• Title/Summary/Keyword: 안전 태그

Search Result 246, Processing Time 0.032 seconds

A Study on Resolving Shadow Area of LoRa-based Communication for Workplace Safety (작업현장의 안전을 위한 LoRa기반 통신의 음영지역 해소를 위한 연구)

  • Kim, Seungyong;Kim, Dongsik;Hwang, Incheol;Kim, Kyoungsoo;Kim, Gyoungyong
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.402-410
    • /
    • 2020
  • Purpose: The purpose of this research is to eliminate communication shadowing loss of the 'smart safety management system'. The 'smart safety management system' can monitor and relay real time data of workers working in high risk workplace (i.e: industrial scene, disaster scene). The data will provide the rescue team the 'golden hour' in their rescue operations. Method: In this research, safety tag was designed and implemented so that it acts as a repeater for the user. Result: In other words, when communication in-between the safety tag and headquarters' communication terminal is jeopardized, the safety tag will act as a repeater-terminal for other safety tags in the area. Conclusion: The research tested if a specific building with communication shadowing loss problem was resolved when safety tags were implemented. Communication shadowing was first identified in-between the safety tag and headquarters' communication terminal. When extra safety tags were deployed in the same situation, the results showed that the communication shadowing loss was resolved. The repeater safety tags could resolve communication shadowing loss of up to three basement levels in this test building.

A Study on the Application of RFID Technique for Improving Small Vessel Safety Management System (소형선박 안전관리 개선을 위한 무선인식 (RFID)기술적용 시스템 구축방안 연구)

  • Jeong, Yong-Geun;Choi, Kyong-Il;Lee, Hee-Joon
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.28
    • /
    • pp.19-35
    • /
    • 2010
  • 본 연구에서는 2톤 미만 소형선박에 대한 효율적인 안전관리를 위하여 RFID(Radio Frequency IDentification)시스템의 실제 해양환경에서의 도입타당성을 검증하였다. 이를 위하여 FRP Fiber Glass Reinforced Plastic 선박을 중심으로 목선과 알루미늄선에 태그를 부착하고 이동형 Reader를 활용하여 태그정보를 확인하는 실제 해양환경 인식실험을 실시하였다. 해양환경 인식실험을 위하여 4종의 태그를 선정하였으며 다양한 각도에서 인식률 및 인식거리를 측정하여 그 특성을 파악하고자 하였다. 특히, 선박에 설치된 무선설비로 인한 전파장애, 염분, 수분, 온도 등 열악한 해양환경에서 무선인식(RFID)기술의 기술적 환경적 문제점 유무를 분석하였으며, 2톤 미만 소형선박 소유자의 편의성 제고를 위하여 유관기관과의 관련정보 공유를 통한 연계방안으로 무선인식(RFID)기술을 적용한 효율적인 선박안전관리체계 구축방안을 강구하여 선박등록 및 검사업무에서의 활용방안을 제시하였다.

  • PDF

A Tag Response Loss Detection Scheme for RFID Group Proof (RFID 그룹증명을 위한 응답손실 감지기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.637-645
    • /
    • 2019
  • The RFID group proof is an extension of the yoking proof proving that multiple tags are scanned by a reader simultaneously. Existing group proof schemes provide only delayed tag loss detection which detects loss of tag response in a verification phase. However, delayed tag loss detection is not suitable for real-time applications where tag loss must be detected immediately. In this study, I propose a tag response loss detection scheme which detects loss of tag response in the proof generation process quickly. In the proposed scheme, the tag responds with the sequence number assigned to the tag group, and the reader detects the loss of the tag response through the sequence number. Through an experiment for indistinguishability, I show that the sequence number is secure against an analyzing message attack to distinguish between specific tags and tag groups. In terms of efficiency, the proposed scheme requires fewer transmissions and database operations than existing techniques to determine which tags response is lost.

