請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/23871
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 黃漢邦(Han-Pang Huang) | |
dc.contributor.author | Huang Fei-Long | en |
dc.contributor.author | 黃飛龍 | zh_TW |
dc.date.accessioned | 2021-06-08T05:11:56Z | - |
dc.date.copyright | 2006-07-28 | |
dc.date.issued | 2006 | |
dc.date.submitted | 2006-07-21 | |
dc.identifier.citation | [1] S. Anusha, “RFIDcover: A Coverage Planning Tool for RFID Networks with Mobile Readers,” Master Thesis, Graduate Institute of Information Technology, Indian Institute of Technology Bombay, 2005.
[2] M. Bhuptani and S. Moradpour, RFID Field Guild, 1st Edition, New York: Prentice-Hall, Inc., pp.35-50, 2005. [3] S. M. Birari, “Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers,” Master Thesis, Graduate Institute of Information Technology, Indian Institute of Technology Bombay, 2005. [4] L. Bolotnyy, G. Robins, “Multi-Tag Radio Frequency Identification Systems,” Proceedings of Automatic Identification Advanced Technologies, pp.83- 88, October, 2005. [5] J. C. Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Proceedings of Data Mining and Knowledge Discovery, vol. 2, pp. 121-167, 1998. [6] B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, “Redundant Reader Elimination in RFID Systems,” Proceedings of Sensor and Ad Hoc Communications and Networks, IEEE SECON 2005, pp. 176- 184, September. 2005. [7] C. M. Chang, “An Active Network-Based Intrusion Detection and Response System,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2002. [8] Y. T. Chang, “Robust Design for RFID System Testing and Applications,” Master Thesis, Graduate Institute of Industrial Engineering, National Taiwan University, 2006. [9] C. H. Chen, “Development of a e-Diagnostics System Based on Web-Services,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2004. [10] C. S. Chen, “Development of an Intelligent Diagnosis and Maintenance System,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2005. [11] W. C. Chang, “Modular Cell Controller Design and Development for RFID Based Flexible Manufacturing System,” Master Thesis, Institute of Industrial Engineering and Management, National Taipei University of Technology, 2006. [12] T. Cheong, Y. Kim and Y. Lee, “REMS and RBPTS: ALE-compliant RFID Middleware Software Platform,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp.699-704, February 2006. [13] C. Corts and V. N. Vapnik, “Support vector networks,” Machine Learning, vol. 20, pp. 273-297, 1995. [14] V. Deolalikar, M. Mesarina, J. Recker, and S. Pradhan, Perturbative Time and Frequency Allocations for RFID Reader Networks, HP Tech Report, HPL-2005-162, September. 2005. [15] V. Deolalikar, M. Mesarina, J. Recker, and S. Pradhan, Simplified Clustering Algorithms for RFID Networks, HP Tech Report, HPL-2005-163, September. 2005 [16] D. Engels and S. Sarma, “The Reader Collision Problem,” Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Vol. 3, pp. 6, 2002 [17] K. Finkenzeller, RFID-Handbook, 2nd Edition, New York: Wiley & Sons Ltd., 2003. [18] K. P. Fishkin, S. Roy, and B. Jiang, “Some methods for privacy in RFID communication,” Proceeding of 1st Eur. Workshop on Security in Ad-Hoc and Sensor Networks, 2004. [19] J. K. Ho, “Solving the Reader Collision Problem with a Hierarchical Q Learning Algorithm,” Master Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 2003. [20] S. Inoue and H. Yasuura, “RFID privacy using user-controllable uniqueness,” Proceedings of RFID Privacy Workshop, November 2003. [21] M. M. Iqbal, I. Gondal, and L. S. Dooley, “Dynamic Symmetrical Topology Models for Pervasive Sensor Networks,” Multitopic Conference, 2004. Proceedings of INMIC 2004, pp. 466 - 472, December. 