A Study of Counter Inconsistency Problems in RFID Authentication Protocols
碩士 === 亞洲大學 === 資訊科學與應用學系碩士班 === 97 === Radio Frequency Identification (RFID) has been widely used in several applications and its security has become a critical issue in this field. So far, several secure schemes have been proposed to authenticate the legitimate reader and tag. However, in these sc...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/41137326448579384819 |
id |
ndltd-TW-097THMU8394013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097THMU83940132015-10-13T15:37:04Z http://ndltd.ncl.edu.tw/handle/41137326448579384819 A Study of Counter Inconsistency Problems in RFID Authentication Protocols RFID鑑別協定之計數器不同步問題之研究 Ju-Pei Pai 白如珮 碩士 亞洲大學 資訊科學與應用學系碩士班 97 Radio Frequency Identification (RFID) has been widely used in several applications and its security has become a critical issue in this field. So far, several secure schemes have been proposed to authenticate the legitimate reader and tag. However, in these schemes, if the transmitted parameters are lost, the shared counter can become inconsistent. In this condition, the authentication between the reader and the tag will fail and the tag cannot be used in this system anymore. In this thesis, we point out the problem of counter inconsistency in several RFID authentication schemes. Furthermore, we have proposed two schemes to avoid these problems respectively. The first scheme can not only overcome the counter inconsistency problem, but also can improve the search time to find the tag’s identification in the database. In the second scheme, we will propose a lightweight authentication scheme to overcome the asynchronous flaw and withstand the man-in-the-middle attack. Shyh-Chang Tsaur Iuon-Chang Lin 曹世昌 林詠章 2009 學位論文 ; thesis 49 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 亞洲大學 === 資訊科學與應用學系碩士班 === 97 === Radio Frequency Identification (RFID) has been widely used in several applications and its security has become a critical issue in this field. So far, several secure schemes have been proposed to authenticate the legitimate reader and tag. However, in these schemes, if the transmitted parameters are lost, the shared counter can become inconsistent. In this condition, the authentication between the reader and the tag will fail and the tag cannot be used in this system anymore. In this thesis, we point out the problem of
counter inconsistency in several RFID authentication schemes. Furthermore, we have proposed two schemes to avoid these problems respectively. The first scheme can not only overcome the counter inconsistency problem, but also can improve the search time
to find the tag’s identification in the database. In the second scheme, we will propose a lightweight authentication scheme to overcome the asynchronous flaw and withstand the man-in-the-middle attack.
|
author2 |
Shyh-Chang Tsaur |
author_facet |
Shyh-Chang Tsaur Ju-Pei Pai 白如珮 |
author |
Ju-Pei Pai 白如珮 |
spellingShingle |
Ju-Pei Pai 白如珮 A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
author_sort |
Ju-Pei Pai |
title |
A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
title_short |
A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
title_full |
A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
title_fullStr |
A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
title_full_unstemmed |
A Study of Counter Inconsistency Problems in RFID Authentication Protocols |
title_sort |
study of counter inconsistency problems in rfid authentication protocols |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/41137326448579384819 |
work_keys_str_mv |
AT jupeipai astudyofcounterinconsistencyproblemsinrfidauthenticationprotocols AT báirúpèi astudyofcounterinconsistencyproblemsinrfidauthenticationprotocols AT jupeipai rfidjiànbiéxiédìngzhījìshùqìbùtóngbùwèntízhīyánjiū AT báirúpèi rfidjiànbiéxiédìngzhījìshùqìbùtóngbùwèntízhīyánjiū AT jupeipai studyofcounterinconsistencyproblemsinrfidauthenticationprotocols AT báirúpèi studyofcounterinconsistencyproblemsinrfidauthenticationprotocols |
_version_ |
1717768128211976192 |