• 제목/요약/키워드: Hash-based RFID

검색결과 56건 처리시간 0.185초

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • 제12권5호
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

A Secure RFID Multi-Tag Search Protocol Without On-line Server (서버가 없는 환경에서 안전한 RFID 다중 태그 검색 프로토콜)

  • Lee, Jae-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권3호
    • /
    • pp.405-415
    • /
    • 2012
  • In many applications a reader needs to determine whether a particular tag exists within a group of tags without a server. This is referred to as serverless RFID tag searching. A few protocols for the serverless RFID searching are proposed but they are the single tag search protocol which can search a tag at one time. In this paper, we propose a multi-tag search protocol based on a hash function and a random number generator which can search some tags at one time. For this study, we introduce a protocol which can resolve the problem of synchronization of seeds when communication error occurs in the S3PR protocol[1], and propose a multi-tag search protocol which can reduce the communication overhead. The proposed protocol is secure against tracking attack, impersonation attack, replay attack and denial-of-service attack. This study will be the basis of research for multi-tag serach protocol.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제39B권12호
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.

A Hash based R-Tree for Fast Search of Mass Spatial Data (대용량 공간 데이터의 빠른 검색을 위한 해시 기반 R-Tree)

  • Kang, Hong-Koo;Kim, Joung-Joon;Shin, In-Su;Han, Ki-Joon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 한국GIS학회 2008년도 공동추계학술대회
    • /
    • pp.82-89
    • /
    • 2008
  • 최근, GIS 분야에서 RFID와 GPS 센서 같은 위치 및 공간 데이타를 포함하는 다양한 GeoSensor의 활용으로 수집되는 공간 데이타가 크게 증가하면서, 대용량 공간 데이타의 빠른 처리를 위한 공간 인덱스의 중요성이 높아지고 있다. 특히, 대표적인 공간 인덱스인 R-Tree를 기반으로 검색 성능을 높이기 위한 연구가 활발히 진행되고 있다. 그러나, 기존 연구는 R-Tree에서 노드의 MBR 간의 겹침이나 트리 높이를 어느 정도 줄임으로써 다소 검색 성능을 향상시켰지만, 트리 검색에서 발생하는 불필요한 노드 접근 비용 문제를 효율적으로 해결하지 못하고 있다. 본 논문에서는 이러한 문제를 해결하고 R-Tree에서 대용량 공간 데이타의 빠른 검색을 제공하는 인덱스인 HR-Tree(Hash based R-Tree)를 제시한다. HR-Tree는 트리 검색 없이 R-Tree 리프 노드를 직접 접근할 수 있는 해시 테이블을 이용함으로써 R-Tree의 검색 성능을 높인다. 해시 테이블은 데이타 영역을 차원에 따라 반복적으로 분할한 Partition과 대응되는 R-Tree 리프 노드의 MBR과 포인터들로 구성된다. 각 Partition은 생성 과정에서 고유의 식별 코드를 갖기 때문에 Partition 코드가 주어지면 해시 테이블에서 해당 레코드를 쉽게 접근할 수 있다. 또한, HR-Tree는 R-Tree구조의 변경없이 다양한 R-Tree 변형 구조에 쉽게 적용할 수 있는 장점이 있다. 마지막으로 실험을 통하여 HR-Tree의 우수성을 입증하였다.

  • PDF

Unproved Mutual Authentication Scheme based on Quadratic Residue for RFID (RFID를 위한 이차잉여 기반의 개선된 상호인증 기법)

  • Park, Han-Nah;Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제15권6호
    • /
    • pp.425-429
    • /
    • 2009
  • Recently, Chen et al.'s proposed mutual authentication scheme based on the quadratic resiidue, finding the squaring root problem, for avoiding exhaustive search on the server. But, if a malicious reader sends same random value, the tag is traced by an adversary. Moreover, there is realization problem because of its limited ability to compute squaring and hash function. In this paper, we analyze Chen et al.'s scheme and its weakness. Furthermore we present an improved mutual authentication scheme based on the quadratic residue which solves the tracing problem by generating random value on the tag and uses only squaring. We also make the scheme satisfy to forward secrecy without updating and synchronizing and avoid exhaustive search.

Blockchain-based Lightweight Mutual Authentication Protocol for IoT Systems

  • Choi, Wonseok;Kim, Sungsoo;Han, Kijun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제25권1호
    • /
    • pp.87-92
    • /
    • 2020
  • Various devices, which are powerful computer and low-performance sensors, is connected to IoT network. Accordingly, applying mutual authentication for devices and data encryption method are essential since illegal attacks are existing on the network. But cryptographic methods such as symmetric key and public key algorithms, hash function are not appropriate to low-performance devices. Therefore, this paper proposes blockchain-based lightweight IoT mutual authentication protocol for the low-performance devices.