語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and Performance Analysis fo...
~
Liang, Bing.
FindBook
Google Book
Amazon
博客來
Security and Performance Analysis for RFID Protocols.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and Performance Analysis for RFID Protocols./
作者:
Liang, Bing.
面頁冊數:
93 p.
附註:
Source: Masters Abstracts International, Volume: 49-04, page: 2530.
Contained By:
Masters Abstracts International49-04.
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1489343
ISBN:
9781124506043
Security and Performance Analysis for RFID Protocols.
Liang, Bing.
Security and Performance Analysis for RFID Protocols.
- 93 p.
Source: Masters Abstracts International, Volume: 49-04, page: 2530.
Thesis (M.Sc.)--Singapore Management University (Singapore), 2011.
Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases.
ISBN: 9781124506043Subjects--Topical Terms:
1669061
Engineering, Computer.
Security and Performance Analysis for RFID Protocols.
LDR
:03153nam 2200313 4500
001
1403624
005
20111118100024.5
008
130515s2011 ||||||||||||||||| ||eng d
020
$a
9781124506043
035
$a
(UMI)AAI1489343
035
$a
AAI1489343
040
$a
UMI
$c
UMI
100
1
$a
Liang, Bing.
$3
1682899
245
1 0
$a
Security and Performance Analysis for RFID Protocols.
300
$a
93 p.
500
$a
Source: Masters Abstracts International, Volume: 49-04, page: 2530.
500
$a
Adviser: Yingjiu Li.
502
$a
Thesis (M.Sc.)--Singapore Management University (Singapore), 2011.
520
$a
Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases.
520
$a
The first part of our work is to categorize typical existing RFID protocols according to their security levels. The result is vitally important to RFID system administrators who need to find different protocols to be implemented in their systems. The trade-off to be made in decision is that higher security level typically implies worse performance.
520
$a
We examine the performance in two aspects: the look-up cost in RFID reader's back-end database and the tag-related cost. The tag-related cost includes the cryptographic operation cost (cryptographic computation cost along with access operation cost in RFID tag's chip memory), and the communication cost between reader and tag. We perform traditional database complexity analysis to assess the database look-up cost, and conduct experiments to evaluate both the cryptographic operation cost and and communication cost, so as to have a thorough understanding of the overall time cost of each RFID protocol. This work is important because efficiency is a major concern in the design of RFID protocols, especially when high security level is achieved with complex cryptographic operations being performed on resource-limited RFID tags. An inefficient RFID protocol could be a bottleneck of the whole system in real applications.
520
$a
Finally, we benchmark the performance of each RFID protocol, compare performance of protocols in different security levels and investigate the extra cost required to achieve certain security properties. We find a trade-off between look-up cost and tag-related cost. Based on the results of performance benchmarks, we revise some existing protocols and propose several design suggestions for creating new RFID protocols.
590
$a
School code: 1583.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
Singapore Management University (Singapore).
$b
School of Information Systems.
$3
1682900
773
0
$t
Masters Abstracts International
$g
49-04.
790
1 0
$a
Li, Yingjiu,
$e
advisor
790
$a
1583
791
$a
M.Sc.
792
$a
2011
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1489343
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9166763
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入