• Title/Summary/Keyword: Wireless identification system

Search Result 206, Processing Time 0.025 seconds

Design and Performance Evaluation of Two-Layered Microwave Absorbers(Dielectric/Magnetic) for Wide Oblique Incidence Angles Used for ITS (ITS용 2층형 전파 흡수체(유전체/자성체) 설계 및 경사 입사 흡수 특성 해석)

  • Kim, Jae-Woong;Kim, Sung-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.11
    • /
    • pp.1217-1223
    • /
    • 2007
  • Advanced microwave absorbers for wide oblique incidence angles are required in many applications including wireless communication or vehicle identification in ITS(Intelligent Transport System) where 5.8 GHz DSRC(Dedicated Short Range Communication) system is applied. In this study, two-layered microwave absorber(with a laminate structure of dielectric/magnetic composites) has been designed for the achievement of low reflection coefficient over wide incidence angles at 5.8 GHz. Iron flake particles are used as the filler in the absorbing layer, and the magnetic composite sheet exhibits high magnetic loss due to ferromagnetic resonance in gigahertz frequencies. The surface layer of low dielectric constant containing small amount of carbon black is used as the impedance transformer. On the basis of transmission line theory, the reflection loss has been calculated for the two-layer structure with variation of incident angles for both TE(Transverse Electric) and TM(Transverse Magnetic) polarizations. At the optimum thickness of the composite layers, a low value of reflection loss(less than -10 dB) has been predicted for wide incidence angles up to $55^{\circ}$ which is in good agreement with the measured value determined by free-space measurement.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

A Study of Correcting Technology based POI for Pedestrian Location-information Detecting in Traffic Connective Transferring System (교통 연계 환승 시스템의 보행자 위치정보 수집을 위한 POI 기반 위치 보정 기술 연구)

  • Jung, Jong-In;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.2
    • /
    • pp.84-93
    • /
    • 2011
  • In order to provide the real time and proper information to the pedestrian who is using the transport connection and transfer center through data collecting and processing process, the design of the test-bed (Gimpo airport)'s communication construction and the technology of the pedestrian location tracking has been researched. The design of the communication construction should make sure that it can provide believable data to the user of the transfer center. At the same time, the location tracking should also be considered, so that the require of the communication efficiency and the location tracking efficiency can be met together. In order to make the efficient location tracking technology, the problems related to the commercial technology based real time location identification will be resolved and the new approach method was proposed and be applied and analysed to the test-bed. The wireless access points can be located in the most real-world situation which has added the characteristics of the real building to the electronic map, and through the analysis of theirs location, they can be set as the mainly necessary points for the communication construction design and the location tracking and the method to locate that points has been proposed. How to set, how to apply it to the test-bed and the examination result will be introduced in this paper.