2004. [22] M. Johansson, “Identification of the Main Factors Influencing an RFID Implementation in the Automotive and Pharmaceutical Industries”, Master Thesis, Department of Science and Technology, Linkopings University, 2005. [23] A. Juels, “RFID Security and Privacy: A Research Survey,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, February. 2006. [24] A. Juels, C. Blundo and S. Cimato “Minimalist cryptography for low-cost RFID tags,” Proceedings of 4th International Conference Security Communication. Vol. 3352, pp. 149-164, 2004 [25] A. Juels and J. Brainard, “Soft blocking: Flexible blocker tags on the cheap,” Proceedings of Workshop on Privacy in the Electronic Society, pp.1-7, 2004 [26] A. Juels and R. Pappu, “Squealing Euros: Privacy protection in RFID-enabled banknotes,” Proceddings of Fincancial Cryptography, Vol. 2742, pp.103-121, 2003 [27] A. Juels, R. L. Rivest, and M. Szydlo, “The blocker tag: Selective blocking of RFID tags for consumer privacy,” Proceeding of 8th ACM Conference, pp.103-111, 2003. [28] R. Kershner, “The number of circles covering a set,” Journal of Mathematics, Vol. 61, pp. 665, July 1939. [29] M. Keskilammi, L. Sydanheimo, and M. Kivikoski, “Radio Frequency Technology for Automated Manufacturing and Logistics Control. Part 1: Passive RFID Systems and the Effects of Antenna Parameters on Operational Distance.” Journal of Advanced Manufacturing Technology, Vol. 21, No. 10-11, pp. 769-774, April. 2002. [30] J. Kim, W. Lee, K. Yu, J. Myung, E. Kim and C. Lee, “Effect of Localized Optimal Clustering for Reader Anti-Collision in RFID Networks:Fairness Aspects to the Readers,” Proceedings of Computer Communications and Networks, pp. 497-502, 2005. [31] J. Lee and N. Kim, “Performance Test Tool for RFID Middleware: Parameters, Design, Implementation, and Features,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp. 149-152, February 2006. [32] H. Mallinson, “Enhancing Identity with Location,” Master Thesis, Graduate Institute of Manufacturing, Cambridge University, 2003. [33] D. Molnar, A. Soppera, and D. Wagner, “Privacy for RFID through Trusted Computing,” Proceedings of Workshop on Orivacy in the Electron, 2005. [34] V. Prabakar, B. V. Kumar, and S. V. Subrahmanya, “Management of RFID-centric business networks using Web Services,” Proceedings of the AICT and ICIW, pp.133-140, February 2006. [35] K. V. S. Rao, D. W. Duan and H. Heinrich, “On the Read Zone Analysis of Radio Frequency Identification Systems with Transponders Oriented in Arbitrary Directions,” Proceedings of Asia-Pacific Microwave Conference, pp.758-761, November 1999. [36] S. E. Sarma, S. A. Weis, and D. W. Engels, RFID Systems, Security and Privacy Implications, AutoID Center, MIT, Cambridge, MA, Tech., 2002. [37] S. Shephard, RFID Radio Frequency Identification, 1st Edition, New York: McGraw-Hill Company Inc., pp.131-154, 2005. [38] J. Song and H. Kim, “The RFID Middleware System Supporting Context-Aware Access Control Service,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp.863-866, February 2006. [39] V. Vapnik, Statistical