• Title/Summary/Keyword: RFID protocol

Search Result 449, Processing Time 0.029 seconds

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

RFID Authentication Protocol using Polynomial Hash Function (다항식 해쉬함수를 이용한 RFID 인증 프로토콜)

  • Yon, Yong-Ho;Lee, Sun-Yong;Lee, Jong-Yun;Shin, Moon-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.742-745
    • /
    • 2009
  • RFID 시스템은 RFID 태그, RFID 리더, Back-end 서버로 이루어져서 짧은 거리의 무선통신을 통해 정보를 인식하는 시스템이다. 최근 RFID기술은 다양한 응용 분야에서 활용되고 있으며 보안과 프라이버시 침해에 대한 우려와 문제점을 해결해야한다는 논의가 높아지고 있다. 본 논문에서는 중간자 공격 및 재생공격에 대응할 수 있는 다항식 해쉬함수를 이용한 강력한 상호인증 프로토콜을 제안한다. 본 논문에서는 대량의 RFID 태그와 리더간 상호인증을 위해 다항식을 이용한 해쉬함수를 적용한다. 제안된 다항식 해쉬함수를 적용한 RFID 인증 프로토콜은 전체 시스템에 부담을 주지 않으면서 보안강화를 할 수 있는 인증 프로토콜이며 특히 태그 쪽에 컴퓨팅 오버헤드가 추가되지 않는다. 또한 공격자에게 공격이 어렵거나 불가능한 복잡도를 가지는 프로토콜이다.

  • PDF

A STUDY FOR RFID APPLICATION OF CONSTRUCTION MATERIALS

  • Choong-Han Han ;Ki-Bum Ju
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1155-1160
    • /
    • 2009
  • The trend in construction industry, now, lies in improving efficiency and competitive power in construction management and on-the-spot instruction by combining with new IT technology. Above all, it is safe to say that the application of RFID technology can play a pivotal role at this point, but it is not that easy to apply RFID due to the physical, chemical and environmental peculiarities of construction materials. Thus, a study on the standardization of the usable frequency, specifications, protocol, and package administration is required. This study, as part of the study on the standardization, figured out the restrictions by attaching the existing RFID Tag to the construction materials, turned out the prototype of RFID Tag to perform a field test. In result the effective recognition range varies according to the physical and environmental peculiarities of construction materials; and the management efficiency varies as the attaching method and/or applying method. To analyze the management method (media, process etc.) systematically for the existing construction materials; to prepare more various restrictions and its solutions for practical construction spots will be the key for successful RFID implementation.

  • PDF

YA-RFID Authentication Protocol providing Strong Privacy (강한 프라이버시를 제공하는 YA-RFID 인증 프로토콜)

  • Yoon, Eun-Jun;Bu, Gi-Dong;Yoo, Kee-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1459-1462
    • /
    • 2009
  • 최근 Yang과 An은 기존의 RFID 인증 메커니즘들이 가지고 있는 프라이버시 침해 문제를 분석하고 보다 안전하고 효율적인 사용자의 프라이버시를 보호할 수 있는 RFID(YA-RFID) 인증 프로토콜을 제안하였다. 그들은 제안한 YA-RFID 인증 프로토콜이 공격자의 재전송 공격, 스푸핑 공격, 그리고 위치 트래킹 공격에 대해 안전하다고 주장하였다. 하지만 본 논문에서는 그들의 주장과는 달리 YA-RFID 프로토콜이 여전히 위치 트래킹 공격에 취약함을 증명하며, 더 나아가 동일한 연산 효율성을 보장하며 위치 트래킹 공격을 막을 수 있는 간단히 개선된 일회성 난수와 안전한 일방향 해쉬 함수 기반의 RFID 인증 프로토콜을 제안한다.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

Practical and Secure Yoking-Proof Protocol for RFID (실용적이고 안전한 RFID 요킹증명 프로토콜)

