Browse > Article

A Study on Authentication Protocol for Secure RFID Tag  

Jung, Yong-Hoon (숭실대학교 컴퓨터학과)
Kim, Jung-Jae ((주)리테일테크)
Jun, Moon-Seog (숭실대학교 컴퓨터학과)
Abstract
Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.
Keywords
Authentication; RFID; Character set; Two dimension array; Key exchange;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 정용훈, "멀티미디어 콘텐츠 보호를 위한 인증 프로토콜에 관한 연구", 숭실대학교 석사학위논문,2006.
2 Ronald L. Rivest The MD5 Message-Digest Algorithm IETF RFC 1321 April 1992.
3 S. A. Weis, 'Security an Privacy in Radio- Frequency Identification Devices' MS Thesis. MIT. May, 2003.
4 M. Ohkubo, K. Suzuki, and S. Kinosita, 'Hash- Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID', Proceedings of the SCIS 2004, pp.719-724, 2004.
5 Henrich, D. and M$\ddot{u}$ller, P., 'Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers', Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop (PERCOMW'04), pp. 149-153, IEEE, 2004.   DOI
6 Weis, S. et al., 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', Security Pervasive Computing, 2003 LNCS 2802, pp.201-212, Springer-Verlag Heidelberg. 2004   DOI
7 Auto-ID Center, '860MHz-960MHz Class 1 Radio Frequency Identification Tag Radio Frequency & Logical communication Interface Specification Proposed Recommendation Version 1.0.0', Technical Report MIT-AUTOID-TR- 007, NOV, 2002
8 강전일, 박주성, 양대헌, 'RFID 시스템에서의 프라이버시 보호기술', 한국정보처리학회지, 제12권, 제6호, pp.28-36, 2004. 12.
9 S. A. Weis, S. e. Sarma, R. L. Rivest, and D. W. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag Heidelberg, 2004.   DOI
10 Understanding the EPC Gen 2 Protocol, RFID Journal Special Report, 2005
11 이근우, 오동규, 곽 진, 오수현, 김승주, 원동호, "분산 데이터베이스 환경에 적합한 Challenge- Response 기반의 안전한 RFID 인증 프로토콜", 한국정보처리학회 논문지 C, 제12권-C권, 제3호, pp.309-316, 2006. 6   과학기술학회마을   DOI   ScienceOn