RFID Mutual Authentication Protocol on Insecure Channel for Improvement of ID Search (ID 검색 개선을 위한 비보호채널상의 RFID 상호인증 프로토콜)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.121-128
    • /
    • 2010
  • In this paper, we proposed a new secure RFID(Radio Frequency IDentification) mutual authentication protocol on insecure communication channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol used a secure one-way hash function and the goal is to improve search time of a tag ID and overload of hash calculational load in DB. In addition, the proposed protocol supports not only basic security requirements to be provided by RFID mutual authentication protocol but also forward secrecy, and the tag does not generate a random number to reduce overload of processing capacity in it.

RFID시스템환경에서의 안전성평가 필요성

  • Park, Ji-Yeong;Lee, Jong-Tae;Jo, Am
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2008.11a
    • /
    • pp.259-265
    • /
    • 2008
  • 최근 전자태그(RFID : Radio Frequency Identification)를 부착하여 비접촉식으로 다 양한 물품의 정보를 받아 물품의 추적 및 정보확인이 가능한 RFID 시스템을 작업현장에 도입/확산시키고자하는 연구들이 진행되어지고 있다. RFID 시스템은 무선인터페이스 환경에서 태그는 안테나에 정보를 담은 주파수를 보내고 있으며, 이 환경에서의 작업자는 주파수에 노출되어있다. 따라서 작업자 주파수에 노출되는 RFID 시스템 환경 에서 주파수가 작업자에게 미치는 영향에 대한 안전성평가가 필요하다.

  • PDF

A Study On A RFID Authentication Protocol Using Public Key Cryptography In Multi-Purpose Infrastructure (Multi-Purpose 구조에서 공개키 암호화를 이용한 RFID 인증 프로토콜에 관한 연구)

  • Shin, Ju-Seok;Yun, Tae-Jin;Park, Yong-Soo;Chung, Kyung-Ho;Ahn, Gwang-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1438-1441
    • /
    • 2009
  • RFID 시스템에서 태그는 객체를 유일하게 식별하기 위한 정보를 가지고 있기 때문에 개인정보의 노출, 위치 추적 등의 프라이버시 침해를 유발할 수 있는 문제점이 있다. 태그가 다양한 목적을 위해 사용되어지는 경우 키 분배, 키 관리 등의 문제로 인해 공개키 암호화 기법이 적용될 수 있다. 공개키 암호화 기법을 이용한 기존 RFID 인증 프로토콜에서는 서버와 태그 사이에 공개키를 사전에 공유하고 있다고 가정을 하여 설계를 하였다. 하지만 하나의 태그가 다양한 목적으로 사용되는 다목적 구조에서 수동형 RFID 태그가 서로 다른 서버의 공개키를 모두 공유한다는 것은 현실적으로 불가능하다. 본 논문에서는 다목적 구조에서 XOR 연산과 리더와 태그가 사전에 공유한 마스터 키($K_m$)를 사용하여 태그에게 공개키를 안전하게 전달하며 이를 이용한 공개키 암호화 기반의 RFID 인증 프로토콜을 제안한다. 또한 제안한 인증 프로토콜은 프라이버시 침해를 유발할 수 있는 도청, 재전송 공격, 위치 추적과 같은 공격에도 안전성을 보장한다.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system (데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜)

  • Kwon, Hye-Jin;Lee, Jae-Wook;Jeon, Dong-Ho;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.125-134
    • /
    • 2008
  • A great number of RFID authentication protocols have been proposed for the secure RFID system. These are typically divided into three types according to primitive that they use : Hash-based, Re-encryption based, and XORing-based protocol. The well-known attacks in RFID system are eavesdropping. impersonating, location tracking, and so on. However, existing protocols could not provide security against above attacks, or it was not efficient to search for tags on database. Therefore, in this paper we present a protocol which is secure against above attacks by using hash function and makes Database search tags easily by attaining the state information of previous session through the shared values with all tags and database.

A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy (이동형 리더의 프라이버시를 보호하는 안전하고 효율적인 RFID 태그 검색 프로토콜)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.109-117
    • /
    • 2010
  • Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.