Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 一個極輕量級RFID認證協議的安全性分析與改良
Security Analysis and Improvements on an Authentication Protocols in Ultra-Lightweight RFID Systems
作者 黃思瑋
貢獻者 左瑞麟
黃思瑋
關鍵詞 極輕量級RFID認證協議
複製攻擊
物理不可克隆函數
日期 2013
上傳時間 1-Oct-2013 13:47:33 (UTC+8)
摘要 無線射頻識別(RFID)技術是一種無線通訊技術。利用無線電射頻信號,以非接觸的方式,識別特定目標並讀寫相關數據,由後端資料庫系統取得相關資料。因為具備了不需要視覺接觸就能夠遠距離辨識身份和成本低廉的特性,使得這項技術運用在各種領域應用上能帶來前所未有的便利。然而,RFID技術所遇到的最大困難點在於其協定中缺乏隱私保護及資料安全。這使得透過無線訊號傳遞的資料,容易遭受到攻擊者的監聽、掃瞄與追蹤。許多學者為了解決這個問題有提出過許多的方案。其中Bassil等學者於2012年提出基於PUF的輕量級RFID認證方案,此方案可防止被物理克隆攻擊,但此方案所提出之協議仍有安全上的弱點。因此,在此篇論文中,我們基於Bassil等學者提出的方案,分析其安全性漏洞,並在兼顧安全性與低成本的特性下,提出新的基於PUF函數的新的輕量級RFID認證協議。
參考文獻 [1] R. Bassil, W. El-Beaino, W. Itani, A. Kayssi, and A. Chehab. "PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. " International Journal of RFID Security and Cryptography, 1(1), March (2012)
[2] H. Chien. "SASI: A New Ultralight weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4(4)Oct.-Dec. (2007)
[3] T.Cao, E. Bertino, and H. Lei.“Security Analysis of the SASI Protocol”.IEEE Transactions on Dependable and Secure Computing (2008).
[4] S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, "Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications,” in Proc. IEEE International Conference on RFID, April (2008).
[5] A. Eghdamian and A. Samsudin. "A secure protocol for ultralightweight radio frequency identication (RFID) tags. " In Informatics Engineering and Infor-mation Science ICIEIS 2011, volume 251 of Communications in Computer and Information Science , Kuala Lumpur, Malaysia, Springer. November (2011)
[6] EPCglobal, http://www.epcglobalinc.org/, 2007.
[7] G. Y. Jin, X. Y. Lu, M. S. Park. "An Indoor Localization Mechanism Using Active RFID Tag. " In SUTC, (2006)
[8] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda. "M2AP: a minimalist mutual-authentication protocol for lowcost RFID Tags. "inProc.International Conference on Ubiquitous Intelligence and Computing (2006)
[9] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda."LMAP: a real lightweight mutual authentication protocol for low-cost RFID Tags." in Proc. Workshop RFID Security.(2006)
[10] P. P. Lopez, J. C. H. Castro, J. M. Estevez-Tapiador, and A. Ribagorda. "EMAP: An efficient mutual authentication protocol for low-cost RFID Tags. " Springer-Verlag,In Proc. of IS`06, volume 4277 of LNCS.(2006)
[11] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda. "Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol", In Workshop on Information Security Applications, Volume 5379 of LNCS, (2008)
[12] T. Li and G. Wang. "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols", Proc. 22nd IFIP TC-11 Int’1Information Security Conference.(2007)
[13] Y. Lee. "Two ultralightweight authentication protocols for low-cost RFID tags. "Applied Mathematics and Information Sciences, 6(2S) May (2012)
[14] L. M. Ni, Y.H. Liu, Y.C. Lau, A.P. Patil. "LANDMARC: Indoor location sensing using active RFID: Pervasive computing and communications", Wireless Networks, 10 (6). (2004)
[15] M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic Approach to Privacy-Friendly Tags" RFID Privacy Workshop,November (2003)
