• Title/Summary/Keyword: 안전 태그

Search Result 246, Processing Time 0.029 seconds

A Study on Hybrid Track Circuit Tag Recognition Enhancement (하이브리드 궤도회로 태그 인식율 향상에 관한 연구)

  • Yang, Dong-In;Li, Chang-Long;Jin, Zhe-Huan;Lee, Key-Seo;Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.537-542
    • /
    • 2014
  • Track circuit is a simple electrical device which lies in the connection of the two rails by the wheels and axle of locomotives and rolling stock to short out an electrical circuit, used to detect the absence of a train on rail tracks. In railway signaling system, there are similar systems such as RFID and wheel sensor, GPS etc, are research and developing. Hybrid track circuit is using RFID antenna and reader on the cab and RFID tag on the sleeper. because of the safety in railway operation, tag detection of train position detection function in the hybrid track circuit needs high reliability. This paper studied tag recognition enhancement used tag angles.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Implementation of Tag Identification Process Model with Scalability for RFID Protecting Privacy on the Grid Environment (그리드환경에서 RFID 프라이버시 보호를 위한 확장성있는 태그판별처리 모델 구현)

  • Shin, Myeong Sook;Lee, Joon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.1
    • /
    • pp.81-87
    • /
    • 2009
  • Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, in this paper we apply the previous method into the grid environment by analyzing Hash-Chain scheme in order to reduce processing time when Tags are identified. We'll implement the process by offering Tag Identification Process Model to divide SPs evenly by node.

  • PDF

Design of Improvement Authentication Protocol for Low-Cost RFID (저가형 RFID를 위한 개선된 인증 프로토콜 설계)

  • Yang Jin-Hee;Yang Sung-Hoon;Kim Jin-Bo;Kim Mi-Sun;Jung Seok-Won;Seo Jae-Hyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.731-734
    • /
    • 2006
  • RFID(Radio Frequency Identification)는 무선 주파수를 이용하여 물리적인 접촉 없이 개체에 대한 정보를 읽거나 기록하는 자동인식 기술이다. 그러나 RFID의 특성으로 인하여 사용자의 프라이버시 침해가 발생하면서 이를 해결하기 위한 많은 프로토콜들이 제안되었으나 공격자의 여러 공격 형태로 인하여 많은 취약점이 발생하였다. 최근 저가형 RFID를 위한 효율적인 인증프로토콜이 제안되었으나 공격자의 불법적인 태그에 대해 인증이 가능한 문제점을 해결하는 연구가 요구된다. 본 논문에서 제안된 프로토콜은 기존의 인증 프로토콜에서 리더에게 역할을 부여함으로써 처음 생산된 태그에 대해서도 위조된 태그의 인증이 불가능하다. 또한 연산량이 적은 장점과 더욱 강화된 보안성으로 인하여 안전하고 효율적인 저가의 RFID 태그에 적용이 가능할 것이다.

  • PDF

A Randomized Hash-Based Interactive RFID Authentication Protocol against Spoofing Attack (스푸핑 공격에 안전한 랜덤 해쉬기반 양방향 RFID 인증 프로토콜)

  • Lee Jong-Ha;Nam Kil-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.1-3
    • /
    • 2005
  • 기존의 RFID 인증 프로토콜은 트래킹 공격이나 스푸핑 공격에 취약하다는 단점을 가지고 있다. 특히 해쉬기반이나 랜덤 해쉬기반 RFID 인증 프로토콜은 스푸핑 공격으로 인하여 태그와 리더간의 인증이 안전하지 못한 프로토콜이며 해쉬체인 RFID 인증 프로토콜은 리더인증이 곤란한 일방향 인증 프로토콜이다. 본 논문에서 제안하는 프로토콜은 해쉬함수와 RNG(난수생성기)만을 사용하기 때문에 저가의 수동형 RFID 시스템에서 구현이 가능할 뿐만 아니라, 트래킹 공격과 스푸핑 공격에 안전하고, 태그와 리더간의 양방향 인증이 가능한 RFID 인증 프로토콜이다.

  • PDF

A Study on RFID-based Secure Deivces Authentication Protocol (RFID에 기반한 안전한 디바이스 인증 프로토콜에 관한 연구)

  • Park, Jang-Su;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1151-1154
    • /
    • 2005
  • 최근 유비쿼터스(Ubiquitous)환경에서의 핵심 요소 기술로 RFID는 중요한 위치를 차지하고 있다. 이로 인해 RFID에 대해서 많은 연구가 진행되고 있으며, 다양한 분야에서 새로운 시장을 형성해 나갈 것으로 예측된다. 그러나 RFID 태그는 식별 정보가 쉽게 식별되는 기본적인 특징으로 인해 사용자의 프라이버시 침해 위협이 발생할 수 있다. 따라서 본 논문에서는 이러한 취약점을 해결하기 위해 RFID 시스템에서 사용자의 프라이버시를 보장하며, 안전하게 인증할 수 있는 방안에 대하여 연구를 수행하고자 한다. 제안방식은 저가의 RFID 태그에 기반한 디바이스들 사이에서 인증 프로토콜로써 안전하고 효율적인 장점을 갖는다.

  • PDF

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.