  • Ham, Hyoung-Min;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.83-94
    • /
    • 2011
  • Yoking proof is a concept proposed by A. Juels in 2004. It proves that a pair of tags are scanned simultaneously by one reader. After the first yoking proof protocol is proposed by A. Juels, replay attack vulnerabilities of yoking proof are considered and many other yoking proof schemes are proposed to improve it. However, compared with the first yoking proof scheme which emphasizes protocol efficiency due to the limited performance of tags, other yoking proof protocols need more computing power and storage of the tags. We propose two security protocols that consider both the general condition and limited performance of tags. The proposed scheme can protect the tags from replay attack and Brute-force attack as well. Moreover, many pairs of tags or several tag groups can be proved at the same time by executing the protocol only once.

Design and Implementation of RTLS using Active RFID (능동형 RFID를 이용한 RTLS의 설계 및 구현)

  • Jung, Dong-Ho;Kim, Jung-Hyo;Ji, Dong-Hwan;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1238-1245
    • /
    • 2006
  • Interest to the RTLS that is one of RFID applications is increasing in recent. The RTLS(Real Time Locating Systems) is one of applications for locating and tracking using RFID tags which are attached to something like container, pallet, or all the things. This paper presents the design and the implementation of an RTLS system using 433MHz active RFID tags and use radio frequency to provide the scalability. Our system we developed using RFID platform takes into account an RTLS standard. Also, in this paper a routing protocol is included to data delivery to server via each reader. In order to perform the evaluation, in addition, some experiments in out door are performed and results such as error metric and distance are also included. Furthermore, simulation for the routing protocol we supposed is also included.

Design and Implementation of System in Package for a HF/UHF Multi-band RFID Reader (HF/UHF 멀티밴드 RFID 리더의 SiP 설계 및 구현)

  • An, Kwang-Dek;Yi, Kyeong-Il;Kim, Ji-Gon;Cho, Jung-Hyun;Kim, Shi-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.10
    • /
    • pp.59-65
    • /
    • 2008
  • We have proposed a UHF/HF multi-band RFID reader, and have implemented it into a system in a package(SiP). The proposed SiP RFID reader has been designed to support both for EPCgloabal Class1 Generation2 protocol of UHF band, and 13.56MHz RFID protocols of ISO14443 A/B type, and ISO15693 standards. The operating mode is controlled by embedded RISC core, and the mode can be selected by users. The area of implemented SiP is $40mm{\times}40mm$ with 4 metal layers. The implemented reader SiP operates at single supply voltage of 3.3V. The maximum current consumption is 210mA. The operating distances are 5cm for 13.56MHz modes, and 20cm for UHF mode.

Design of Regulated Low Phase Noise Colpitts VCO for UHF Band Mobile RFID System (UHF 대역 모바일 RFID 시스템에 적합한 저잡음 콜피츠 VCO 설계)

  • Roh, Hyoung-Hwan;Park, Kyong-Tae;Park, Jun-Seok;Cho, Hong-Gu;Kim, Hyoung-Jun;Kim, Yong-Woon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.8
    • /
    • pp.964-969
    • /
    • 2007
  • A regulated low phase noise differential colpitts VCO(Voltage Controlled Oscillator) for mobile RFID system is presented. The differential colpitts VCO meets the dense reader environment specifications. The VCO use a $0.35{\mu}m$ technology and achieves tuning range $1.55{sim}2.053 GHz$. Measuring 910 MHz frequency divider output, phase noise performance is -106 dBcMz and -135dBc/Hz at 40 kHz and 1MHz offset, respectively. 5-bit digital coarse-tuning and accumulation type MOS varactors allow for 28.2% tuning range, which is required to cover the LO frequency range of a UHF Mobile RFID system, Optimum design techniques ensure low VCO gain(<45 MHz/V) for good interoperability with the frequency synthesizer. To the author' knowledge, this differential colpitts VCO achieves a figure of merit(FOM) of 1.93dB at 2-GHz band.