[16] M. Safkhani, N. Bagheri, M. Naderi, "Security Analysis of a PUF based RFID Authentication Protocol" 704 Cryptology ePrintArchive:Listing for 2011
[17] I. Vajda and L. Butty´an, “Lightweight authentication protocols for low-cost RFID Tags,” 2nd Workshop on Security in Ubiquitous Computing (2003)
[18] Y. Zhao, Y. Liu, L.M. Ni, "VIRE: active RFID-based localization using virtual reference elimination, " in Proceedings of the 2007 International Conference on Parallel Processing, IEEE, Piscataway, NJ, USA (2007)
[19] Y. Zhang, P. kitsos. "Security in RFID and Sensor Networks" Auerbach Publications (2009)
描述 碩士
國立政治大學
資訊科學學系
100753021
102
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0100753021
資料類型 thesis
dc.contributor.advisor 左瑞麟zh_TW
dc.contributor.author (Authors) 黃思瑋zh_TW
dc.creator (作者) 黃思瑋zh_TW
dc.date (日期) 2013en_US
dc.date.accessioned 1-Oct-2013 13:47:33 (UTC+8)-
dc.date.available 1-Oct-2013 13:47:33 (UTC+8)-
dc.date.issued (上傳時間) 1-Oct-2013 13:47:33 (UTC+8)-
dc.identifier (Other Identifiers) G0100753021en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/61202-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 100753021zh_TW
dc.description (描述) 102zh_TW
dc.description.abstract (摘要) 無線射頻識別(RFID)技術是一種無線通訊技術。利用無線電射頻信號,以非接觸的方式,識別特定目標並讀寫相關數據,由後端資料庫系統取得相關資料。因為具備了不需要視覺接觸就能夠遠距離辨識身份和成本低廉的特性,使得這項技術運用在各種領域應用上能帶來前所未有的便利。然而,RFID技術所遇到的最大困難點在於其協定中缺乏隱私保護及資料安全。這使得透過無線訊號傳遞的資料,容易遭受到攻擊者的監聽、掃瞄與追蹤。許多學者為了解決這個問題有提出過許多的方案。其中Bassil等學者於2012年提出基於PUF的輕量級RFID認證方案,此方案可防止被物理克隆攻擊,但此方案所提出之協議仍有安全上的弱點。因此,在此篇論文中,我們基於Bassil等學者提出的方案,分析其安全性漏洞,並在兼顧安全性與低成本的特性下,提出新的基於PUF函數的新的輕量級RFID認證協議。zh_TW
dc.description.tableofcontents Table of contents
CHAPTER 1 INTRODUCTION 1
1.1.1 RFID INTRODUCTION 1
1.1.2 RFID APPLICATIONS 1
1.1.3 RFID CLASSIFICATIONS 2
1.2 RESEARCH MOTIVATION 4
1.3 RESEARCH PURPOSE AND CONTRIBUTION 5
1.4 OVERVIEW 6
CHAPTER 2 CLASSIFICATION AND SECURITY ANALYSIS OF RFID COMMUNICATION PROTOCOL 7
2.1 CLASSIFICATION OF COMMUNICATION PROTOCOL 7
2.2 RFID COMMUNICATION PROTOCOL MUST HAVE SECURITY AND PRIVACY 8
CHAPTER 3 ULTRA-LIGHTWEIGHT RFID COMMUNICATION PROTOCOL 12
3.1 UMAP FAMILY 12
3.1.1 M2AP 13
3.1.2 LMAP 18
3.1.3 EMAP 23
3.1.4 Security Analysis of UMAP family 28
3.2 SASI 29
3.2.1 Basic Assumptions of SASI 29
3.2.2 SASI Ultra-lightweight RFID Communication Protocol 30
3.2.3 Security Analysis of SASI 35
3.3 PHYSICAL ANALYTIC CLONING ATTACK 36
CHAPTER 4 PUMAP ULTRA-LIGHTWEIGHT RFID COMMUNICATION PROTOCOL 37
4.1 PHYSICAL UNCLONABLE FUNCTION 37
4.1.1 Arbiter PUF 37
4.2 PUMAP 39
4.2.2 Basic Assumptions of PUMAP 39
4.2.3 PUMAP Ultra-lightweight RFID Communication Protocol 40
4.2.4 Security Analysis of PUMAP 44
CHAPTER 5 OUR ULTRA-LIGHTWEIGHT RFID COMMUNICATION PROTOCOL 45
5.1 BASIC ASSUMPTIONS OF OUR PROTOCOL 45
5.2 OUR ULTRA-LIGHTWEIGHT RFID COMMUNICATION PROTOCOL 47
5.3 SECURITY ANALYSIS OF OUR PROTOCOL 51
CHAPTER 6 CONCLUSION 54
CHAPTER 7 REFERENCES 55
zh_TW
dc.format.extent 696114 bytes-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0100753021en_US
dc.subject (關鍵詞) 極輕量級RFID認證協議zh_TW
dc.subject (關鍵詞) 複製攻擊zh_TW
dc.subject (關鍵詞) 物理不可克隆函數zh_TW
dc.title (題名) 一個極輕量級RFID認證協議的安全性分析與改良zh_TW
