• Title/Summary/Keyword: 태그 인증

Search Result 218, Processing Time 0.034 seconds

Enhanced Secure RFID Authentication Protocol with Searching Specific Tag (특정 태그 검색기능을 지원하는 향상된 안전성의 RFID 인증 프로토콜)

  • Ham, Hyoung-Min;Oh, Hee-Kuck;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1096-1099
    • /
    • 2008
  • 본 논문에서는 RFID시스템에서 일어날 수 있는 위험요소들을 나열하고, 이에 맞는 해결책으로 RFID 인증프로토콜을 제시하며, 일반적인 RFID 인증프로토콜에서 볼 수 없었던 RFID 검색 프로토콜에 관한 소개와 검색 프로토콜이 갖는 새로운 요구사항을 제시한다. 또한 기존에 제안된 RFID검색 프로토콜보다 향상된 보안성을 지원하는 프로토콜을 제안하며 앞으로 연구할 방향을 제시한다.

An Enhanced Forward Security on JK-RFID Authentication Protocol (JK-RFID 인증 프로토콜에 대한 개선된 전방향 안전성)

  • Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.161-168
    • /
    • 2011
  • In 2009, Jeon et al proposed the lightweight strong authentication and strong privacy protocol, where the tag requrires only simple bitwise operations and random number generator. JK-RFID authentication protocol provides strong security: eavesdropping, replay, spoofing, Location tracking, DoS attack and forward security. Nevertheless, this paper points out the vulnerability of the forward security and improve the process of key updating. As a result, proposes an enhanced JK-RFID authentication protocol providing forward security and verify its satisfaction. In addition, a security and an efficiency of the proposed scheme analyze. Since partial adjustments of the key updating operation in JK-RFID authentication protocol, our protocol improve the forward security.

A Study on Management Method of Infectious Wastes Applying RFID (감염성 폐기물 관리를 위한 RFID 적용에 관한 연구)

  • Joung, Lyang-Jae;Sung, Nak-Chang;Kang, Hean-Chan;Kang, Dae-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.63-72
    • /
    • 2007
  • Recently, as recognizing the risk about the infection of an infectious wastes, the problems about the management and treatment of the infectious wastes stand out socially. In this paper, as being possible monitoring whole processing from the origin of the infectious waste to the processing plant, using the RFID which is the kernel technology of the next generation, we tried to solve the second infection problem by inefficient treatment of the infectious wastes. Through the research suggesting in this paper, as storing and monitoring the procedural business articles and the problem about miss-writing and input error being found in management system like documentary writing by the existing manager and computation input by the web application, we can understand the management state, immediately. And the Bio information for the personal authentication is carried out through storing the feature vector calculation by the PCA algorithm, into the tag. It suggested more systematic and safer management plan than previous thing, as giving attention about the wastes to manager.

  • PDF

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Pole Information Management System using RFID (RFID를 이용한 전주 정보관리 시스템)

  • Lee, Jeong-Gu;Kim, Eun-Ju;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1367-1372
    • /
    • 2015
  • In this paper, we embed RFID tag into name plate of pole and store key value at its RFID tag in order to solve the problem for the management of name plate of pole, which identify by eyes of human for until now. The 900MHz RFID reader performs identification for stored key value, then its key value transmit into smart phone through Bluetooth. The smart phone transmit the key value into server through data communication network and receive again the necessary information after the authentication by the server. We develop pole information system that have such a structure.

A Lightweight RFID Authentication Protocol Based on Hash Chain (해시체인기반의 경량화 RFID 인증 프로토콜)

  • Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • It has been proposed that several RFID authentication protocols based on hash chain. Status based authentication protocol and challenge-response based authentication protocol are secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks but are vulnerable to Dos attacks. RFID authentication protocol with strong resistance against traceability and denial of service attack is secured against location tracking attack, spoofing attacks, replay attacks, DoS attacks but are vulnerable to traffic analysis attacks. The present study suggests a more secure and lightweight RFID authentication protocol which is combining the advantages of hash-chain authentication protocol and RFID authentication protocol with strong resistance against traceability and denial of service attack. The results of the secure analysts for a proposed protocol are illustrated that it is secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks, Dos attacks and is a lightweight operation between server and tag.

  • PDF

Flexible RFID의 기술 동향

  • 백경갑;주병권
    • Electrical & Electronic Materials
    • /
    • v.17 no.8
    • /
    • pp.20-24
    • /
    • 2004
  • 무선 인식기술이라고 불리는 RFID(Radio Frequency Identification) 기술은 RF 신호를 이용하여 객체들을 식별하는 비접촉 기술 중의 하나이다. RFID를 사용하여 대상을 인증하는 방법은 여러 가지가 있으나 일반적으로 안테나에 마이크로칩을 부착하여 제품 확인을 위한 일련번호나 다른 정보를 삽입하여 사용한다. RFID는 바코드나 적외선 시스템과 달리 리더와 태그(Tag)간에 가시선이 요구되지 않아 사람이 직접 작업하기 어려운 환경 등에 적합하며,바코드나 마그네틱 카드처럼 직접 스캐닝 할 필요가 없다. 특히, 인터넷의 지속적인 성장, RFID 태그 칩의 저가격 구현, 상품코드의 국제 표준화 등의 환경변화로 인해 RFID 기술은 다양한 산업분야에서 실용화를 가능하게 만들고 있다. 이러한 예로, TI, 히타치, 인피니온, 필립스와 같은 기업들은 내년 중으로 10센트 이하 가격대의 상용 RFID 칩을 출시한다는 계획을 세우고 있으며 2006년 정도면 바코드 수준의 원가 경쟁력이 확보될 것이라는 전망도 조심스럽게 제기되고 있다. 또한 2004년에는 유통분야에서 RFID의 시범 사업이 주류를 이룬 후 2005년부터는 본격적인 성장기에 돌입할 수 있을 것으로 기대된다.(중략)

  • PDF

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF