Browse > Article
http://dx.doi.org/10.13067/JKIECS.2019.14.6.1077

Security Authentication Technique using Hash Code in Wireless RFID Environments  

Lee, Cheol-Seung (Dept. of Liveral Arts, Kwangju women's University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.14, no.6, 2019 , pp. 1077-1082 More about this Journal
Abstract
The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.
Keywords
RFID System; EPC Code; Hash Function; Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 C. Lee "A Study on Effective using Security Routing based on Mobile Ad-hoc Networks," Int. J. of Security and Its Application, vol. 9, no. 7, 2015, pp. 141-152.   DOI
2 C. Lee "Security Authentication Technique using Hash Code in Wireless RFID Environments," Int. J. of Grid and Distributed Computing, vol. 11, no. 10, 2018, pp. 93-102.   DOI
3 J. Jung, H. Lee, and Y. Kim, "High Speed Collision Avoidance Algorithm for Active RFID Network System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 581-590.   DOI
4 R. Weinstein, "A Technical Overview and Its Application to the Enterprise," IT Professional, IEEE Computer Society, vol. 7, issue 3, June 2005, pp. 27-33.   DOI
5 H. Chow, K. Choy, W. Lee, and K. Laub, "Design of a RFID case-based Resource Management System for Warehouse Operations," J. of International Expert System with Applications, vol. 20, issue 4, May 2006, pp. 561-576.
6 C. Floerkemeier, D. Anarkat, T. Osinski, and M. Harrison, "PML Core Specification 1.0," Auto-ID Center Recommendation, Sept. 2003, pp. 5-25.
7 U. Karthaus and M. Fischer, "Fully integrated passive UHF RFID transponder IC with 16.7-uW minimum RF input power," J. of IEEE Journal for Solid-state Circuits, vol. 38, no. 10, Oct. 2003, pp. 1602-1608.   DOI
8 H. Yoon, M. Mohaisen, K. Chang, J. Bae, and G. Choi, "Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System," J. of Korean Institute of Electromagnetic and Engineering and Science, vol. 18, no. 124, 2007, pp. 1047-1056.   DOI
9 K. Han and G. Yim, "Design of an RFID Authentication Protocol Using Nonlinear Tent-Map," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 10, Aug. 2014, pp. 1145-1152.   DOI