Design of protocol for RFID/USN security

RFID/USN 보안을 위한 프로토콜 설계

  • Park, Sang-Hyun (Department of Computer Science & Engineering, University of Incheon) ;
  • Park, Sang-Min (Department of Industrial and Management Engineering, University of Incheon) ;
  • Shin, Seung-Ho (Department of Computer Science & Engineering, University of Incheon)
  • 박상현 (인천대학교 컴퓨터공학과) ;
  • 박상민 (인천대학교 산업경영학과) ;
  • 신승호 (인천대학교 컴퓨터공학과)
  • Published : 2007.06.30

Abstract

Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

Keywords

References

  1. 강달천, 주학수, 권혁조, '개인정보 보호를 위한 RFID 신뢰 확보가 중요하다', KISTI, (2004. 11)
  2. 조준혁, 'RFID 태그의 프라이버시를 위한 기술적인 접근', KISTI, (2005. 03)
  3. 유승화, 유비쿼터스 사회의 RFID, 전자신문사, (2005. 03) :59-60
  4. A.Perrig, R.Szewczyk, V.Wen, D.Culler, J.D.Tygar, 'SPINS : Security Protocols for Sensor Network', Wireless Networks Journal (WINET), 8(5) (Sep 2002) :521-534 https://doi.org/10.1023/A:1016598314198
  5. Klaus Finkenzeller, '유비쿼터스 컴퓨팅의 핵심 RFID HandBook,' 영진출판사, (2002)
  6. http://www.zigbee.org/en/index.asp, Zigbee 포럼
  7. 박창섭, '암호이론과 보안,' 대영사, (1999) :129-136
  8. IPV6포럼코리아, '차세대 인터넷 프로토콜 IPv6,' 다성출판사, (2002)
  9. 서운석, 신순자, 김유정, 신상철, '센서 네트워크 보안 프로토콜 소개와 향후 과제', 정보과학회지, (2004)
  10. 정보통신부, 'u-센서 네트워크구축 기본계획,' (2004. 02)
  11. 김광조, 'RFID/USN 정보보호 기술,' KISTI TTA 저널 95호, (2004)
  12. 조대진, 'RFID 이론과 응용,' 홍릉출판사, (2005) :3-4
  13. 조위덕, 이경전, 이호근, 권오병, 김경규, 이은종, '유비쿼터스 패러다임과 u-소사이어티,' JinhanM&B, (2006. 10) :91
  14. 이성재, 김학범, 염홍열, '무선 센서 네트워크를 이용한 무인 경비 시스템에서의 OMAC-SNEP 기술에 관한 연구,' 한국정보보호학회, 16(1), (2006) :105-114
  15. 정용진, 김종만, 김영필, 김성두, 이석용, 전신우, '스마트카드용 다원곡선 암호 알고리즘(ECC) 하드웨어 설계에 관한 연구,' 광운대학교, 정보통신부, (2001. 07)