Learning Theory, 1st Edition, New York: Wiley, 1998. [40] S. Viaene, B. Baesens, T. Van Gestel, J. A. K. Suykens, D. Van den Poel, J. Vanthienen, B. De Moor, and G. Dedene, “Knowledge Discovery in A Direct Marketing Case Using Least Squares Support Vector Machines”, International Journal of Intelligent Systems, Vol. 16, No. 2, pp.1023-1036, September 2001. [41] H. Vogt, “Efficient Object Identification with Passive RFID Tags,” International Conference on Pervasive Computing, Vol. 2414, pp. 98-113, 2002. [42] J. Waldrop, D. Engels, and S. Sarma, “Colorwave: An Anticollision Algorithm for the Reader Collision Problem,” Proceedings of IEEE International. Conference on Communications, Vol. 2, pp.1206-1210, 2003, [43] J. Waldrop, D. Engels, and S. Sarma, “Colorwave: A MAC for RFID Reader Networks,” Proceedings of IEEE Wireless Communications and Networking, Vol. 3, pp. 1701-1704, 2003. [44] W. Wang, DC McFarlane and JP Brusey, “Timing Analysis of Real-Time Networked RFID Systems,”17th Euromicro Conference on Real-Time Systems (ECRTS05), July. 2005. [45] J. Weston and C. Watkins, “Multi-Class Support Vector Machines,” Proceeding of ESANN99, 1999. [46] J. Yagi, E. Arai and T. Arai, “Parts and Packets Unification Radio Frequency Identification (RFID) Application for Construction,” Automation in Construction, pp.477-490, August 2005. [47] C. Y. Yu and H. P. Huang, “Development of the Order Fulfillment Process in the Foundry Fab by Applying Distributed Multi-Agents on A Generic Message-Passing Platform,” IEEE/ASME Transactions on Mechatronics, Vol. 6, No. 4, pp 387-398, December 2001. [48] M. R. Rieback, B. Crispo and A. S. Tanenbaum, “The Evolution of RFID Security,” IEEE Journal on Computation Society and Co-sponsored by the IEEE Communications Society, Vol. 5, No. 2, pp. 1536-1268, February. 2006. [49] H. Junius, D. W. Engels and S.E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” Proceedings of the International Symposium on Applications and the Internet Workshop, pp. 88-91, January 2006. [50] K. S. Leong, M. L. Ng, A. R. Grasso and P. H. Cole, “Synchronization of RFID Readers for Dense RFID Reader Environments,” Proceedings of the International Symposium on Applications and the Internet Workshop, pp. 48-51, January 2006. [51] Y. I. Kim, J. S. Park and Tea-Su Cheong, “Study of RFID Middleware Framework for Ubiquitous Computing Environment,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 2, pp. 825-830, February 2005. [52] Accenture, Radio Frequency Identification (RFID) White Paper, 2001. [53] S. Leaver, Evaluating RFID Middleware, Forrester Research Inc., August 2004. [54] EPCglobal IncTM, The EPCglobal NetworkTM, September 2004 [55] EPCglobal IncTM, The EPCglobal Architecture Framework, September 2004. [56] EPCglobal IncTM, EPCTM Generation 1 Tag Data Standards Version 1.1 Rev.1.27, May 10, 2005. [57] EPCglobal IncTM, Object Naming Service (ONS), October 2005. [58] EPCglobal IncTM, The Application Level Events (ALE) Specification Version 1.0, September 2005. [59] EPCglobal IncTM, EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz -960MHz Version 1.0.9 , January 2005 [60] Federal Information, Advanced Encryption Standard (AES), November 2001 [61] e-Diagnostics and EEC Workshop, International SEMATECH, October 2001 [62] e-Diagnostics Guidebook, version 1.1, International SEMATECH, December 2001. [63] N. Singh, Computer-Integrated Design