• Title/Summary/Keyword: RFID 인증 시스템

Search Result 232, Processing Time 0.023 seconds

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF

Study on RFID Mutual Authentication Protocol Using Finite Field (유한체를 사용한 RFID 상호인증 프로토콜 연구)

  • Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.31-37
    • /
    • 2007
  • There are many investigations about the security on RFID system to protect privacy. It is important to mutual authentication of the security on RFID system. The protocol for mutual authentication use light-weight operation such as XOR operation, hash function and re-encryption. However, the protocol for authentication and privacy is required more complicated cryptography system. In this paper, we propose a mutual authentication protocol using finite field GF($2^n$) for a authentication and are a safety analysis about various attacks.

  • PDF

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

A study on the matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜에 관한 연구)

  • Shin, Hyo-Young;Jung, Kye-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.800-803
    • /
    • 2012
  • Recently, research on security of RFID system has been conducted actively in order to utilize RFID system in various fields including distribution and logistics. This paper suggests an authentication protocol which supplement the flaws of previous RFID authentication protocols and we improved its performance using matrix-based authentication. The suggested authentication protocol provides mutual authentication, protects from wiretapping attack, replay attack, spoofing attack, and traffic analysis attack and so on, and reduces overload of back-end database so that has efficient performance.

  • PDF

Patient Authentication System for Medical Information Security using RFID (의료정보보호를 위한 RFID를 이용한 환자 인증 시스템)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.962-969
    • /
    • 2010
  • Recently, RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. In this paper, we propose a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations. The proposed system consists of RFID-based patient authentication protocol and database security protocol. As a result, since the proposed RFID authentication system provides strong security and efficiency, it can be used practically for patient authentication and personal medical information protection on the high technology medical environments such as u-Hospital and u-Healthcare.

Adult Certification System on Mobile RFID Service Environments (모바일 RFID 서비스 환경에서의 성인 인증 시스템)

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.131-138
    • /
    • 2009
  • This paper is about adult certification on Mobile RFID Service Environments coming through the combination of RFID(Radio Frequency IDentification) technology, as the core technology of ubiquitous environments, and mobile telecommunication technology. To overcome the shortcoming of simple adult certification on current internet, we suggest a framework for content-based classification and propose an adult certification system using it. At first, we explain conventional methods for adult certification, and show a criteria of content-based classification for preventing an exposure of adult contents from minors. Additionally, we describe data structure and system for the proposed adult certification on mobile RFID environment, and finish it with concluding remarks.

A Direction-Decision RFID System with a Authentication (인증 기능을 갖는 방향 결정 자율이동 RFID 시스템)

  • Park, Chul-Min;Jo, Heung-Kuk;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1032-1038
    • /
    • 2008
  • RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

RFID Tag and Entrance Confirmantion System Using Real-Time Object Extraction and Tracking (RFID 태그와 실시간 객체인식을 이용한 출입인증 시스템)

  • Jung Yonghoon;Lee Changsoo;Kim Jungjae;Jun Moonseog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.25-27
    • /
    • 2005
  • 본 논문에서 제안하는 시스템은 기존의 RFID System의 보안성을 높이기 위하여 2단계 인증처리를 통하여 안전성을 더 확보할 수 있게 되었다. 제안하는 시스템은 RFID Tag 인증 후 사용자의 추가적인 인증정보의 획득을 카메라를 통하여 사용자의 영상특징정보를 추출한다. 본 논문에서는 빠른 인증과 검색을 위하여 이미지 영역별 색상특징정보를 사용하여 추가적인 인증과정을 수행하게 된다. 제안하는 시스템을 실험한 결과 RFID Tag와 색상특징정보를 사용하여 출입인증을 하였을 경우 단일한 인증처리 시스템보다 정확한 결과를 얻을 수 있었다.

  • PDF

RFID Authentication Protocol using Polynomial Hash Function (다항식 해쉬함수를 이용한 RFID 인증 프로토콜)

  • Yon, Yong-Ho;Lee, Sun-Yong;Lee, Jong-Yun;Shin, Moon-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.742-745
    • /
    • 2009
  • RFID 시스템은 RFID 태그, RFID 리더, Back-end 서버로 이루어져서 짧은 거리의 무선통신을 통해 정보를 인식하는 시스템이다. 최근 RFID기술은 다양한 응용 분야에서 활용되고 있으며 보안과 프라이버시 침해에 대한 우려와 문제점을 해결해야한다는 논의가 높아지고 있다. 본 논문에서는 중간자 공격 및 재생공격에 대응할 수 있는 다항식 해쉬함수를 이용한 강력한 상호인증 프로토콜을 제안한다. 본 논문에서는 대량의 RFID 태그와 리더간 상호인증을 위해 다항식을 이용한 해쉬함수를 적용한다. 제안된 다항식 해쉬함수를 적용한 RFID 인증 프로토콜은 전체 시스템에 부담을 주지 않으면서 보안강화를 할 수 있는 인증 프로토콜이며 특히 태그 쪽에 컴퓨팅 오버헤드가 추가되지 않는다. 또한 공격자에게 공격이 어렵거나 불가능한 복잡도를 가지는 프로토콜이다.

  • PDF