Access Control of RFID Tags

碩士 === 明新科技大學 === 資訊管理研究所 === 100 === Due to its automatic identification capability and convenience, Radio Frequency Identification (RFID) system is taking the place of barcode and has been applied to various areas such as supply chain, transportation, retail and medical treatment in recent years....

Full description

Bibliographic Details
Main Authors: Li-Shan, Lin, 林儷珊
Other Authors: Tzu-Chang, Yeh
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/16112463926890098917
id ndltd-TW-100MHIT5396011
record_format oai_dc
spelling ndltd-TW-100MHIT53960112015-10-13T21:27:35Z http://ndltd.ncl.edu.tw/handle/16112463926890098917 Access Control of RFID Tags RFID標籤的存取控制 Li-Shan, Lin 林儷珊 碩士 明新科技大學 資訊管理研究所 100 Due to its automatic identification capability and convenience, Radio Frequency Identification (RFID) system is taking the place of barcode and has been applied to various areas such as supply chain, transportation, retail and medical treatment in recent years. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature. The data of tags can be read or modified without authorization. The access control of tags is needed to avoid the above attacks. Most existing RFID security protocols only focus on the mutual authentication between the tag and the reader, while the protection of the data transmitted from the tag after the mutual authentication is not included. In this thesis, we analyzed the tag access control of methods used in practice, EPC Class 1 Generation 2 standard and existing protocols in literature. Moreover, an improved protocol is proposed to avoid the above attacks. That allows consumers to enjoy the technological convenience brought by RFID. Tzu-Chang, Yeh 葉慈章 2011 學位論文 ; thesis 59 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 明新科技大學 === 資訊管理研究所 === 100 === Due to its automatic identification capability and convenience, Radio Frequency Identification (RFID) system is taking the place of barcode and has been applied to various areas such as supply chain, transportation, retail and medical treatment in recent years. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature. The data of tags can be read or modified without authorization. The access control of tags is needed to avoid the above attacks. Most existing RFID security protocols only focus on the mutual authentication between the tag and the reader, while the protection of the data transmitted from the tag after the mutual authentication is not included. In this thesis, we analyzed the tag access control of methods used in practice, EPC Class 1 Generation 2 standard and existing protocols in literature. Moreover, an improved protocol is proposed to avoid the above attacks. That allows consumers to enjoy the technological convenience brought by RFID.
author2 Tzu-Chang, Yeh
author_facet Tzu-Chang, Yeh
Li-Shan, Lin
林儷珊
author Li-Shan, Lin
林儷珊
spellingShingle Li-Shan, Lin
林儷珊
Access Control of RFID Tags
author_sort Li-Shan, Lin
title Access Control of RFID Tags
title_short Access Control of RFID Tags
title_full Access Control of RFID Tags
title_fullStr Access Control of RFID Tags
title_full_unstemmed Access Control of RFID Tags
title_sort access control of rfid tags
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/16112463926890098917
work_keys_str_mv AT lishanlin accesscontrolofrfidtags
AT línlìshān accesscontrolofrfidtags
AT lishanlin rfidbiāoqiāndecúnqǔkòngzhì
AT línlìshān rfidbiāoqiāndecúnqǔkòngzhì
_version_ 1718063772221833216