Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.1.098

Policy Based Cloned CSD Detection Mechanism in Logistics  

Hwang, Ah-Reum (부산대학교물류IT협동과정)
Suh, Hwa-Jung (부산대학교 정보컴퓨터공학부)
Kim, Ho-Won (부산대학교 정보컴퓨터공학부)
Abstract
CSD(Container Security Device) is a security device with sensors that can detect the abnormal behavior such as illegal opening of a container door. Since the CSD provides security and safety of the container, CSD should not only provide security services such as confidentiality and integrity but also cloning detection. If we can not detect the cloned CSD, an adversary can use the cloned CSD for many illegal purposes. In this paper, we propose a policy based cloned CSD detection mechanism. To evaluate proposed clone detection mechanism, we have implemented the proposed scheme and evaluated the results.
Keywords
Container Security Device; CSD; Clone Detect Protocol; Policy-based clone detect; Clone attack;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 김주해, 최은영, 이동훈, "복제 공격 저항성을 갖는 전자봉인 보안 모델", 정보보호학회논문지 제 17권 제5호, pp.111-116, Oct, 2007   과학기술학회마을
2 D.Henrici and Paul Muller, "Hash-based enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", PerSec'04 at IEEE PerCom, pp.149-153, 2004
3 Conveyance Security Device (CSD)-to-CSD Reader Interface Control Document (ICD) Baseline version 1.0, December 10, 2007
4 CSD Reader-to-Data Consolidation Point (DCP) Interface Control Document (ICD) Baseline version 1.0, December 10, 2007
5 Conveyance Security Device (CSD) Requirement Document Baseline version 1.2, December 10, 2007
6 이향진, 신동휘, 전길수, "RFID 프라이버시 보호 기술 및 표준화 동향", 정보보호학회지 제 18권 제4호, 2008.8   과학기술학회마을
7 Mikko Lehtonen, Florian Michahelles, and Elgar Fleisch, "How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces", 2009 IEEE International Conference on RFID, pp.257-264, April 27-28, 2009
8 Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, and Florian Michahelles, "Securing RFID Systems by Detecting Tag Cloning", Lecture Notes in Computer Science, vol. 5538, pp.291-308, Springer, 2009
9 Davide Zanetti, Leo Fellmann, and Srdjan, "Privacypreserving Clone Detection for RFID-enabled Supply Chains", 2010 IEEE International Conference on RFID, pp.37-44, April 14-16, 2010