Browse > Article
http://dx.doi.org/10.6109/jkiice.2008.12.6.1032

A Direction-Decision RFID System with a Authentication  

Park, Chul-Min (동서대학교 컴퓨터정보공학부)
Jo, Heung-Kuk (동서대학교 컴퓨터정보공학부)
Lee, Hoon-Jae (동서대학교 컴퓨터정보공학부)
Abstract
RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.
Keywords
RFID; security; encryption; cipher; agent; TCP/IP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Klaus Finkenzeller, ' RFID Handbook', John Wiley & Son, LTD, (1999)
2 Kyung-Hyup Lee, Yoon-Young An, Hee-Dong Park, You-Ze Cho,' A Data-centric Self-organization Schema for Energy-Efficient Wireless Sensor Networks' (2006) USN (USN 2006 in Seoul)
3 NIST, 'Announcing the Advanced Encryption Standard (AES)', FIPS-197, Nov. 2001
4 Daesung kwon, Jaesung Kim, Sangwoo Park, Soohak Sung, Yaekwon Sohn, Junghwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong, 'New Block Cipher: ARIA,' LNCS 2971 - ICISC2003, pp.432-445, Springer, 2004
5 A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W.Millan, Sang-Jae Moon, L. Simpson, 'The LILI-II Keystream Generator,' LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002)
6 Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communications,' Signal Processing, Vol.82,No.2,pp.259-265, Feb, 2002   DOI   ScienceOn
7 KISA, Development of SEED, the 128-bit block cipher standard, Oct, 1998. (http://www.kisa.or.kr)
8 W. Stalling, Cryptography and Network Security (4th edition), Prentice-Hall, 2006
9 Sanjay Raghani, Durga Toshniwal and R. C. Joshi, 'Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.10-21, 2007
10 Jonathan Collins, 'FTC Asks RFID Users to Self- Regulate', RFID Journal, Mar. 10, (2005)
11 R.C.Joshi and Shashikala Tapaswi, 'Frame Sliced Parallel Signature Files for Fast Colored Image Retrieval', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.5-9, 2007
12 'FIPA Agent Management Specification,' FIPA 2004 Specification, Foundation for Intelligent Physical Agents, March 2004.
13 E. Kaasinen, 'User Acceptance of MobileServices- Value. Ease of Use, Trust and Ease of Adoption,' doctoral dissertation, VTT 566, VTT Publication,(2005)
14 Duck-Yong Yun , 'AVR ATmega128 Master', (2004)
15 Kevin Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon, 'Dragon: A Fast Word Based Stream Cipher,' LNCS (ICISC'2004)2004.12.2-12.3
16 Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, Aug. 1, 2002
17 Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim, 'MARP: Mobile Agent for RFID Privacy Protection', 7th Smart Card Research and Advanced Application IFIP Conference (CARDIS '06), Lecture Notes in Computer Science, vol.3928, pp.300-312, April 2006
18 W. Jansen, T. Karygiannis, 'NIST Special Publication 800-19-Mobile Agent Security,
19 Vinay Deolalikar, Malena Mesarina, John Recker, Salil Pradon,'Perturbative time and frequency allocations for RFID reader networks' (2006) USN
20 TTAS.KO-12.0011/R1, 'Hash Funtion Standard - part 2: Hash Function Algorithm Standard (HAS- 160),' Dec. 20, 2002. (http://www.tta.or.kr)
21 W. Trappe & L. Washington, Introduction to Cryptography with coding theory (2nd edition), Prentice-Hall, 2006
22 Chipcon Tech. Support, 'User Manual Rev. 2.0', Chip AS, (2004), www.chipcon.com
23 Hwang-Hae Kyun, Sung-Jun Bae, 'I love ATMEGA128', Bok-Du Verlag, (2005)