• Title/Summary/Keyword: 리더프로토콜

Search Result 224, Processing Time 0.023 seconds

Design of RFID Mutual Authentication Protocol for Mobile RFID (모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계)

  • Lee, Seung-Min;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.183-190
    • /
    • 2010
  • Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

RFID Security Authentication Protocol Using Database Random Number (데이터베이스 난수를 이용한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Shin, Moon-Sun;Yon, Yong-Ho;Lee, Jong-Yun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.54-56
    • /
    • 2009
  • RFID 시스템은 생활에 바코드를 대체하고 산업 전반에 사용될 중요한 기술이다. 그러나 RFID시스템에서 태그와 리더 사이의 통신이 무선으로 이루어짐에 따라 보안상 많은 취약점이 존재 한다. 본 논문에서는 여러 보안 문제를 강화 하기위해 데이터베이스에서 난수 및 시간정보를 이용하여 매 세션마다 새로운 해쉬함수를 생성하는 인증 프로토콜을 제안 한다. 본 프로토콜은 무선 인증 시스템에 다양한 유용성을 제공 하며 기존 프로토콜에 비해 보안상 강건함을 제공 한다.

  • PDF

Verification of RFID Security Protocol using Model Checking (모델체킹을 이용한 RFID 보안프로토콜 검증)

  • Kim, Joo-Bae;Kim, Hyun-Seok;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.136-139
    • /
    • 2007
  • 무선 네트워크를 사용하는 RFID 시스템은 정보 유출에 취약하다. 하지만 하드웨어적인 제약으로 인해 물리적인 방법을 통한 보안 안전성 확보가 용이하지 않으므로, 경량화된 보안 프로토콜을 필요로 한다. 이에 본 논문에서는 리더간 네트워크 기술을 이용한 RFID 시스템을 위해 제안된 보안 프로토콜을 정형기법을 기반으로 하는 모델 체킹 방법을 통해 검증하였으며, 신뢰성 있는 보안 프로토콜을 적용한 RFID 시스템을 구축할 수 있도록 하였다.

  • PDF

RFID Distance Bounding Protocol to Secure Against Relay Attack by Using Full-Response (Full response를 사용하여 중계 공격에 안전한 RFID 거리제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.3
    • /
    • pp.298-300
    • /
    • 2016
  • We propose a RFID distance bounding protocol that RFID tag still responds when reader sends a void challenge in order to reduce the probability of a relay attack. We analyze the success probability of relay attack depending on the full challenge ratio. Our experimental results show that our protocol is secure to relay attack.

Design of an Leader Election Protocol in Mobile Ad Hoc Distributed Systems (분산 이동 시스템에서 선출 프로토콜의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.53-62
    • /
    • 2008
  • The Election paradigm can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need an election protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile ad hoc computing environment. Mobile ad hoc systems are more prone to failures than conventional distributed systems. Solving election in such an environment requires from a set of mobile nodes to choose a unique node as a leader based on its priority despite failures or disconnections of mobile nodes. In this paper, we describe a solution to the election problem from mobile ad hoc computing systems. This solution is based on the Group Membership Detection algorithm.

Improved Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 개선된 RFID 인증 프로토콜)

  • Oh, Sejin;Lee, Changhee;Yun, Taejin;Chung, Kyungho;Ahn, Kwangseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.12-18
    • /
    • 2013
  • In 2012, Woosik Bae proposed a DAP3-RS(Design of Authentication Protocol for Privacy Protection in RFID Systems) using the hash function and AES(Advanced Encryption Standard) algorithm to hide Tag's identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with the DAP3-RS.

Development of RF Module for Data Communication (무선주파수를 이용한 통신모듈개발)

  • Kim, Yong-Tae;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.195-197
    • /
    • 2005
  • 본 논문에서는 트랜스폰더와 리더를 이용한 무선 데이터 통신 모듈의 개발에 관하여 논하였다. 이 모듈의 제작에 있어 필요한 일련의 사항들을 살펴보고 신뢰성 있는 통신을 위해 프로토콜을 적용하였다. 통신거리개선을 위해 전력증폭기 시뮬레이션, 안테나 임피던스 매칭에 관한 연구를 해 보았다.

  • PDF

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Implementation of Virtual Reader and Tag Emulator System Using DSP Board (DSP 보드를 이용한 가상의 리더와 태그 에뮬레이터 시스템 구현)

  • Kim, Young-Choon;Joo, Hae-Jong;Choi, Hae-Gill;Cho, Moon-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3859-3865
    • /
    • 2010
  • Modeling a virtual reader and tags, the emulator system is realized by using a commercial signal generation device to make signal, a data collection equipment, and DSP board. By using a Virtual UHF RFID (860 ~ 960 [MHz]) reader/tags module, a developed RFID reader, protocol of tag, and properties of RF support to provide the way how to verify the suitability to international standards (ISO 18000-6 Type C, EPCglobal C1G2). In this paper, to implement a proposed model reader and tag model, Visual DSP is applied by using DSP board, composing the system's signal generators, signal analyzers and performance verification, the target readers or tags, RFID emulator control computesr and control programs.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF