Design And Implement of Improved Gen2v2 Authentication Protocol
碩士 === 國立暨南國際大學 === 資訊管理學系 === 103 === EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applica...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90949757416688370976 |
id |
ndltd-TW-103NCNU0396021 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NCNU03960212016-09-11T04:09:03Z http://ndltd.ncl.edu.tw/handle/90949757416688370976 Design And Implement of Improved Gen2v2 Authentication Protocol 改良之Gen2v2標籤認證協定與模擬實作 Po-Chang Shih 施伯昌 碩士 國立暨南國際大學 資訊管理學系 103 EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applications need. Therefore ,EPCglobal published a new generation - Gen2v2 specification; the new standards add several security commands, file management commands and privacy protection commands to set a foundation and building blocks for various secure applications. Engels et al., based on Gen2v2, proposed authentication and key agreement schemes. However, we find that the schemes can not protect tag or reader from forgery attacks. This study points out these shortcomings , and proposes improved schemes. Finally, we simulate our attacks and improved schemes, and the results verify our attacks and improvements. Hung-Yu Chien 簡宏宇 2015 學位論文 ; thesis 66 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立暨南國際大學 === 資訊管理學系 === 103 === EPCglobal introduced Gen2 RFID to facilitate the logistics applications, and it has been widely used in other application areas - such as: identity authentication, access control, etc. However, Gen2 did not provide the required security properties these applications need. Therefore ,EPCglobal published a new generation - Gen2v2 specification; the new standards add several security commands, file management commands and privacy protection commands to set a foundation and building blocks for various secure applications. Engels et al., based on Gen2v2, proposed authentication and key agreement schemes. However, we find that the schemes can not protect tag or reader from forgery attacks. This study points out these shortcomings , and proposes improved schemes. Finally, we simulate our attacks and improved schemes, and the results verify our attacks and improvements.
|
author2 |
Hung-Yu Chien |
author_facet |
Hung-Yu Chien Po-Chang Shih 施伯昌 |
author |
Po-Chang Shih 施伯昌 |
spellingShingle |
Po-Chang Shih 施伯昌 Design And Implement of Improved Gen2v2 Authentication Protocol |
author_sort |
Po-Chang Shih |
title |
Design And Implement of Improved Gen2v2 Authentication Protocol |
title_short |
Design And Implement of Improved Gen2v2 Authentication Protocol |
title_full |
Design And Implement of Improved Gen2v2 Authentication Protocol |
title_fullStr |
Design And Implement of Improved Gen2v2 Authentication Protocol |
title_full_unstemmed |
Design And Implement of Improved Gen2v2 Authentication Protocol |
title_sort |
design and implement of improved gen2v2 authentication protocol |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/90949757416688370976 |
work_keys_str_mv |
AT pochangshih designandimplementofimprovedgen2v2authenticationprotocol AT shībóchāng designandimplementofimprovedgen2v2authenticationprotocol AT pochangshih gǎiliángzhīgen2v2biāoqiānrènzhèngxiédìngyǔmónǐshízuò AT shībóchāng gǎiliángzhīgen2v2biāoqiānrènzhèngxiédìngyǔmónǐshízuò |
_version_ |
1718383827827556352 |