• Title/Summary/Keyword: RFID Access Control

Search Result 62, Processing Time 0.021 seconds

A Study of RFID Access Control Security Model (RFID Access Control 보안 모델에 관한 연구)

  • Han, Dong-Hee;Kim, Dong-Jin;Kim, Soo-Hong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.293-296
    • /
    • 2007
  • RFID는 유비쿼터스 환경 구축에 있어 가장 큰 비중을 차지하고 있다. 하지만 이에 따른 RFID에 저장된 개인정보 유출과 이를 오남용하는 문제에 대해 많은 비판들이 쏟아져 나오고 있으며 이에 대한 보안기술에 많은 관심이 모아지고 있다. 본 논문에서는 이러한 RFID의 보안모델 중 Access Control 기존 모델과 이를 보안한 RFID 2중 Access Control 보안모델을 제안한다. 2중 Access control모델은 기존 Hash-lock Access나 Hash-chain Method모델과 비슷한 구조를 가지고 있으나 도청에 의한 키값 노출에 대한 보안성을 가지고 있으며 Tag인증에 대한 값을 계속 변화 시켜 2중으로 Access Control에 대한 인증 정보를 보안하는 구조이다.

  • PDF

RFID Access Control Using Extended Usage Control Model (확장된 사용 제어 모델을 이용한 RFID 접근 제어)

  • Shin, Woo-Chul;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.127-144
    • /
    • 2007
  • This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.

  • PDF

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF

A GateSensor for Effective and Efficient Entering/Taking Management of Vehicles for Construction Logistics (건설 자재 반출입 차량 관리 효율화를 위한 게이트센서)

  • Yoon, Su-Won;Song, Jae-Hong;Shin, Tae-Hong;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.1
    • /
    • pp.85-96
    • /
    • 2011
  • The access monitoring and control system of vehicles involved in construction logistics has been evolved from paper-based through bar code-based and to RFID-based management with pursuing automatic data collection and management. However, existing management methods have a limit that they still need manpower allocation for access control of vehicles. Therefore this research has proposed an framework that includes devices and an information system for effective and efficient data collection for access control of vehicles for construction logistics. And the proposed framework has been verified through a laboratory test using a prototype system developed in this research. It is expected that the installation methods of RFID antenna and tag for the framework could be applied to not only the access control of construction site but also various RFID applications at construction sites.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.

Concurrency Control of RFID Tag Operations for Consistent Tag Memory Accesses (RFID 태그 메모리 접근의 일관성을 위한 태그 연산의 동시성 제어)

  • Ryu, Woo-Seok;Hong, Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.171-175
    • /
    • 2010
  • This paper analyzes the tag data inconsistency problem caused by incomplete execution of the tag access operation to the RFID tag's memory and proposes a protocol to control consistent tag data accesses with finalizing the incomplete operation. Passive RFID tag cannot guarantee complete execution of the tag access operations because of uncertainty and unexpected disconnection of RF communications. This leads to the tag data inconsistency problem. To handle this, we propose a concurrency control protocol which defines incomplete tag operations as continuous queries and monitors the tags're-observation continuously. The protocol finalizes the incomplete operation when the tag is re-observed while it blocks inconsistent data accesses from other operations. We justify the proposed protocol by analyzing the completeness and consistency. The experiments show that the protocol shows better performance than the traditional lock-based concurrency control protocol.

Implementation of Access Control System Based on CAN Communication (CAN통신 기반 출입 통제 시스템 구현)

  • Song, Jongkwan;Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.951-956
    • /
    • 2011
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic breaking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control etc., for large ship. In this paper, cabin access control system is implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system carry CAN frames to server, so it is used as gateway.

Implementation Access Control System Based on CAN Communication (CAN통신 기반 출입통제 시스템 구현)

  • Song, Chong-kwan;Park, Jang-sik;Kim, Hyun-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.467-470
    • /
    • 2009
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic braking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control, etc. for large ship. In this paper, cabin access control system can be implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system can carry CAN frames to server, so it can be used as gateway.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Reader Collision Avoidance Scheme for Mobile RFID-Sensor Integrated Networks

  • Ko, Doo-Hyun;Kim, Song-Min;Lee, Sang-Bin;An, Sun-Shin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.108-117
    • /
    • 2009
  • In recent years, one of alternatives for constructing RFID networks that provide mobile services is using wireless sensor networks (WSN) to enhance network capacity, utility and scalability. Due to absence of compatible reader anti-collision control and channel capture phenomenon, the medium access control protocols as used in the RFID networks lead to reader collision and starvation problem. In this paper, we develop a MAC protocol which is called Enhanced Collision Avoidance MAC (ECO) to avoid reader to reader collisions in an integrated RFID network. ECO is a CSMA-based MAC protocol, and operates on integrated nodes which consist of a RFID reader and a mote. Performance evaluation shows superior results to pure-CSMA protocols under dense deployment environments, both in number of failures and in throughput.

  • PDF