and Manufacturing, New York: Wiley, 1996. [64] D. Engels, “The Reader Collision Problem,” Technical Report, available at http://www.autoidcenter.org/research/MIT-AUTOID-WH-007.pdf [65] Syscan International Inc. http://www.syscan.com/w4/Main_Printers.htm [66] UCI Knowledge Discovery in Databases Archive http://kdd.ics.uci.edu [67] http://www.rfidjournal.com/ [68] http://www.morerfid.com [69] Omron http://www.omron.com.au/autoid/overview_rfid02.asp [70] http://mathworld.wolfram.com/CirclePacking.html [71] http://www.epcglobalinc.org/ | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/23871 | - |
dc.description.abstract | RFID的快速崛起,應用層面廣泛,相對產生許多需要克服的問題。讀取率低、安全性、隱私、天線的配置、大量資料的蒐集與分析、天線互相干擾以及水及金屬對讀取率的影響等。本論文設計一個無線射頻辨識系統資訊平台,在多讀取器及多標籤環境下,避免互相干擾所導致的讀取率降低、資料有效的搜集、分析以及安全性等問題。
在系統的資料的安全性上,我們採用AES替射頻標籤加密,系統之間的訊息傳輸採用仿SSL的交握方式,因考量安全性與效率問題,同時採用RSA與AES兩種加密方式,並設計整個供應鏈的安全性機制。關於射頻系統互相干擾的問題,本論文提出一個事件驅動的讀取器排程方法,根據我們實驗出來讀取器的讀取範圍以及讀取率,與現存的抗干擾方式TDMA以及Colorwave模擬做比較後,EDRS有不錯的效果。 考量RFID系統資料的安全性、資料碰撞的問題並整合web-service建置出一個彈性且安全的資訊平台。資訊平台支援2.45GHz/915MHz/ 13.56MHz/530KHz 四種頻率的讀取器、其中915MHz可讀取主動式以及被動式的射頻標籤,支援ISO以及EPC規範的標籤以及內建感測器的標籤。資料搜集後我們可以將資料透過Web Service進行遠端診斷,提供支向量機器等方式。此外,通用訊息傳輸平台的建立可以提供Web-Site、簡訊發送、e-mail、視訊會議、GPRS以及XML等主動與被動的訊息傳輸方式。當診斷伺服器發現有異常事件時,會主動傳送警告訊息給相關人員,進行修復。 | zh_TW |
dc.description.abstract | In recent years, RFID (Radio Frequency Identification) technology seems to have been more widely accepted. However, there are still some weaknesses of RFID technology, such as low reading rate, data security and the privacy issue, deployment of antennas, problems in handling large amounts of data generated by the tags, reader collision, and failed in the presence of metal and liquid based products ... etc. This thesis developed a RFID Information Platform to handle mass data and try to solve the reader collision problem which may result in low reading rate, moreover, to deal with the data security problems.
In the aspect of the data transmission security, AES (Advanced Encryption Standard) algorithm is employed for the encryption of tag. The transmission protocol of this platform is designed by imitating Secure Socket Layer (SSL) handshake protocol. RSA (Ronald Rivet, Adi Shamir and Leonard Adleman) and AES encryption/decryption algorithms are applied simultaneously for considerations of security and efficiency. The security mechanisms are proposed for the supply chain management. Subsequently, an anti-collision policy called Event-driven reader scheduling (EDRS) is proposed in this thesis. A comparison of EDRS and existing collision avoidance policies (TDMA, Colorwave) was made based on the simulation results. There is a nice outcome of EDRS which is according to the concerned area (workspace) to avoid reader collision. The security issue and reader collision problem of RFID system are taken into account. Through the integration of web-services, the developed information platform is more flexible and secure. This information platform supports the adapters for 2.45GHz/915MHz/13.56MHz/530KHz readers. In addition, 915MHz reader supports active/passive tags which follow the standards of ISO and EPC. Collected fault data can be diagnosed through the web-service we constructed. SVM (Support Vector Machine) is used for fault diagnosis. Besides, General message passing platform provides various ways of message passing such as Web-Site, SMS, e-mail, videoconference, GPRS and XML…etc. Diagnosing server can send active warning notification to engineers or related staffs for troubleshooting. | en |
