• Title/Summary/Keyword: 저가 RFID 태그

Search Result 97, Processing Time 0.031 seconds

저가의 RFID 태그에 적합한 암호알고리즘 구현 환경에 대한 고찰

  • 장환석;박해룡;천동현;전길수;송정환
    • Review of KIISC
    • /
    • v.15 no.4
    • /
    • pp.72-79
    • /
    • 2005
  • 지금까지 개발된 암호원천기술들이 RFID 태그와 같은 매우 제한된 환경에 맞춰 개발된 사례는 찾기 힘들다. 물론 기존 암호원천기술들이 지향해 온 방향이 초고속화 등에 집중되어 있어, 작은 구현 면적이나 낮은 전력 소비에 맞춰 구현된 시도가 있을 수 있으나, 아직까지는 기존의 알려진 암호원천기술을 RFID 태그와 같은 환경에 적용하기는 어렵다고 보여 진다. 그러므로 현재 활용할 수 있는 태그에 탑재 가능한, 기존 암호원천기술들의 안전성을 유지하며, 경량화 되고 저전력을 소비하는 암호원천기술의 개발이 절실히 필요하다. 이를 위한 사전 단계로 본 논문에서는 상업성을 고려한 RFID 태그의 환경에서 보안을 위해 허용되는 구현 면적, 전력 소비량 등과 암호원천기술이 태그에 사용되기 위해 고려되어야 하는 사항들을 도출한다.

An RFID Authentication Protocol for Hotlisting and Tracking Prevention (Hotlisting과 Tracking 방지를 위한 RFID인증 프로토콜에 관한 연구)

  • Keum Jun-Kyu;Lee Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.951-954
    • /
    • 2006
  • RFID시스템은 태그와 리더, 백엔드DB로 구성되는 무선인식시스템으로 용도와 기능, 크기에 따라 다양하지만 가장 널리 사용될 것으로 예상되는 것은 저가 수동형 태그로 향후 바코드시스템을 대체할 것으로 기대된다. 이러한 RFID시스템은 적법한 리더와 태그에게 정보를 전달해서 도청자로부터 통신을 방해받지 않아야 하고, 원하지 않는 태그 정보의 노출로 인한 개인 프라이버시 침해를 방지할 수 있어야 한다. 본 논문에서는 불특정다수가 이용하는 많은 양의 아이템을 취급하는 공공도서관에서 RFID시스템을 도입함에 따라 예상되는 개인 프라이버시 침해를 방지하기 위해 보안 요구사항을 만족하면서 시스템 사용 환경에 맞는 프라이버시 보호 방식을 제안한다.

  • PDF

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

A Dynamic ID Allocation Protocol for High-Performance RFID Tag (고기능 RFID 태그를 위한 동적 ID 할당 프로토콜)

  • Park Jin-Sung;Choi Myung-Ryul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

Implementation of an Efficient Slotted CSMA/CA Anti-collision Protocol for Active RFID System (능동형 RFID 시스템을 위한 효율적인 Slotted CSMA/CA 충돌방지 프로토콜의 구현)

  • Joo, Jin-Hoon;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1013-1022
    • /
    • 2012
  • Tag collection is one of the major concerns in radio frequency identification(RFID) system. All tags in RFID reader's transmission range send response message back to the reader in response to collection request message on the given rf channel. When multiple tags respond simultaneously, tag-collision may occur. Tag-collision problem is one of the most important issues in active RFID performance. To mitigate this problem, frame slotted ALOHA(FSA) anti-collision protocol is widely used in active RFID system. Several studies show that the maximum system efficiency of FSA anti-collision protocol is 36.8%. In this paper, we propose an efficient slotted CSMA/CA protocol to improve tag collection performance. We compare our protocol to the FSA anti-collision protocol. For the experiment, an 433MHz active RFID system is implemented, which is composed of an RFID reader and multiple tags. We evaluated the tag collection performance using one RFID reader and 40 tags in the real test bed. The experimental result shows that proposed protocol improves the tag collection time, round and collision probability by 18%, 37.4% and 77.8%, respectively.

RFID Security Agent (RFID 보안 에이전트)

  • Park, Hye-Young;Kim, Sung-Hun;Park, Chang-Yun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.106-108
    • /
    • 2005
  • 본 논문에서는 현 RFID 시스템에 도입이 가능하고 저등급의 태그도 보호할 수 있는 보안 에이전트를 제안한다. 보안 에이전트는 태그를 대신하여 보안 모듈을 수행하는 구성요소로서 등록된 태그만을 대상으로 이 작업을 수행하게 되는데 보안 에이전트의 보호 범위에는 보호 대상인 태그와 보호대상이 아닌 태그가 존재하기 때문에, 이를 구별하여 보안 모듈을 수행할 수 있는 알고리즘이 필요하다. 보안 모듈 중 가장 간단한 블로킹 기법을 채택하여, 선택적으로 보호 대상인 태그만을 블로킹하는 알고리즘을 설명한다. 보안 에이전트는 추가 구성요소로 동작하기 때문에 현재 RFID 시스템의 변경 없이 도입 가능하여 초기 도입 비용이 적게 들고 사용자가 요구하고 있는 프라이버시 문제를 명쾌하게 해결할 수 있어 RFID 상용화에 이바지할 수 있을 것이라 생각된다.

  • PDF

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.

Design of UHF RFID Tag Considering Chip Characteristic (칩 특성을 고려한 UHF RFID 태그 설계)

  • Lee, Hong-Joo;Hwang, Gun-Yong;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.194-200
    • /
    • 2011
  • Recently, RFID(Radio Frequency IDentification) market spread in industry region is entering a phase of stagnation due to cost issue. RFID tag inlay cost has become relatively more expensive due to the recent decrease in chip price. Therefore, a simple and rapid design technique for RFID tag has yet to be implemented to achieve low cost. This paper presents a design technique considering chip impedance for antenna design for improved accuracy and computation time. As a result, it is confirmed that analysis error for resonance ranges within 20MHz and readable range error falls within 1.5m.