指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1. RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS:

Slides:



Advertisements
Similar presentations
Enabling New RFID Communication Opportunities with EPC Network Services Tony Rutkowski Vice President VeriSign Communication Services tel:
Advertisements

Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Company LOGO Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance Evaluation 指導教授: 童曉儒 教授 學生:許益晨 IEEE TRANSACTIONS.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Understanding the IEC Standard 李嘉凱 指導教授:柯開維.
Radiofrequency Identification for movable heritage management Central International Archive of Art Objects Member of Albert Canals – General Director AICOA.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Condor-G: A Computation Management Agent for Multi-Institutional Grids James Frey, Todd Tannenbaum, Miron Livny, Ian Foster, Steven Tuecke Reporter: Fu-Jiun.
Active Directory: Final Solution to Enterprise System Integration
“Turn you Smart phone into Business phone “
Zero-programming Sensor Network Deployment 學生:張中禹 指導教授:溫志煜老師 日期: 5/7.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Distributed Publish/Subscribe Network Presented by: Yu-Ling Chang.
1 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California draft-urien-hip-tag-03.txt HIP support for RFID
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
無線射頻識別報告 授課教師 : 黃秋煌 報告人 : 王重凱 1. Outline ECA Rule-based RFID Data Management An Efficient RFID Data Processing Scheme for Data Filtering and Recognition.
Clinic Security and Policy Enforcement in Windows Server 2008.
授課教授 : 黃秋煌 教授 報告人 : 徐琨閔 無線射頻識別 論文報告. RFID Lab, Dept. IECS, FCU Outline 1. A Generic Model for NFC-based Mobile Commerce 2. Business Process Analysis of.
1 A Flexible and Secure Deployment Framework for Distributed Applications Alan Dearle, Graham Kirby, Andrew McCarthy and Juan Carlos Diaz y Carballo School.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
An Architecture for Video Surveillance Service based on P2P and Cloud Computing Yu-Sheng Wu, Yue-Shan Chang, Tong-Ying Juang, Jing-Shyang Yen speaker:
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
September 18, 2015 無線射頻識別 論文報告 Reported by: 廖翊婷. September 18, 2015 An RFID-based System for Emergency Health Care Services Cristina TURCU, Cornel TURCU,
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
On-Line Information Systems Choice, Criteria and Design ESTELLA ADAMIDOU, ARISTEA – ALEXANDRA PRIGKOU MSc in Finance and Financial Information Systems.
Presenter - Bob Kinicki Internet of Things Fall 2015
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
Architecting for Innovation ACM SIGCOMM Computer Communication Review 2011 July Presenter :許耀中
© Synergetics Portfolio Security Aspecten.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
1 授課教授:黃秋煌 學生:賴志勇 學號: M Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.
Ivo Rosol, OKsystem Middleware.
1 Design of Embedded Home Network Gateway for CEBus Based on ARM Binbin Ni, Mingguang Wu, Yanpeng Liu 2006 IEEE International Conference on Industrial.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
6. Protocol Standardization for IoT 1.  TCP/IP  HTML and HTTP  The difference between the Internet and the World Wide Web The Internet is the term.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
SECURITY IN DISTRIBUTED FILE SYSTEMS Tejaswini Kalluri, Venkata Prudhvi Raj Konda, Kanna Karri.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu, Sen Wang, Xu Yang, Van Jacobson, Lixia Zhang ICN ‘11 August 19 Presenter: Junghwan Song.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Security of the Internet of Things: perspectives and challenges
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Interoperable Internet Scale Security Framework for RFID Networks
Presented by Edith Ngai MPhil Term 3 Presentation
Issues need harmonization
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Outline 01 Introduction 04 The Architecture of Khorramshahr 02 Problem Statement 05 Performance Evaluation 03 Preliminaries of The Used Filters 06 Conclustion.
Discussions on Heterogeneous Identification Service
Distribution and components
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Mobile Agents.
UNIT No: IV IDENTITY MANAGEMENT MODELS IN IoT
Presentation transcript:

指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1

RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS: A Privacy-Enhanced Discovery Service for RFID- Based Product Information A Temporal-based Model of Uncertain RFID Data 2

F´elix Jes´us Villanueva, David Villa, Francisco Moya, Maria Jos´e Santofimia, Juan Carlos L´opez 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing Internet of Things architecture for a RFID-based product tracking business model

RFID Lab, Dept. IECS, FCU Introduction Goods traceability is a growing application This paper therefore proposes an evolution of goods trace applications, mainly motivated by the wish of obtaining a global ecosystem This work proposes the use of Object-Oriented Distributed Middlewares The information written in RFID tags is used for invoking remote methods in objects 4

