Design And Implement of Improved Gen2v2 Authentication Protocol

碩士 === 國立暨南國際大學 === 資訊管理學系 === 103 === EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applica...

Full description

Bibliographic Details
Main Authors: Po-Chang Shih, 施伯昌
Other Authors: Hung-Yu Chien
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/90949757416688370976
id ndltd-TW-103NCNU0396021
record_format oai_dc
spelling ndltd-TW-103NCNU03960212016-09-11T04:09:03Z http://ndltd.ncl.edu.tw/handle/90949757416688370976 Design And Implement of Improved Gen2v2 Authentication Protocol 改良之Gen2v2標籤認證協定與模擬實作 Po-Chang Shih 施伯昌 碩士 國立暨南國際大學 資訊管理學系 103 EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applications need. Therefore ,EPCglobal published a new generation - Gen2v2 specification; the new standards add several security commands, file management commands and privacy protection commands to set a foundation and building blocks for various secure applications. Engels et al., based on Gen2v2, proposed authentication and key agreement schemes. However, we find that the schemes can not protect tag or reader from forgery attacks. This study points out these shortcomings , and proposes improved schemes. Finally, we simulate our attacks and improved schemes, and the results verify our attacks and improvements. Hung-Yu Chien 簡宏宇 2015 學位論文 ; thesis 66 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立暨南國際大學 === 資訊管理學系 === 103 === EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applications need. Therefore ,EPCglobal published a new generation - Gen2v2 specification; the new standards add several security commands, file management commands and privacy protection commands to set a foundation and building blocks for various secure applications. Engels et al., based on Gen2v2, proposed authentication and key agreement schemes. However, we find that the schemes can not protect tag or reader from forgery attacks. This study points out these shortcomings , and proposes improved schemes. Finally, we simulate our attacks and improved schemes, and the results verify our attacks and improvements.
author2 Hung-Yu Chien
author_facet Hung-Yu Chien
Po-Chang Shih
施伯昌
author Po-Chang Shih
施伯昌
spellingShingle Po-Chang Shih
施伯昌
Design And Implement of Improved Gen2v2 Authentication Protocol
author_sort Po-Chang Shih
title Design And Implement of Improved Gen2v2 Authentication Protocol
title_short Design And Implement of Improved Gen2v2 Authentication Protocol
title_full Design And Implement of Improved Gen2v2 Authentication Protocol
title_fullStr Design And Implement of Improved Gen2v2 Authentication Protocol
title_full_unstemmed Design And Implement of Improved Gen2v2 Authentication Protocol
title_sort design and implement of improved gen2v2 authentication protocol
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/90949757416688370976
work_keys_str_mv AT pochangshih designandimplementofimprovedgen2v2authenticationprotocol
AT shībóchāng designandimplementofimprovedgen2v2authenticationprotocol
AT pochangshih gǎiliángzhīgen2v2biāoqiānrènzhèngxiédìngyǔmónǐshízuò
AT shībóchāng gǎiliángzhīgen2v2biāoqiānrènzhèngxiédìngyǔmónǐshízuò
_version_ 1718383827827556352