Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0809111-131423 Statistics This thesis had been viewed 1727 times. Download 105 times. Author Yu-hung Peng Author's Email Address No Public. Department Computer Science and Enginerring Year 2010 Semester 2 Degree Master Type of Document Master's Thesis Language zh-TW.Big5 Chinese Page Count 73 Title A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems Keyword RFID Supply Chain Security Ownership Transfer Ownership Transfer Security Supply Chain RFID Abstract Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc.
In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives.
Advisor Committee Kuo-Hsuan Huang - advisor
Hung-Chang Lee - co-chair
Shang-Lin Hsieh - co-chair
Files Date of Defense 2011-07-20 Date of Submission 2011-08-09