車門,與遙控鑰匙相比,反應速度和操作時間稍久,但從效果上來看,可以在保證安全的情況下得到更多的控制方式和更大的自由度。
With the rapid progress of mobile wireless communication technology, cell phone is not only a handheld mobile device but also a platform for data exchanging. Therefore, it is a vital issue how to authenticate identity while dealing with large amounts of data. This thesis focuses on the biometric authentication and proposed a “Taxi Safety Certification System”. Through wireless communication, this study transfers the fingerprints to machine without biometrics identification technology and authenticate user identity on device. There is no need to equip biometrics identification system for safety and convenience benefits. The main process of the proposed system focuses on the identity authentication of the driver. It allows drivers to steer a taxi via smartphones, which includes both locking and unlocking the vehicle. This system is used to unlock the car door by near field communication technology which combines car keys with the fingerprint identification system. Even though the smartphone is lost, the car isn't under the risk of theft. From a practical point of view, compared with remote key, the action speed and operating time in report of passing fingerprint to lock/unlock car door by NFC are both slightly longer, but in terms of effect, it can get more control methods and more freedom with safety guaranteed.
參考文獻
[1] F. Yang,S.Wang, J. Li, Z.S.Q. Liu, “An overview of Internet of Vehicles, ”Proceedings of the China Communications, pp. 1-15, 2014.
[2] NFC Forum, ‘NFC Data Exchange Format (NDEF) Technical Specification,’ [Online]. Available: http://nfc-forum.org/.
[3] Stack Overflow, ‘NFC standards (NFC Forum, ISO/IEC, ECMA),’ [Online]. Available: http://stackoverflow.com/ questions/10186887/nfc-standards-nfc-forum-iso-iec-ecma.
[4] NFC Forum, ‘ NFC Forum Technical Specifications,’ [Online]. Available: http://nfc-forum.org/.
[5] R. Boden, ‘NFC World, PayPal introduces one touch mobile payments,’ [Online]. Available:
http://www.nfcworld.com/2014/08/21/330961/paypal-introduces-one-touch-mobile-payments/
[6] N. Chandler, ‘What Is Google Wallet? ’ [Online]. Available: http://electronics.howstuffworks.com/google-wallet.htm.
[7] M.V. Bueno-Delgado, P. Pavón-Marino, A. De-Gea-García and A. Dolón-García, “The Smart University experience: A NFC-based ubiquitous environment”, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 799- 804, 2012.
[8] Nearfieldcommunication.Org, ‘Security Concerns with NFC Technology, ’ [Online]. Available: http://www.nearfield communication.org/nfc-security.html.
[9] S. Ghosh, J. Goswami, A. Kumar and A. Majumder, “Issues in NFC as a Form of Contactless Communication:A Comprehensive Survey,” Proceeding of Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on, pp.1-8, 2015.
[10] L. Jing-Lin, L. Zhi-Han, and Y. Fang-Chun, “In-ternet of Vehicles: The Framework and Key
Technologies,” Journal Of Beijing Universi-Ty Of Posts And Telecom, vol. [Online]. Available: http://www.buptjournal.cn/CN/abstract/abstract1895.shtml, 2014.
[11] C. Chao and Z. Yanmin, “Augmenting vehicular 3G users through inter-vehicle communica-
tions,” in Wireless Communications and Net-working Conference (WCNC), 2013 IEEE, pp. 1651-1656, 2013.
[12] J. Chennikara-Varghese, C. Wai, O. Altintas, and C. Shengwei, “Survey of Routing Protocols for Inter-Vehicle Communications,” in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on, pp. 1-5, 2006.
[13] O. Mourad, P. Le Thuc, R. Staraj and P. Iliev, "System Modeling of the RFID Contactless Inductive Coupling Using 13.56 MHz Loop Antennas," The 8th European Conference on Antennas and Propagation (EuCAP 2014), pp. 2034- 2038, 2014.
[14] Y.S. Chen, S.Y. Chen and H.J. Li, "Analysis of Antenna Coupling in Near-Field Communication Systems," IEEE Transactions on Antennas and Propagation, vol. 58, no. 10, pp. 3327-3335, 2010.
[15] V. Coskun, B. Ozdenizci, and K. (2013). A Survey on Near Field Communication (NFC) Technology. Wireless personal communications, 71(3), 2259-2294.
[16] NFC Forum, ‘Near_Field_Communication_In_Cell_Phones,’ [Online]. Available: http://nfc-forum.org/.
[17] NFC Forum, ‘NFC_Smart_Posters_White_Paper,’ [Online]. Available: http://nfc-forum.org/.
[18] Pedro Jose´ Sousa, Rafael Tavares Paulo Abreu, Manuel Quintas, Ana Reis, Maria Teresa RestivoLAETA – INEGI, “ Wireless control and network management of door locks,” Proceedings of the IEEE International, pp.1-2, 2016.
[19] R. CAppelli, M. Ferrara, and D. Maltoni. “ Minutia cylinder-code: A new representation and matching technique forfingerprint recognition,” IEEE Transactions on PatternAnalysis and Machine Intelligence, 32(12):2128–2141, 2010.
[20] ‘Htc – One – Max, Super Simple Accesibility,’ [Online]. Available: http://www.htc.com/us/
smartphones/htc-one-max/#/.
[21] ‘Samsung – Your finger is your key,’ [Online]. Available: http://www.samsung.com/
global/microsite/galaxys5/features.html.
[22] J. Feng, “Combining minutiae descriptors for fingerprint matching,” Pattern Recognition, vol. 41, issue 1, pp. 342-352, 2009.
[23] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Handbook of Fingerprint Recognition,” Pattern Recognition, vol. 41, issue 1, pp. 342-352, 2008.
[24] X. D. Jiang, and W. Y. Yau, “Fingerprint minutiae matching based on the local and global structures,” 15th International Conference on Pattern Recognition, vol. 2, pp. 1038-1041, 2000.
[25] H. Arasteh,V. Hosseinnezhad,V. Loia,A. Tommasetti,O. Troisi,M. Shafie-khah,P. Siano, “Iot-based smart cities: A survey, ”Proceedings of t Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, pp. 122–125, 2015.
[26] M. M. Monwar, and M. L. Gavrilova, “Multimodal Biometric System Using Rank-Level Fusion Approach,” IEEE Trans. On Sysgtems, Man And Cybernetics-Part B: Cybernetics, vol. 39, no. 4, pp. 867 - 878, 2009.
[27] A. Arakala, J. Jeffers, and K. Horadam. Fuzzy extractorsfor minutiae-based fingerprint authentication. In ICB 2007,LNCS 4642, pages 760–769. Springer-Verlag, 2007
[28] G. Kumar, S. Tulyakov, and V. Govindaraju. Combinationof symmetric hash functions for secure fingerprint matching.In ICPR, pages 890 –893, aug. 2010.
[29] J. Merkle, M. Niesing, M. Schwaiger, H. Ihmor, and U. Ko-rte. Security capacity of the fuzzy fingerprint vault. Interna-tional Journal on Advances in Security, 3(3 & 4):146–168,
2010.
[30] C.J. Ran and M. Xie, “A New Fingerprint Matching Method Based On Ridge Tracing,” Proceedings of the Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on, pp.1-6, 2007.