簡易檢索 / 詳目顯示

研究生: 吳榮軒
Wu, Jung-Hsuan
論文名稱: 基於CAGI方案之車用電子裝置防盜機制
The CAGI Anti-Theft Mechanism for In-Vehicle Appliances
指導教授: 侯廷偉
Hou, Ting-Wei
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 40
中文關鍵詞: 防盜系統數位簽章金鑰管理電子控制裝置零件識別技術
外文關鍵詞: signature verification, component identification, key management, electric control equipment, anti-theft system
相關次數: 點閱:110下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本研究開發車用電子裝置群體識別技術(CAGI)應用於防盜系統上。它能提昇車用電子裝置的可靠性以避免遭到偷竊。本研究設計在車用電子裝置內,嵌入一個安全模組,當裝置開機時會先偵測車用環境是否合法才決定啟動。若未經授權移至其他車輛上將不能正常運作。本研究亦分別對汽車維修製造廠與汽車用品店設計出一套管理流程,經實驗證明各種流程的處理時間,在實驗平台工作頻率1.66GHz個人電腦和工作頻率933MHz的嵌入平台上,時間皆在0.5秒左右,對使用者不會造成太大的等待時間。

    A Car Appliance Component Identification (CAGI) scheme is proposed in this paper to support a mechanism to protect CAGI-based appliances from being stolen. The CAGI approach integrates a security module that provides authentication and controlling for each car appliance. Moving a car appliance with the security module to other vehicles without the permission will lead the one unable to work. The CAGI scheme also provides the management process of the car appliances for the car manufacturers or the car stores. The experimentation platforms are an 1.66GHz PC and a 933MHz embedded platform. The experiments proved that the processing times for various processes all were about 0.5 seconds. This result will not cause too much waiting time for users.

    中文摘要........................................................................................................................ i 英文摘要....................................................................................................................... ii 目錄.............................................................................................................................. iii 表目錄.......................................................................................................................... iv 圖目錄............................................................................................................................v 第一章 緒論..................................................................................................................1 1.1 研究動機.........................................................................................................1 1.2 研究背景.........................................................................................................2 1.3 研究目的.........................................................................................................4 1.4 研究貢獻.........................................................................................................5 第二章 情境與需求......................................................................................................6 2.1 供應鏈體系.....................................................................................................7 2.2 情境說明.........................................................................................................9 2.3 系統需求.......................................................................................................11 第三章 相關研究........................................................................................................13 3.1 代理人信任機制與軟體保護方法...............................................................13 3.2 車輛數位簽章協定.......................................................................................15 第四章 系統設計........................................................................................................17 4.1 例行性流程...................................................................................................17 4.2 初始化流程...................................................................................................19 4.3 管理議題.......................................................................................................23 第五章 實作................................................................................................................25 5.1 車用電子裝置架構.......................................................................................25 5.2 流程運作細節...............................................................................................27 5.3 評估...............................................................................................................33 第六章 討論................................................................................................................36 6.1 安全性分析...................................................................................................36 6.2 與其他防盜系統之比較...............................................................................37 第七章 結論與未來工作............................................................................................38 參考資料......................................................................................................................39

    [1] National Insurance Crime Bureau (NICB). Available: https://www.nicb.org
    [2] K. Lemke, A. R. Sadeghi, and C. Stüble, "An Open Approach for Designing Secure Electronic Immobilizers," in Proc. 1st Information Security Practice and Experience Conference (ISPEC), Singapore, Apr. 2005, pp. 230–242.
    [3] G. Jayendra, S. Kumarawadu and L. Meegahapola, "RFID-Based Anti-theft Auto Security System with an Immobilizer," in Proc. 2nd Int. Conf. Industrial and Information Systems (ICIIS), Sri Lanka, Aug. 2007, pp. 441–446.
    [4] 磯田直也, 榎吉政彥, 山本雅之, 車用之反竊盜裝置, 中華民國專利第500673號, 2002/09/01.
    [5] 程冠華, 概說Immobilizer, ValueParts Inc. 網址:http://www.valueparts.com.tw/articles/Immobilizer.html
    [6] A. Weimerskirch, C. Paar, and M. Wolf, "Cryptographic Component Identification: Enabler for Secure Vehicles," in Proc. IEEE 62nd Semiannual Vehicular Technology Conference (VTC), Dallas, Texas, USA, Sept. 2005, pp. 1227–1231.
    [7] 童元鍼, 巫金台, 林雲祺, 王文鴻, 廖永盛, 車輛防盜系統及方法, 中華民國專利第I262872號, 2006/10/01.
    [8] 鄭玉玲, 賴昌祈, 廖啟業, 張光耀, 張耿豪, 謝東明, 梁若玲, "高安全性硬體密碼加速器研發與應用", 影像與識別, vol. 5, no. 4, pp. 65-73, 民88.12. Available: www.cis.nctu.edu.tw/~ippr/Doc/Dec88/6.doc
    [9] M. Howard, P. Powell, and R. Vidgen, "Automotive Industry Information Systems: From Mass Production to Build-to-Order," Journal of Cases on Information Technology, vol. 7, no. 2, pp. 16–30, 2005.
    [10] S. Pearson, M. Casassamont, and M. Novoa, "Securing Information Transfer in Distributed Computing Environments," IEEE Security & Privacy, vol. 6, no. 1, pp. 34–42, Jan.-Feb. 2008.
    [11] A. Pfitzmann, B. Pfitzmann, M. Schunter, and M. Waidner, "Trusting mobile user devices and security modules," IEEE Computer, pp. 61–68, vol. 30, Feb. 1997.
    [12] M. Wolf, A. Weimerskirch, and T. Wollinger, "State of the Art: Embedding Security in Vehicles," EURASIP Journal on Embedded Systems, Article ID 74706, Vol. 2007, Apr. 2007.
    [13] B. Arazi, "Vehicular Implementations of Public Key Cryptographic Techniques," IEEE Trans. Vehicular Technology, pp. 646–653, vol. 40, no. 3, Aug. 1991.
    [14] W. Rankl and W. Effing, Smart Card Handbook, 3rd Ed., John Wiley & Sons Ltd., Jan. 2004.
    [15] Rex Mu, 黃正裕, 顧珀菁, "[愛車防盜]下一個就是你!汽車竊盜反制實戰," Car and Driver人車誌121期, 2007年11月號. Available: http://www.itry.com.tw/forum/viewtopic.php?p=4289
    [16] P. C. Wang, T. W. Hou, J. H. Wu, and B. C. Chen, "A Security Module for Car Appliances," International Journal of Mechanical Systems Science and Engineering (IJMSSE), pp.155–160 , vol. 1, no. 3, Summer 2007.

    下載圖示 校內:立即公開
    校外:2008-08-27公開
    QR CODE