The Study of ECC-based RFID Protocols

博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuse...

Full description

Bibliographic Details
Main Authors: Wen-Tsai Ko, 柯文財
Other Authors: E. H. Lu
Format: Others
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/97639389693150582035
id ndltd-TW-102CGU05442026
record_format oai_dc
spelling ndltd-TW-102CGU054420262015-10-14T00:18:19Z http://ndltd.ncl.edu.tw/handle/97639389693150582035 The Study of ECC-based RFID Protocols 基於ECC技術的RFID協定研究 Wen-Tsai Ko 柯文財 博士 長庚大學 電機工程學系 102 RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuses on grouping-proof protocol, mobile authentication protocol and mutual authentication protocol. The grouping-proofs protocol in RFID applications provide a proof of two or more tags must be simultaneously scanned. That can be applied to make sure that the right medicine taken by the right patient where the medicine and patient have attached tags to proof they are simultaneously scanned. The mobile authentication can be applied for patrolling mission to audit the mobile visit the patrolling-spot in the right time interval. The tag and reader mutual authentication protocol keeps tags from been reading by any invalid reader. Because that ECC (Elliptic Curve Cryptography) needs shorter key length than other cryptosystem, it is suit for the constrained mobile communication device. In this dissertation, some ECC-based protocols, such as practical grouping-proofs protocol, mobile authentication protocol and tag/reader mutual authentication protocol are reviewed and analyzed. We found some defects of these protocols. Moreover, we proposed more secure protocols to improve those protocols based on their defects in this article E. H. Lu 盧而輝 2014 學位論文 ; thesis 87
collection NDLTD
format Others
sources NDLTD
description 博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuses on grouping-proof protocol, mobile authentication protocol and mutual authentication protocol. The grouping-proofs protocol in RFID applications provide a proof of two or more tags must be simultaneously scanned. That can be applied to make sure that the right medicine taken by the right patient where the medicine and patient have attached tags to proof they are simultaneously scanned. The mobile authentication can be applied for patrolling mission to audit the mobile visit the patrolling-spot in the right time interval. The tag and reader mutual authentication protocol keeps tags from been reading by any invalid reader. Because that ECC (Elliptic Curve Cryptography) needs shorter key length than other cryptosystem, it is suit for the constrained mobile communication device. In this dissertation, some ECC-based protocols, such as practical grouping-proofs protocol, mobile authentication protocol and tag/reader mutual authentication protocol are reviewed and analyzed. We found some defects of these protocols. Moreover, we proposed more secure protocols to improve those protocols based on their defects in this article
author2 E. H. Lu
author_facet E. H. Lu
Wen-Tsai Ko
柯文財
author Wen-Tsai Ko
柯文財
spellingShingle Wen-Tsai Ko
柯文財
The Study of ECC-based RFID Protocols
author_sort Wen-Tsai Ko
title The Study of ECC-based RFID Protocols
title_short The Study of ECC-based RFID Protocols
title_full The Study of ECC-based RFID Protocols
title_fullStr The Study of ECC-based RFID Protocols
title_full_unstemmed The Study of ECC-based RFID Protocols
title_sort study of ecc-based rfid protocols
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/97639389693150582035
work_keys_str_mv AT wentsaiko thestudyofeccbasedrfidprotocols
AT kēwéncái thestudyofeccbasedrfidprotocols
AT wentsaiko jīyúeccjìshùderfidxiédìngyánjiū
AT kēwéncái jīyúeccjìshùderfidxiédìngyánjiū
AT wentsaiko studyofeccbasedrfidprotocols
AT kēwéncái studyofeccbasedrfidprotocols
_version_ 1718088438737010688