• Title/Summary/Keyword: RFID 인증 시스템

Search Result 232, Processing Time 0.025 seconds

A Design of Lightweight RFID Authentication Protocol Errors Correction Using Re-Counter (재카운터를 이용해 오류를 수정하는 경량화 RFID 인증 프로토콜 설계)

  • OH, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.149-157
    • /
    • 2011
  • Passive tags are inferior to active tags in processing efficiency, so they have difficulty in largevolume processing. The proposed protocol reduces the volume of computation in passive tags and, at the same time, improves authentication for enhanced safety and security. That is, different from existing RFID protocols that return the same value even if an error happens when the reader reads a tag, the improved RFID security protocol returns a new value using a re-counter and processes the computation part of a tag in the reader or in a back.end system. Even if the information of a tag is acquired by an malicious way, it is not actual information but encrypted information that is not usable. In addition, even if tag information is read in sequence, it is changed in each read, so the protocol is safe from Location Tracking.

Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment (분산 데이터베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜)

  • Rhee Keun-Woo;Oh Dong-Kyu;Kwak Jin;Oh Soo-Hyun;Kim Seung-Joo;Won Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.309-316
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols To resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.

A RFID Multi-Authentication Method for Logistics Systems (물류 시스템에 적합한 RFID 다중 인증방법)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.313-319
    • /
    • 2009
  • Recently the RFID system, which can recognize multiple tags simultaneously through wireless communication, is emerging as a new technology that can replace the barcode system. Furthermore, related industries are carrying out active research on tags and authentication protocols with guaranteed security that are widely applicable to logistics, distribution, etc. The present study proposes a protocol with enhanced security by introducing the concept of RBAC to the authentication protocol, and a method with lower security for effective mass authentication. The proposed method is advantageous in that it guarantees security against spoofing attack, traffic analysis, replay attack, etc. based on hash function.

Hash-based Network Security Protocol For RFID Authentication (RFID 인증을 위한 해쉬함수 기반의 네트워크 보안 프로토콜)

  • Park Jong-Dae;Kim Hyun-Seok;Choi Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.298-300
    • /
    • 2006
  • RFID는 무선주파수를 이용하여 부착된 태그의 정보를 얻어올 수 있는 시스템이다. 향후에 바코드를 대체할 RFID는 식품,가전,출판,물류,재고관리,교통 등 우리생활의 전반에 걸쳐 사용될 획기적인 시스템이지만, 개인,상품 등의 프라이버시의 노출로 인한 심각한 문제가 발생될 소지가 있다. 이를 해결하기 위하여 암호화 기법, 해쉬 락 기법, 해쉬 체인 기법 등이 제안되었다. 본 논문에서는 기존에 제시되었던 인증기법들에 대해서 알아보고, 해쉬함수와 공통키를 이용하여 좀더 안전한 방법으로 리더와 태그간의 통신을 인증할 수 있는 프로토콜을 제안한다.

  • PDF

Real Time Security Authentication Protocol of RFID Tag & Reader (RFID 태그-리더에서의 실시간 보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Won-Ho;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.11a
    • /
    • pp.225-228
    • /
    • 2006
  • RFID 시스템에서 전자태그와 리더사이의 통신은 무선을 통해 이루어짐에 따라 현재 보안상 많은 취약점이 존재한다. 본 논문에서는 여러 보안 문제 중 프라이버시 보호를 위한 기존 기법의 취약점을 보완하여 태그가 리더로부터 수신한 난수로부터 매 세션마다 실시간으로 새로운 해쉬 함수를 생성하는 인증 프로토콜을 제안한다. 제안한 알고리즘은 RFID 무선 인증 시스템에서 다양한 유용성을 제공할 수 있으며, 기존의 알고리즘에 비해 계산량을 절감할 수 있는 장점이 있다. 또한 추후 예상되는 주변의 수많은 태그중 필요한 태그만 선별하여 사용하며, 시간 기반으로 불필요 태그의 동작을 종료시켜 서버부담을 줄이는 방법이 될 것으로 기대된다.

  • PDF

RFID Security Authentication Protocol Using Secret Key (비밀키를 이용한 RFID보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.218-221
    • /
    • 2007
  • RFID 시스템은 향후 바코드를 대체하고 우리 생활 전반에 걸쳐 사용될 획기적인 시스템 이지만 태그의 정보가 외부에 노출될 경우 심각한 문제가 발생 할 수 있다. RFID는 태그와 리더사이의 통신은 무선을 통해 이루어짐에 따라 보안상 많은 취약점이 존재한다. 본 논문에서는 여러 보안 문제중 프라이버시 보호를 위해 태그가 리더로부터 수신한 난수로부터 매 세션마다 비밀키 및 실시간으로 새로운 해쉬 함수를 생성하는 인증 프로토콜을 제안한다. 제안된 해쉬 기반 인증 프로토콜은 각종공격에 대해 안전하며 연산을 최소화하여 다양한 적용성을 제공한다.

  • PDF

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

A study of various attacks on the HB++ protocol for RFID (RFID를 위한 HB++ 프로토콜의 공격 방법 연구)

  • Shin, Soo-Yeon;Kwon, Tae-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.117-123
    • /
    • 2011
  • Lightweight authentication protocols are necessary in RFlD systems since a RFlD tag has computation constraints. Over recent years, many protocols have been proposed, In this paper, we examine the HB protocol and its variants, and their vulnerabilities to attacks, We analyze the problem of Piramuthu's attack on the HB++ protocol and propose solutions to it.

Improved RFID Authentication Protocol using Hash Lock (해쉬락을 이용한 개선된 RFID 인증 프로토콜)

  • Bae Woo-Sik;Jang Gun-Oh;Han Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.635-641
    • /
    • 2006
  • On the wireless-communication between Electronic Tag of RFID system and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash-lock related algorithm. This paper has presented the comparison and analysis of the established hash-lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real-time and every session. The algorithm suggested is able to make RFID wireless authentication system offer a several of usefulness and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses just the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' action with time based.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.