首頁 > 網路資源 > 大同大學數位論文系統

Title page for etd-0809111-131423


URN etd-0809111-131423 Statistics This thesis had been viewed 1540 times. Download 105 times.
Author Yu-hung Peng
Author's Email Address No Public.
Department Computer Science and Enginerring
Year 2010 Semester 2
Degree Master Type of Document Master's Thesis
Language zh-TW.Big5 Chinese Page Count 73
Title A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
Keyword
  • RFID
  • Supply Chain
  • Security
  • Ownership Transfer
  • Ownership Transfer
  • Security
  • Supply Chain
  • RFID
  • Abstract Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc. 
    In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives.
    Advisor Committee
  • Kuo-Hsuan Huang - advisor
  • Hung-Chang Lee - co-chair
  • Shang-Lin Hsieh - co-chair
  • Files indicate in-campus access at 5 years and off-campus access at 5 years
    Date of Defense 2011-07-20 Date of Submission 2011-08-09


    Browse | Search All Available ETDs