dc.description.provenance | Made available in DSpace on 2021-06-08T05:11:56Z (GMT). No. of bitstreams: 1 ntu-95-R93546013-1.pdf: 9671134 bytes, checksum: cba169f16b9f2ab56f9d8f1e327469f5 (MD5) Previous issue date: 2006 | en |
dc.description.tableofcontents | List of Tables VIII
List of Figures IX Chapter 1 Introduction 1 1.1 Motivation 1 1.2 Objectives 2 1.3 Contributions 3 1.4 Thesis Organization 4 Chapter 2 Relevant Research and Background Knowledge 5 2.1 Radio Frequency Identification System 5 2.1.1 Introduction 5 2.1.2 EPCGlobal Network Architecture and Framework Standards 7 2.2 RFID Middleware 10 2.2.1 Existing RFID Middleware Solutions 11 2.3 The Reader Collision Problem 13 2.4 Existing Approaches to avoid Reader Collision Problem 14 2.4.1 Existing Multiple Access Mechanisms 14 2.4.2 Existing Anti-Collision Approaches 15 2.5 RFID Security and Privacy 18 2.5.1 Existing Approaches for RFID Security and Privacy 19 Chapter 3 Reader Anti-Collision and Security Mechanism 22 3.1 Coverage Description 22 3.1.1 Data Gathering 22 3.1.2 Transformations and Presentation 24 3.2 Event-driven Reader Scheduling 25 3.2.1 RFID Reader Collision Index Definition 26 3.2.2 EDRS-Collision Avoidance Mechanism 30 3.3 Symmetric Key Cryptosystem-AES 34 3.4 Asymmetric Key Cryptosystem-RSA 39 3.5 Security and Privacy Mechanism 42 3.5.1 Level 1 43 3.5.2 Level 2 46 3.5.3 Level 3 50 Chapter 4 RFID Information Platform Architecture and Implementation 52 4.1 System Overview 52 4.2 Simulation Tool for RFID Layout 52 4.2.1 Architecture of Simulation Tool 53 4.2.2 Implementation of Simulation Tool 57 4.3 Edge Server 61 4.3.1 Reader Manager Module 62 4.3.2 Data Monitoring Module 67 4.3.3 Encryption/Decryption Module 67 4.4 Intrusion Detection and Response Module 68 4.4.1 Intrusion Detection 68 4.4.2 Intrusion Response 70 4.5 Information Platform 71 4.6 GMPP Services 75 4.6.1 Integrate XML to GMPP 76 4.7 Diagnostic Services 77 4.7.1 Support Vector Machine 77 4.7.2 Implementation of Remote Diagnosis Web-Service 82 Chapter 5 Simulations and Applications 86 5.1 Simulation 86 5.1.1 Case 1-Simulation Setup 87 5.1.2 Case 1-Simulation Results 89 5.1.3 Case 2-Simulation Setup 91 5.1.4 Case2-Simulation Results 92 5.1.5 Experiments and Results 93 5.2 Applications-Warehouse management 94 5.2.1 Scenario 95 5.2.2 Implementation and Results 96 5.3 Applications-Flexible Manufacturing Cell 98 5.3.1 Scenario 99 5.3.2 Implementation and Results 101 Chapter 6 Conclusions and Future Works 106 6.1 Conclusions 106 6.2 Future Works 107 References 108 | |
dc.language.iso | en | |
dc.title | 無線射頻辨識系統資訊平台建置 | zh_TW |
dc.title | Development of Radio Frequency Identification Information Platform | en |
dc.type | Thesis | |
dc.date.schoolyear | 94-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 陳凱瀛(Kai-Ying Chen),陳建良(Jiann-Liang Chen) | |
dc.subject.keyword | 無線射頻辨識,中介軟體,安全性,抗干擾, | zh_TW |
dc.subject.keyword | RFID,middleware,security,anti-collision, | en |
dc.relation.page | 113 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2006-07-22 | |
dc.contributor.author-college | 工學院 | zh_TW |
dc.contributor.author-dept | 工業工程學研究所 | zh_TW |
顯示於系所單位: | 工業工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-95-1.pdf 目前未授權公開取用 | 9.44 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。