• Title/Summary/Keyword: 태그 데이터 전송 프로토콜

Search Result 20, Processing Time 0.023 seconds

Authentication Protocol of Private Code-based for Advanced Security of RFID System (RFID 시스템 보안 강화를 위한 비공개 코드 기반의 인증 프로토콜)

  • Jang, Bong-Im;Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.737-744
    • /
    • 2010
  • The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.

Improved Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 개선된 RFID 인증 프로토콜)

  • Oh, Sejin;Lee, Changhee;Yun, Taejin;Chung, Kyungho;Ahn, Kwangseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.12-18
    • /
    • 2013
  • In 2012, Woosik Bae proposed a DAP3-RS(Design of Authentication Protocol for Privacy Protection in RFID Systems) using the hash function and AES(Advanced Encryption Standard) algorithm to hide Tag's identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with the DAP3-RS.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.

Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics (글로벌 해운물류 실시간 위치 추적 시뮬레이션 시스템 개발)

  • Park, Byung-Kwon;Choi, Hyung-Rim;Kim, Chae-Soo;Lee, Kang-bae;Park, Min-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1235-1242
    • /
    • 2015
  • In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.

Development of Embedded RFID R/W System based on Wibro for Constructing u-Transportation (u-Transportation 구축을 위한 교통카드 연동 Wibro 기반 임베디드 RFID R/W 시스템 개발)

  • Chang, Won-Tae;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.459-462
    • /
    • 2008
  • By using RFID technology in order to manage public traffic management, RFID system and middleware software with PXA255 ARM chip is developed and is capable of operating the traffic card. The developed RFID system consists of 13.56MHz RFID R/W, wireless LAN (IEEE802.11.a/b), Wibro (IEEE802.16), TFT-LCD to display information, and embedded system to collect a charge information, etc. By applying developed system, basic infra-structure capable of supporting various service of u-Traffic can be effectively applied.

  • PDF

Design and Implementation of Mobile RFID Middleware Modules for the Mobile Environments (모바일 환경을 위한 모바일 RFID 미들웨어 모듈 설계 및 구현)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.10-18
    • /
    • 2008
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement a mobile RFID middleware system that supports the mobile handset environment for real-time based processing of the necessary data in the mobile environment. The proposed mobile RFID middleware system includes a mobile reader interface that collects the tag data, a mobile filtering engine that processes the tag data into more meaningful data that is sent to the application interface, and finally the mobile application interface that supports the m-SOAP application access protocol for interfacing with existing mobile applications. The filtering speed of the newly-developed middleware engine was found to be suitable for the characteristics of mobile handsets.

A Brief Introduction of A New Communication Architecture in Substation Automation System (변전소 자동화 시스템에 적용되는 새로운 통신 아키텍처에 관한 고찰)

  • You, Jeong-Sik;Choi, Dae-Hee;Kim, Hyung-Geun;Kim, Hong-Seok;Lee, Hak-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.180-182
    • /
    • 2002
  • 전력 시장의 자율 경쟁체제가 본격화되면서 기존 공급자 중심의 시장은 급격하게 사용자 중심의 시장으로 재편되어 가고 있다. 기존의 최소한의 '데이터'라는 개념은 최대한의 '정보'라는 개념으로 변화되었다. 정보의 신속하고 효율적인 관리는 변전소 자동화 시스템의 핵심 전략이자 이를 기반으로 한 전력 시스템의 IT화를 가속화시키는 원동력이 되었다. 외국의 경우 1990년대 초에 등장한 UCA2(Utility Communication Architecture)를 기반으로 한 IEC 61850(Communication Networks and systems in substation)이라는 새로운 통신 아키텍처의 도입을 서두르고 있다. IEC 61850은 IEC에서 추진중인 표준화작업의 일환으로 기존의 포인트와 태그(address) 중심의 전력 SCADA 시스템과는 달리 디바이스 및 관련 정보를 데이터 클래스 모델링을 통해 객체화하고 이 표준 객체를 통해 공통의 언어로 통신을 하는 방식으로 wire 중심이 아닌 bus 중심의 통신 방식(Ethernet)을 채용하여 대용량 정보의 실시간 전송 및 이기종간 통신이 가능한 장점을 가지고 있다. 본 논문에서는 IEC 61850을 중심으로 변전소 자동화 시스템 및 전력 시스템의 IT화와 관련된 표준 통신 프로토콜들을 소개하고 전력시스템과 변전소 환경이라는 특수 상황을 고려하여 새롭게 등장한 아키텍처의 특징을 살펴본다.

  • PDF

A Study on the Implementation and Performance Analysis of 900 MHz RFID System with Convolution Coding (콘벌루션 부호를 적용한 900MHz 대역 RFID 시스템 구현 및 성능 분석에 관한 연구)

  • Yun Sung-Ki;Kang Byeong-Gwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.1
    • /
    • pp.17-23
    • /
    • 2006
  • In recent years, RFID has received much attention because of spread usage in industrial applications including factory, material flow, logistics and defense areas. However, there is only CRC-16 for error detection in ISO/IEC 18000-6 Protocols prepared for 860-960 MHz RFID, high error rates are expected in cases of high level of security and noisy envirionment. In this paper, we propose a usage of convolution code as a method for satisfying the high level of security requirement and system error performance.'1'he signal control function is implemented in a microprocessor with RF modulation and the convolutional encoding and Viterbi decoding are implemented in an FPGA chip.'The frame error rates are measured with and without convolution coding under the channel conditions of line-of- sight and non line-of-sight, respectively.

  • PDF

Ubiquitous u-Health System using RFID & ZigBee (RFID와 ZigBee를 이용한 유비쿼터스 u-Health 시스템 구현)

  • Kim Jin-Tai;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.79-88
    • /
    • 2006
  • In this paper, we designed and implemented ubiquitous u-Health system using RFE and ZigBee. We made a wireless protocol Kit which combines RFE Tag recognition and ZigBee data communication capability. The software is designed and developed on the TinyOS. Wireless communication technologies which hold multi-protocol stacks with RFID and result in the wireless ubiquitous world could be Bluetooth, ZigBee, 802.11x WLAN and so on. The environments that the suggested u-Health system may be used is un-manned nursing, which would be utilized in dense sensor networks such as a hospital. The the size of devices with RFID and ZigBee will be so smaller and smaller as a bracelet, a wrist watch and a ring. The combined wireless RFID-ZigBee system could be applied to applications which requires some actions corresponding to the collected (or sensed) information in WBAN(Wireless Body Area Network) and/or WPAN(Wireless Person Area Network). The proposed ubiquitous u-Health system displays some text-type alert message on LCD which is attached to the system or gives voice alert message to the adequate node users. RFE will be used as various combinations with other wireless technologies for some application-specific purposes.