• 沒有找到結果。

結論與未來研究方向

在文檔中 中 華 大 學 (頁 37-42)

結論與未來研究方向

在這篇論文裡,我們利用位元碰撞來當作第三個位元狀態值,使得原始資 料可以用較短的資料長度來表示,也使得 Tag 可以減少回傳 Reader 的資料 量,並減少資料傳輸的時間,在一個單位時間內可以辨識出更多的 Tag,設計 一個簡單的編碼功能,改變 Tag 回傳資料的表示方式,用最少的運算方法提 高資料的安全性,加強 Secure Tree-Walking 演算法在 Tag 回傳資料的通道上

,資料傳輸的安全,可以有效的防止資料被竊聽、追蹤等安全,這些皆可以實 驗與分析的說明中得到證明。並且從上面的實驗資料中,當把 Tag 數量固定 在 100 個的時候,VLE 的編碼技術將增加約五十倍的掃描次數。

在目前的方法中,尚有二項目標要加強;首先,每個位元只能表示三種資 料狀態,VLE 演算法能節省的傳輸時間,約為沒有進行資料壓縮的 0.75 倍,

如何讓每個位元能表示更多的資料狀態,便可以節省更多的資料傳輸時間,而 當每個位元能表示更多的資料狀態時,也將會使得編碼後的資料安全性增加;

另外,目前是使用 PID + Segment Mask 來取得每一個 Segment 的 Shift Code 值,儲存在Tag 記憶體中的每一組 Segment Mask 都是一樣,經過長時間的監 控,總有一天會被破解,如何讓 Reader 與 Tag 經過一段時間改變 Segment Mask 的值,加強破解的難度,也是後續要加強的地方。

References

1. C.C. Chen, I.T. Chen, C.M. Cheng, M.Y. Chih and J.R. Shih, “A Practical Experience with RFID Security,” Proceedings of the International conference on Mobile Data Management: Systems, Services and Middleware, pp.395-396, 2009 2. W. Choi, and B.H. Roh, “Backward Channel Protection Method for RFID

Security Schemes Based on Tree-Walking Algorithms,” Proceedings of the International Conference on Computational Science and Application, pp. 279-287, 2006.

3. J. Eom and T.J. Lee, “Framed-Slotted ALOHA with Estimation by Pilot Frame and Identification by Binary Selection for RFID Anti-collision,” Proceedings of the International Symposium on Communications and Information Technologies, pp. 1027-1031, 2007.

4. B. Feng, J.T. Li, J.B. Guo, and Z.H. Ding, “ID-binary tree stack anticollision algorithm for RFID,” Proceedings of the 11th IEEE Symposium on Computers and Communications, pp. 207-212, 2006.

5. C. Floerkemeier and M. Lampe, “Issues with RFID Usage in Ubiquitous Computing Applications,” Pervasive Computing: Second International Conference (PERVASIVE 2004), Volume 3001 of Lecture Notes in Computer Science, Linz/Vienna, Austria, pp. 188-193, 2004.

6. X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, S. Song, “An approach to security and privacy of RFID system for supply chain,” Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, pp. 164-168, 2004.

7. S.L. Garfinkel, A. Juels and R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,” Proceedings of the IEEE Security & Privacy Magazine, Vol. 3, Issue 3, pp. 34-43, 2005.

8. X. Gong, Y. Wang, H, Li and J. He, “An Authentication Protocol Applied to RFID Security Systems,” Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, pp.307-310, 2009

9. B. Guihao, Z. Minggao, L. Jiuwen, L. Yin, “The Design of an RFID Security Protocol Based on RSA Signature for E-ticket,” Proceedings of the 2nd IEEE International Conference on Information Managemnet and Engineering, pp. 636-639, 2010.

10. C. Hurjui, A. Graur, “Analysis of RFID security and privacy by means of identification and authentication protocols,” Proceedings of the International Joint Conference on Computational Cybernetics and Technical, pp. 315-320, 2010

11. S. Karthikeyan, M. Nesterenko, “RFID security without extensive cryptography,”

Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63-67, 2005.

12. H.S. Kim, J.H. Oh, J.Y. Choi, “Security Analysis of RFID Authentication for Pervasive Systems using Model Checking,” Proceedings of the 30th Annual International Computer Software and Applications Conference, pp. 195-202, 2006.

13. H. Ko and C. Ramos, “A Study on the Encryption Algorithm for RFID tag,”

Proceedings of the International Conference on Convergence and Hybrid Information Technology, pp.672-677, 2008.

14. E. Korkmaz, A. Ustundag, “Standards, Security & Privacy Issues about Radio Frequency Identification,”Proceedings of the 4th International Logistics and Supply Chain Congress, pp. 353-360, 2006.

15. K.S. Leong, M.L. Ng, P.H. Cole, “The reader collision problem in RFID systems,” Proceedings of the IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, pp.

658-661, 2005.

16. S.R. Lee, S.D. Joo and C.W. Lee, “An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, pp. 166-172, 2005.

17. T.L. Lim, T. Li, and S.L. Yeo, “Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems,” Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 40-49, 2008.

18. J. Myung, W. Lee, “Adaptive Binary Splitting: a RFID Tag collision arbitration protocol for Tag identification,” Proceedings of the 2nd International Conference on Broadband Networks, pp. 347-355, 2005.

19. J. Park, J. Na, and M. Kim, “A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag,” Proceedings of the Future Generation Communication and Networking , pp. 436-441, 2007.

20. T. Phillips, T. Karygiannis, and R. Kuhn, “Security Standards for the RFID Market,” Proceedings of the IEEE Security & Privacy, pp. 85-89, 2005.

21. C. Qian, H. Ngan, and Y. Liu, “Cardinality Estimation for Large-scale RFID Systems,” Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 30-39, 2008.

22. R. Want, “An Introduction to RFID Technology,” Proceedings of the IEEE Pervasive Computing, vol.5, no. 1, pp. 25-33, 2006.

23. S.A. Weis, “Security and Privacy in Radio-Frequency Identification Devices,”

Masters Thesis. MIT. 2003.

24. S. A. Weis, S. Sarma, R. Rivest and D. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proceedings of the First International Conference on Security in Pervasive Computing, pp. 201-212, 2003.

25. X.H. Wang, X.G. Zhou, and B.S. Sun, “An Improved Security Solution of RFID system,” Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2081-2084, 2007.

26. Q. Xiao, C. Boulet, and T. Gibbons, “RFID Security Issues in Military Supply Chains,” Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 599-605, 2007.

27. L. Zhang, H. Zhou, R. Kong, and F. Yang, “An Improved Approach to Security and Privacy of RFID Application System,” Proceedings of IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1149-1152, 2005.

28. S. Zhou, Z. Luo, E. Wong, C.J. Tan, Jaiqing Luo, “Interconnected RFID Reader Collision Model and its Application in Reader Anti-collision,” Proceedings of the IEEE International Conference on RFID Gaylord Texan Resort, pp. 212-219, 2007.

在文檔中 中 華 大 學 (頁 37-42)

相關文件