The Study of ECC-based RFID Protocols

博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuse...

Full description

Bibliographic Details
Main Authors: Wen-Tsai Ko, 柯文財
Other Authors: E. H. Lu
Format: Others
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/97639389693150582035
Description
Summary:博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuses on grouping-proof protocol, mobile authentication protocol and mutual authentication protocol. The grouping-proofs protocol in RFID applications provide a proof of two or more tags must be simultaneously scanned. That can be applied to make sure that the right medicine taken by the right patient where the medicine and patient have attached tags to proof they are simultaneously scanned. The mobile authentication can be applied for patrolling mission to audit the mobile visit the patrolling-spot in the right time interval. The tag and reader mutual authentication protocol keeps tags from been reading by any invalid reader. Because that ECC (Elliptic Curve Cryptography) needs shorter key length than other cryptosystem, it is suit for the constrained mobile communication device. In this dissertation, some ECC-based protocols, such as practical grouping-proofs protocol, mobile authentication protocol and tag/reader mutual authentication protocol are reviewed and analyzed. We found some defects of these protocols. Moreover, we proposed more secure protocols to improve those protocols based on their defects in this article