DOI QR코드

DOI QR Code

Security Authentication Technique using Hash Code in Wireless RFID Environments

무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안

  • 이철승 (광주여자대학교 교양과정부)
  • Received : 2019.10.06
  • Accepted : 2019.12.15
  • Published : 2019.12.31

Abstract

The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

컴퓨팅 기술과 네트워킹의 발달은 4차 산업혁명의 근본이 되는 기술로 발달하여, 유비쿼터스 환경을 제공하게 되었다. 유비쿼터스 환경에서는 각종 디바이스나 사물에 접근과 접속이 활발하게 진행될 수 있도록, 사물인터넷 환경이 이슈과 되고 있으며, 무선 식별코드를 사용하는 RFID 시스템은 RFID 태그를 사물에 장착하여 제품의 생산, 유통과 같은 SCM 관리에 매우 효율적으로 응용되고 있다. EPCglobal에서 RFID 시스템 표준화 연구와 각종 보안 연구를 진행하고 있다. RFID 시스템은 무선 환경기술을 사용하기 때문에 유선상의 문제점보다 더 많은 보안 위협요소가 존재하게 된다. 특히, 기밀성, 불구분성, 전방향 안전성을 제공하지 못한다면 4차 산업혁명 시대에 각종 위협에 노출될 수 있을 것이다. 이에 본 연구는 EPCgolbal의 표준방법을 분석하고, 연산량을 고려할 수 있는 해시코드를 이용한 RFID 보안 기법을 제안한다.

Keywords

References

  1. J. Jung, H. Lee, and Y. Kim, "High Speed Collision Avoidance Algorithm for Active RFID Network System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 581-590. https://doi.org/10.13067/JKIECS.2016.11.6.581
  2. R. Weinstein, "A Technical Overview and Its Application to the Enterprise," IT Professional, IEEE Computer Society, vol. 7, issue 3, June 2005, pp. 27-33. https://doi.org/10.1109/MITP.2005.69
  3. H. Chow, K. Choy, W. Lee, and K. Laub, "Design of a RFID case-based Resource Management System for Warehouse Operations," J. of International Expert System with Applications, vol. 20, issue 4, May 2006, pp. 561-576.
  4. C. Floerkemeier, D. Anarkat, T. Osinski, and M. Harrison, "PML Core Specification 1.0," Auto-ID Center Recommendation, Sept. 2003, pp. 5-25.
  5. U. Karthaus and M. Fischer, "Fully integrated passive UHF RFID transponder IC with 16.7-uW minimum RF input power," J. of IEEE Journal for Solid-state Circuits, vol. 38, no. 10, Oct. 2003, pp. 1602-1608. https://doi.org/10.1109/JSSC.2003.817249
  6. H. Yoon, M. Mohaisen, K. Chang, J. Bae, and G. Choi, "Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System," J. of Korean Institute of Electromagnetic and Engineering and Science, vol. 18, no. 124, 2007, pp. 1047-1056. https://doi.org/10.5515/KJKIEES.2007.18.9.1047
  7. K. Han and G. Yim, "Design of an RFID Authentication Protocol Using Nonlinear Tent-Map," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 10, Aug. 2014, pp. 1145-1152. https://doi.org/10.13067/JKIECS.2014.9.10.1145
  8. C. Lee "A Study on Effective using Security Routing based on Mobile Ad-hoc Networks," Int. J. of Security and Its Application, vol. 9, no. 7, 2015, pp. 141-152. https://doi.org/10.14257/ijsia.2015.9.7.13
  9. C. Lee "Security Authentication Technique using Hash Code in Wireless RFID Environments," Int. J. of Grid and Distributed Computing, vol. 11, no. 10, 2018, pp. 93-102. https://doi.org/10.14257/ijgdc.2018.11.10.08