Browse > Article

Remote Secure Entrance Control System using RFID and TCP/IP  

Kim, Jeong-Sook (Dept. of International Business and Trade, Myongji University)
Kim, Cheon-Shik (Dept. of Liberal Arts, Anyang Univ.)
Yoon, Eun-Jun (Dept. of Computer&Information, Daegu-Polytechnic College)
Hong, You-Sik (Dept. of Computer Science, Sangji Univ.)
Publication Information
Abstract
At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.
Keywords
RFID; Ubiquitous; TCP/IP; Remote Security; Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Jule, "Authentication Pervasive Devices with Human Protocols", To appear Crypto 2005, Aug 2005
2 S. E. Sarma, "Towards the Fivecent Tag", MIT Auto ID Center, Technical Report MIT-AUTOID -WH-006.2001.(http://autoid center.org)
3 A. Jule and R. Pappu, "Squealing Euros: Privacy Protection in RFID-enable Banknote", In proceedings of Financial Cryptography-FC'03, Vol. 2742 LNCS, pp. 103-121, Sep. 2003
4 강전일, 박주성, 양대헌, "RFID 시스템에서의 프라이버시 보호기술", 정보보호학회지, 제14권, 제6호, 2004
5 Don Loomis, The TINITM Specification and Developer's Guide, ADDISON-WESLEY, 2001
6 조영준, AVR AT90S5815, Ohm사, 2001
7 A. Juels, R. L. Rivest, and M. Szydlo "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, 2003
8 KLAUS FINKENZELLER, RFID HAND BOOK Second Edition, WILEY, 2002
9 Don Eisenreich and Brian DeMuch, Designing Embedded Internet Devices, Elsevier- Science, 2003
10 정병호, "RFID/USN 환경에서의 정보보호", 제9회 정보보보심포지움, pp. 447-463, 2004
11 신대섭, 정상봉, C가 미는 로보트, 도서출판 세화, 2000
12 윤성우, TCP/IP 소켓 프로그래밍, FREELEC, 2003김완석, 김정국, 김효기, 김창석, 구흥서, 이상범, 박태웅, 이성국 공역, "유비쿼터스
13 최은영, 이동훈, "RFID 정보보호 기술 동향", 정보처리학회지, 제12권, 제5호, 2005
14 M. Weiser, "Ubiquitous Computing", Nikkei Electronics, pp. 137-143, December 1993. 이근호, 이기혁, 한호현, 유비쿼터스 컴퓨팅 핸드북, 진한도서, 2003
15 DS80C400, DStinim400, DStinis400 DataSheet (Maxim-Dallas semiconductor)
16 M. Weiser, "Some Computer Science Problems in Ubiquitous Computing", Communications of the ACM, July 1993.