查詢結果分析
來源資料
頁籤選單縮合
題名 | RFID安全機制於數位家庭應用之研究=RFID Security Mechanism on Digital Home Application |
---|---|
作者姓名(中文) | 廖鴻圖; 郭明煌; 鄭雅文; 高莉蓉; | 書刊名 | 資訊科學應用期刊 |
卷期 | 5:1 2009.06[民98.06] |
頁次 | 頁1-18 |
分類號 | 448.82 |
關鍵詞 | 無線射頻辨識; 數位家庭; 身分認證; RFID; Digital home; Authentication; |
語文 | 中文(Chinese) |
中文摘要 | 近年來政府積極推廣數位生活的好處,藉由新興科技的出現適時地融入人們的日常生活、提昇人們的生活品質,在此推廣下數位家庭為一大應用,數位家庭為家庭成員打造方便、舒適的生活環境。然而數位家庭帶來便利的同時仍有安全性疑慮需解決,為了讓家庭成員安心地存取數位家庭提供之服務,本研究於家庭無線區域網路裡探討該如何安全保護傳輸的資料避免被攻擊者竊聽及該如何藉由無線射頻技術(Radio Frequency Identification, RFID)簡易識別家庭成員的身分防止有心人士的身分偽造。本研究建立一套安全且較低成本的RFID認證、存取控制機制於數位家庭,達到安全資料傳輸且同時滿足訊息的一致性,本研究採用802.11制定的TKIP機制標準來保護於家庭網路傳輸的資料。同時,本研究採用雙因素認證概念,藉由家庭成員本身所知的通行碼與成員所擁有的被動式的無線射頻標籤做為登入系統時的身分確認,為數位家庭服務提供更安全的存取防護措施。本研究機制不僅達到安全傳輸還抵擋RFID及家庭網路可能面臨到的各類攻擊,包含偽裝、偽冒攻擊、欺騙攻擊、竊聽攻擊、重送攻擊、射頻標籤內容更改攻擊、複製射頻標籤攻擊、追蹤攻擊及智慧卡遺失冒用攻擊。 |
英文摘要 | Government has been promoting the benefits of digital life in recent years. New technology improves people's quality of life in people's daily lives. Under the promotion of the government, digital home is a major application. Digital home create convenient, comfortable living environment for family members. However, digital home’s security concerns are still to be resolved. In order to allow family members to ease access to services of digital home, how secure protection of the transmission data to prevent an attacker eavesdropping and how use RFID easy to identify the member’s identity that prevent the forgery is our research proposed. We propose a low-cost RFID authentication and access control mechanism in the digital home. This mechanism achieves safety data transmission and message consistency. In order to provide more security identification, our study use two-factor authentication conception. Using only user known’s password and passive tag for double identity confirm in digital home. Our research is not only to achieve transmit’s security but also to withstand RFID and home network’s attacks, including forgery attack, spoofing attack, eavesdrop attack, replay attack, tag content changes attack, tag cloning attack, people tracking attack, and tag lose attack. |
本系統之摘要資訊系依該期刊論文摘要之資訊為主。