The Study of ECC-based RFID Protocols
博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuse...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/97639389693150582035 |
id |
ndltd-TW-102CGU05442026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102CGU054420262015-10-14T00:18:19Z http://ndltd.ncl.edu.tw/handle/97639389693150582035 The Study of ECC-based RFID Protocols 基於ECC技術的RFID協定研究 Wen-Tsai Ko 柯文財 博士 長庚大學 電機工程學系 102 RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuses on grouping-proof protocol, mobile authentication protocol and mutual authentication protocol. The grouping-proofs protocol in RFID applications provide a proof of two or more tags must be simultaneously scanned. That can be applied to make sure that the right medicine taken by the right patient where the medicine and patient have attached tags to proof they are simultaneously scanned. The mobile authentication can be applied for patrolling mission to audit the mobile visit the patrolling-spot in the right time interval. The tag and reader mutual authentication protocol keeps tags from been reading by any invalid reader. Because that ECC (Elliptic Curve Cryptography) needs shorter key length than other cryptosystem, it is suit for the constrained mobile communication device. In this dissertation, some ECC-based protocols, such as practical grouping-proofs protocol, mobile authentication protocol and tag/reader mutual authentication protocol are reviewed and analyzed. We found some defects of these protocols. Moreover, we proposed more secure protocols to improve those protocols based on their defects in this article E. H. Lu 盧而輝 2014 學位論文 ; thesis 87 |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
description |
博士 === 長庚大學 === 電機工程學系 === 102 === RFID technology is increasingly used in applications that require tracking identification, authentication for an object. It attaches RFID-readable tags to objects for identification and supporting of specific RFID-enabled applications. Recently, the research focuses on grouping-proof protocol, mobile authentication protocol and mutual authentication protocol. The grouping-proofs protocol in RFID applications provide a proof of two or more tags must be simultaneously scanned. That can be applied to make sure that the right medicine taken by the right patient where the medicine and patient have attached tags to proof they are simultaneously scanned. The mobile authentication can be applied for patrolling mission to audit the mobile visit the patrolling-spot in the right time interval. The tag and reader mutual authentication protocol keeps tags from been reading by any invalid reader. Because that ECC (Elliptic Curve Cryptography) needs shorter key length than other cryptosystem, it is suit for the constrained mobile communication device. In this dissertation, some ECC-based protocols, such as practical grouping-proofs protocol, mobile authentication protocol and tag/reader mutual authentication protocol are reviewed and analyzed. We found some defects of these protocols. Moreover, we proposed more secure protocols to improve those protocols based on their defects in this article
|
author2 |
E. H. Lu |
author_facet |
E. H. Lu Wen-Tsai Ko 柯文財 |
author |
Wen-Tsai Ko 柯文財 |
spellingShingle |
Wen-Tsai Ko 柯文財 The Study of ECC-based RFID Protocols |
author_sort |
Wen-Tsai Ko |
title |
The Study of ECC-based RFID Protocols |
title_short |
The Study of ECC-based RFID Protocols |
title_full |
The Study of ECC-based RFID Protocols |
title_fullStr |
The Study of ECC-based RFID Protocols |
title_full_unstemmed |
The Study of ECC-based RFID Protocols |
title_sort |
study of ecc-based rfid protocols |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/97639389693150582035 |
work_keys_str_mv |
AT wentsaiko thestudyofeccbasedrfidprotocols AT kēwéncái thestudyofeccbasedrfidprotocols AT wentsaiko jīyúeccjìshùderfidxiédìngyánjiū AT kēwéncái jīyúeccjìshùderfidxiédìngyánjiū AT wentsaiko studyofeccbasedrfidprotocols AT kēwéncái studyofeccbasedrfidprotocols |
_version_ |
1718088438737010688 |