• Title/Summary/Keyword: RFID Access Control

Search Result 62, Processing Time 0.026 seconds

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

A Study of Guranteeing Security of A Building by Uinsg the Double Entrance-Control System (이중 출입통제 시스템을 이용한 내부 시설 보안성 확보 방안)

  • Kim, Min Su;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.123-129
    • /
    • 2012
  • A secured building where only approved personnel can access is sometimes not secured because of the lack of recognition of security. Unapproved personnel enter and access freely to the internal system of the building, and this makes security risks. In order to deal with these problems, the existing entrance-control system had developed by using the RFID card certification and the infrared sensor to measure distance. However, it is difficult for the system to guarantee security due to the weakness of each method. Therefore, this study aimed at providing a new method of guaranteeing security by comparing the double entrance-control system and the existing entrance-control system.

A Implementation of Surveyed Control Point Management System for National Land based on RFID (RFID 기반의 국토측량 기준점 관리 시스템 구현)

  • Cho, Jong Sik;Kim, Young Gon;Lee, Young Woong;Ju, Jong Gil;Seo, Ho Suk;Sim, Choon Bo;Sin, Chang Sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.13-22
    • /
    • 2010
  • In this paper, we propose a management system for positioning and indicating the surveyed control point using RFID and UMPC. This system is composed of digital control point, management system and application. The digital control point transmits information of the surveyed control point and the management system receives the data from the digital control points and manages the scattered digital control points. The system offers three services for managing the surveyed control point. The first service is control point monitoring service for identifying the change of location, locating the missing control point and the second service is control point search service notifying selected control point to user, and the third service is control point land management service for editing the control point information in the land. Therefore, this system makes it easy for administrators to access the control point information of the scattered surveyed control point through the country and enhances the managing efficiency.

Implementation of cusomized RFID receiver module for In-VIVO wireless transmission (체내심부 무선전송을 위한 맞춤형 RFID 수신 모듈 구현)

  • An, Jinyoung;Sa, Gi-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.55-57
    • /
    • 2022
  • In this study, a customized semi-passive RFID receiver module was implemented for in-VIVO deep tissue photo-therapy. A novel wireless technique is required due to a limitation of RF communication in body environment, as internal body has a complex structure such as, skin, fat, skeleton, water, and so on. Recently, coherently incoherent beamforming (CIB) based on RFID was introduced and it is able to transmit wireless signal with high reliability under the incoherent condition such as in-VIVO deep tissue. The proposed miniature photo capsule based on RFID consists of miniature controller, ultra small LED array and wireless RFID chip. RF Reader can access with standard RFID protocol (ISO 18000-6c) using UHF RFID antenna, a control command is wirelessly writtern on USER Bank memory. With received control command, therapy LED array dims with mulilevel under timer control. The signal process of designed RFID photo therapy capsule is analyzed and evaluated under the various environments in detailed.

  • PDF

Authentication Protocol for RFID using Bivariate Polynomials over a Finite Field (유한체 위의 이변수다항식을 이용한 RFID 인증 프로토콜)

  • Jung, Seok Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.3
    • /
    • pp.137-141
    • /
    • 2014
  • RFID system is applied to various industry such as process control, distribution management, access control, environment sensing, entity identification, etc. Since RFID system uses wireless communication, it has more weak points for security. In this paper, an authentication protocol is suggested between tags and a reader, which is basic property for security. A suggested protocol use a bivariate polynomial over a finite field and is secure against snooping, replay attack, position tracking and traffic analysis.

Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs

  • Ko, Doo-Hyun;Kim, Bum-Jin;An, Sun-Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.776-796
    • /
    • 2010
  • Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In integrated RFID-WSNs, the reader collision is one of the critical problems. Above all, due to the absence of universally applicable anti-collision protocols and the channel capture phenomenon, the medium access control protocols in integrated RFID-WSNs suffer from reader collision and starvation problems. In this paper, we propose an efficient MAC protocol, called EMP, to avoid the above problems in integrated RFID-WSNs. EMP is a CSMA-based MAC protocol which is compatible with sensor networks operating on integrated nodes which consist of an RFID reader and a senor node. EMP resolves not only the reader collision problem, but also the starvation problem using a power control mechanism. To verify the performance of EMP, we compared it with other anti-reader collision MAC protocols using simulations. As a result, the performance of EMP showed improvements in throughput, system efficiency, and energy consumption compared to the single data channel protocols (CSMA/CA, Pulse, and DiCa) in dense deployment environments.

