Browse > Article

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation  

Hwang, Deuk-Young (강원대학교 삼척캠퍼스 / 컴퓨터공학과)
Kim, Jin-Mook (선문대학교 / IT교육학부)
Publication Information
Abstract
There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.
Keywords
IoT/CPS; RFID; Attribute-based Re-encryption; Industry standard; Smart factory;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dong Chen, Guiran Chang, A Survey on Security Issues of M2M Communications in Cyber-Physical Systems, KSII Transactions on Internet and Information(TIIS), Vol. 6, No. 1, pp.24-45, 2012. 1.
2 Jiafu Wan, Hehua Yan, Hui Suo, Fang Li, Advances in Cyber-Physical System Research, KSII Transactions on Internet and Information(TIIS), Vol. 5, No. 11, pp.1891-1908, 2011. 11.
3 Dae-Geun Kim, Man-Gon Park, Horizontal Integration between Cyber Physical System Based on Industry 4.0 and Manufacture Execution Systems through Middleware Building, Journal of Korea Multimedia Society, Vol. 17, No. 12, pp.1484-1493, 2014. 12.   DOI
4 Young-Sik Kim, Cyber-Physical System Security Technology Trend in IoT era, The Magazine of the IEEE, Vol. 42, No. 8, pp.16-25, 2015. 8.
5 Jae-Hyun Lim, German, Again Industry 4.0, Journal of Korea Association of Machinery Industry, Vol. 45, No. 7, Total-vol. 457, pp.34-39, 2015. 7.
6 Armin Puhringer, Impact on the existing industrial communication on the IoT and Industry 4.0, Monthly ICN, Total Vol. 105, pp 22-27, 2015. 11.
7 Ray Y. Zhong, Huajun Gong, Chen Xu, and Shaoping Lu, Physical Internet-Enabled Manufactureing Execution System for Intelligent Workshop Production, International Journal of Signal Processing, Image Processing and Pattern Recofnition, Vol. 9, No. 6, pp.121-132, 2016.
8 Ok-Jae Lee, A Design of Automatic Management System in Manufacturing Process of Semiconductor Package Elements by Using RFID, The Jorunal of The Korean Institute of Communication Science, Vol. 33, No. 8, pp.313-320, 2008. 8.
9 Zhixin Yang, Pengbo Zhang, Lei Chen, RFID-enabled indoor positioning method for a real-time manufacturing execution system using OS-ELM,
10 Francisco Almada-Lobo, The Industry 4.0 revolution and the future of Manufacturing Execution System(MES), Journal of Innovation Management, Vol. 3, No. 4, pp16-21, 2015.
11 Kwangyong Park, Youjin Song, Attribute-based Encryption Technique, REVIEW OF KIISC, Vol.20. No.2, 85-92, 2010.4
12 Jongho Moon, Younsung Choi, Dongho Won, A Secure Attribute-based Authentication Scheme for Cloud Computing, KIISE Transactions on Computing Practices, Vol. 22, No. 8, pp. 345-350, 2016. 8.   DOI
13 Hye-Joung Yoo, Attribute-Based Authenentication for Secure Cloud Computing, Journal of KIIT, No.13, No.1, pp.59-69, 2015. 1.
14 Soomi Yang, An Efficient Attribute Certficate Management Technique for Highly Distributed Environment, Jouranl of Information and Security, Vol. 5, No.1, pp.85-92, 2005.3.
15 Si-Choon Noh, A Study of DES Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm, Jouranl of Information and Security, Vol. 12, No.4, pp.85-90, 2012. 9.