dc.title (題名) Security Analysis and Improvements on an Authentication Protocols in Ultra-Lightweight RFID Systemsen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) [1] R. Bassil, W. El-Beaino, W. Itani, A. Kayssi, and A. Chehab. "PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. " International Journal of RFID Security and Cryptography, 1(1), March (2012)
[2] H. Chien. "SASI: A New Ultralight weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4(4)Oct.-Dec. (2007)
[3] T.Cao, E. Bertino, and H. Lei.“Security Analysis of the SASI Protocol”.IEEE Transactions on Dependable and Secure Computing (2008).
[4] S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, "Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications,” in Proc. IEEE International Conference on RFID, April (2008).
[5] A. Eghdamian and A. Samsudin. "A secure protocol for ultralightweight radio frequency identication (RFID) tags. " In Informatics Engineering and Infor-mation Science ICIEIS 2011, volume 251 of Communications in Computer and Information Science , Kuala Lumpur, Malaysia, Springer. November (2011)
[6] EPCglobal, http://www.epcglobalinc.org/, 2007.
[7] G. Y. Jin, X. Y. Lu, M. S. Park. "An Indoor Localization Mechanism Using Active RFID Tag. " In SUTC, (2006)
[8] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda. "M2AP: a minimalist mutual-authentication protocol for lowcost RFID Tags. "inProc.International Conference on Ubiquitous Intelligence and Computing (2006)
[9] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda."LMAP: a real lightweight mutual authentication protocol for low-cost RFID Tags." in Proc. Workshop RFID Security.(2006)
[10] P. P. Lopez, J. C. H. Castro, J. M. Estevez-Tapiador, and A. Ribagorda. "EMAP: An efficient mutual authentication protocol for low-cost RFID Tags. " Springer-Verlag,In Proc. of IS`06, volume 4277 of LNCS.(2006)
[11] P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador,A. Ribagorda. "Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol", In Workshop on Information Security Applications, Volume 5379 of LNCS, (2008)
[12] T. Li and G. Wang. "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols", Proc. 22nd IFIP TC-11 Int’1Information Security Conference.(2007)
[13] Y. Lee. "Two ultralightweight authentication protocols for low-cost RFID tags. "Applied Mathematics and Information Sciences, 6(2S) May (2012)
[14] L. M. Ni, Y.H. Liu, Y.C. Lau, A.P. Patil. "LANDMARC: Indoor location sensing using active RFID: Pervasive computing and communications", Wireless Networks, 10 (6). (2004)
[15] M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic Approach to Privacy-Friendly Tags" RFID Privacy Workshop,November (2003)
[16] M. Safkhani, N. Bagheri, M. Naderi, "Security Analysis of a PUF based RFID Authentication Protocol" 704 Cryptology ePrintArchive:Listing for 2011
[17] I. Vajda and L. Butty´an, “Lightweight authentication protocols for low-cost RFID Tags,” 2nd Workshop on Security in Ubiquitous Computing (2003)
[18] Y. Zhao, Y. Liu, L.M. Ni, "VIRE: active RFID-based localization using virtual reference elimination, " in Proceedings of the 2007 International Conference on Parallel Processing, IEEE, Piscataway, NJ, USA (2007)
[19] Y. Zhang, P. kitsos. "Security in RFID and Sensor Networks" Auerbach Publications (2009)
zh_TW