RFID Lab, Dept. IECS, FCU Good Recycle Business Model 5

RFID Lab, Dept. IECS, FCU Good Recycle Business Model User needs to install RFID readers at home and provide profile information IoT business model: –Incremental –Fault tolerant –Scalability –Architecture reuse The main drawback: Sensible information 6

RFID Lab, Dept. IECS, FCU The Object-Oriented Middleware Traditional object-oriented middleware –A specification of the interfaces of all services –Implementation –Server Proposed platform –Identity of manufacturer within the product code in the RFID label –Interpret RFID identity and invoke the method 7

RFID Lab, Dept. IECS, FCU The Object-Oriented Middleware Architectural structure –Each entity has several input points and output points –Each entity also has a profile resolver in which other parties can get information related to the entity –A public key infrastructure protects the information –Inter-Domain Messaging(IDM) architecture IDM overlay architecture –IDM imposes a global hierarchical addressing scheme for objects –Any client is able to invoke any other remote party in the system –The required information: Object identifier, Product code, Owner –The readers can communicate to remote objects through an a embedded IDM router 8

RFID Lab, Dept. IECS, FCU The Object-Oriented Middleware 9

RFID Lab, Dept. IECS, FCU The Object-Oriented Middleware Identifiers –Manufacturer service identifier: It is an IDM address –Product kind identifier: A unique product number –Serial number: A unique serial number Product tracking protocol proposal –An event service: get product tracking –A query service: get information from other parties. 10

RFID Lab, Dept. IECS, FCU Conclusion This paper proposes an architecture for massive RFID product tracking The author of this article strongly believe that only by involving user, companies will be involved in IoT ecosystems. In the proposed business model a novel global tracking system for products is proposed, in which users could obtain benefits from recycle activities. 11

Benjamin Fabian, Tatiana Ermakova, and Cristian Müller IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 3, AUGUST 2012 SHARDIS: A Privacy-Enhanced Discovery Service for RFID-Based Product Information

RFID Lab, Dept. IECS, FCU Introduction The standardization of a global numbering scheme for physical objects, the Electronic Product Code (EPC) that is stored on RFID tags EPCglobal Network (EPCN) Discovery Services (DS) for the EPCN No official standard has been finalized No sufficient mechanisms to address the privacy requirements 13

RFID Lab, Dept. IECS, FCU Introduction (cont’d) SHARDIS –SHARDIS will be deployed as an infrastructure peer-to-peer (P2P) network –We provide end-to-end document authenticity and data origin authentication by digital signatures –SHARDIS as a cooperative industrial infrastructure network will in practice be based on cryptographically secured node identifiers SHARDIS address document 14

RFID Lab, Dept. IECS, FCU Shamir’s Secret-sharing Scheme 15

RFID Lab, Dept. IECS, FCU SHARDIS Architecture 16

RFID Lab, Dept. IECS, FCU SHARDIS Publishing Procedure 17

RFID Lab, Dept. IECS, FCU SHARDIS Publishing Procedure (cont’d) 18

RFID Lab, Dept. IECS, FCU SHARDIS Publishing Procedure (cont’d) 19

RFID Lab, Dept. IECS, FCU SHARDIS Lookup Procedure 20

RFID Lab, Dept. IECS, FCU SHARDIS Lookup Procedure (cont’d) 21

RFID Lab, Dept. IECS, FCU Reconstructing Multiple Documents 22

RFID Lab, Dept. IECS, FCU Conclusion This paper presented SHARDIS, a P2P-based discovery service architecture for the EPCglobal Network that enhances client privacy by applying secret-sharing on the information documents of interest Without needing key predistribution, making it suitable for flexible, open, and global application scenarios of RFID and the EPC framework 23

Dong Xie, Sheng Q.Z., Jiangang Ma 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A Temporal-based Model of Uncertain RFID Data

RFID Lab, Dept. IECS, FCU Introduction A storing RFID data model employs a triplet (EPC, reader-id, timestamp), which is not very effective –Insufficient data –Incomplete data –Massive data We propose a temporal-based data model of uncertain RFID data to capture uncertain RFID data and support complex queries 25

RFID Lab, Dept. IECS, FCU Temporal-Based Data Model 26 containmenthistory PK,FK1EPC tb te parent_epc OWNER

RFID Lab, Dept. IECS, FCU Querying Uncertain RFID Data Tracking Tracing 27

RFID Lab, Dept. IECS, FCU Conclusion This paper has identified several features of uncertain RFID data, and proposed a temporal-based data model for managing uncertain RFID data 28

RFID Lab, Dept. IECS, FCU My Comment 29

RFID Lab, Dept. IECS, FCU My Comment Third paper can use EPCglobal framework. 30