System Design for Access to Subway Vent based Bluetooth Smart Door-Lock (지하철 환기구 출입관리를 위한 블루투스 스마트 도어락 시스템)

  • Kim, Tae-Yong;Lee, Dae-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.63-65
    • /
    • 2016
  • In this paper, smart door-lock system to access public facilities will be proposed. An existed door-lock system using physical door-lock, NFC Tag, and RFID could be replaced by our proposed system. Automatic access control management system with security authentication module enables the worker to access public facilities efficiently.

  • PDF

Access Control Policy for Middleware in RFID Systems (RFID 시스템의 미들웨어를 위한 접근제어)

  • Kim, Tae-Sung;Kim, Ho-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.201-204
    • /
    • 2008
  • RFID의 무선을 통해 자동 인식 기술은 산업, 상업 그리고 의료 분야에 혁신적인 개선을 가져다 줄 것으로 기대되고 있다. RFID 기술의 핵심은 물리적인 물체에 관련한 정보를 쉽게 수집할 수 있다는 것이다. 미들웨어는 RFID 리더와 응용 사이에 위치하면서 RFID 정보를 실시간으로 수집하고 기업응용에 전달해주는 중요한 역할을 담당한다. 따라서 네트워크로부터의 공격이나 잘못된 명령으로부터 미들웨어를 보호하기 위해 적절한 접근제어가 필요하다. 본 논문은 RFID 미들웨어에 적용가능한 접근제어 정책을 제안한다. 이 정책은 제공가능한 태그 범위, 접근가능한 리더, 명령, 보고가 배달되어질 주소등을 제한할 수 있도록 고안되었다. 또한, 접근제어 정책을 수행하는 프로세스의 구현 알고리즘을 제시한다.

  • PDF

Development of Access Management System based on Face Recognition using ResNet (ResNet을 이용한 얼굴 인식 기반 출입관리시스템 개발)

  • Rhyou, Se-Yeol;Kim, Hye-Jin;Cha, Kyung-Ae
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.823-831
    • /
    • 2019
  • In recent years, there has been developed systems such as a surveillance system and access control using a face recognition function instead of a password or an RFID chip, thereby reducing the risk of falsification. Moreover, deep learning technology has been applied to real-time face recognition technology in video, so it makes possible the development of access control system that improves the accuracy of recognition and efficiency of management. In this paper, we propose a real-time access management system based on face recognition using ResNet. The system is based on web server, which make it possible to manage the access by recognizing the person of the image through the camera and access information stored in the database. It can be accessed by a user application to receive various information. The implemented system identifies a person in real time and allows access control by accurately distinguishing whether they are members or not, and the test results can recognize in 0.2 seconds. The accuracy of recognition rate is up to about 97% depending on the experiment environment. With this system, access can be managed quickly and effectively, even many people rush to it.

Randomized Hash Lock Access Control Protocol for Mass RFID Tags (대량의 RFID 태그에 적용할 수 있는 확장성 있는 랜덤 해쉬락 접근제어 프로토콜)

  • Oh, Kyung-Hee;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.109-111
    • /
    • 2005
  • RFID는 기존의 바코드나 자기 인식 장치의 단정을 보완하고 사용의 편리성 향상으로 물류관리, 재고관리 등의 분야에서 활용 가능성이 비약적으로 증가되고 있는 차세대 핵심기술로 주목 받고 있다. 그러나 RFID 시스템이 활성화되기 위해서는 프라이버시 문제에 대한 해결책이 선행되어야만 한다. 해쉬락 기법은 리더가 태그를 인식하는 권한을 제어하여 임의의 리더가 태그 정보를 읽지 못하게 함으로써 프라이버시를 보호하는 기법이다. 본 논문은 기존의 해쉬락 기법에 의한 RFID 접근제어 프로토콜을 분석하고 취약점을 보완하여 대량의 태그를 사용하는 환경에서 도청자가 태그를 추적하지 못하도록 하는 접근제어 프로토콜을 제안한다.

  • PDF