• Title/Summary/Keyword: 리더프로토콜

Search Result 224, Processing Time 0.028 seconds

Analysis about EPC Class 1 and C1G2 Security (EPC Class1과 C1G2 보안성 분석)

  • Kim, Keon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.70-72
    • /
    • 2005
  • 최근들어 Radio Frequency Identification (RFID) 태그가 다수의 상품에 부착되고 절러 분야에 적용되기 시작했지만, 비용문제로 인해 인증이나 암호화 같은 보안기능은 고려하지 않고 있다. 보안 기능이 없는 RFID시스템은 개인정보 노굴, 불법 리더의 접근, 위조 태그의 남용과 같은 심각한 부작용을 초래하지만 현 단계에서는 보안기능을 적용하기가 쉽지않다. 절러 기술을 따르는 수동형 태그중 EPCglobal의 EPC Class 1과 Class 1 Generation 2(C1G2)는 산업계의 여러 분야에서 특히, supply-chain 모델에서 사실상 국제표준으로 여겨진다. EPC Class1 수준의 태그는 자체 밧데리를 가지지 않는 수동형 태그이고, 암호 프리미티브를 적용한 알고리즘이나 프로토콜은 제공하지 않는다. EPC Class1 과 EPC C1G2의 유일한 보안 대책으로는 태그를 영원히 동작하지 못하게 하는 Kill 기능이 있다. Kill을 수행한 태그는 RFID 태그로서의 의미가 사라진다. 본 논문에서는 Kill 기능에 대한 EPC Class1 시스템의 취약성을 보이고 또한, EPC C1G2 시스템에서 Kill 관점에서의 보안성을 분석한다.

  • PDF

Simulation System for Anti-Collision Protocols in RFID (RFID 태그 충돌 방지 프로토콜의 성능 비교를 위한 시뮬레이션 시스템)

  • Shin Jae-Dong;Yeo Sang-Soo;Kim Sung-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.91-93
    • /
    • 2006
  • RFID(Radio Frequency IDentification) 기술은 RF 신호를 사용하여 물품에 부착된 전자 태그(tag)를 식별하는 비접촉자동인식 기술이다. 이런 RFID 기술의 확산을 위해서는 리더가 다수의 태그를 빠른 시간 안에 인식하는 다중 태그 식별 문제를 해결 해야만 한다. 지금까지 이 문제를 해결하기 위한 충돌 방지(anti-collision) 알고리즘이 많이 개발되었다. 본 논문에서는 이런 충돌 방지 알고리즘 중에서 18000-6 Type A, Type B와 Type C로 새롭게 채택된 EPCglobal Class1 Generation2, 그리고 Query Tree Protocol에 대한 시뮬레이션 시스템의 구조를 소개하고 실제 시뮬레이션 했을 때의 각 알고리즘에 대한 간단한 성능 평가를 한다.

  • PDF

Enhanced Authentication Protocol of RFID System (RFID 시스템의 개선된 인증 프로토콜)

  • Lee, Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.193-200
    • /
    • 2007
  • There is an advantage that RFID system is better than previous bar code system in storage ability and noncontact property. But, everyone can easily receive the transmitting information by using RF signal. So, there is a problem that system security and personal privacy are threatened. In this paper, I propose RFID system that is secure against attacks like eavesdropping, replay, spoofing and location tracking and can efficiently provide mutual authentication services between reader and tag. The proposed RFID system can be used in various sections of ubiquitous computing environment.

  • PDF

Design and Implementation of RTLS using Active RFID (능동형 RFID를 이용한 RTLS의 설계 및 구현)

  • Jung, Dong-Ho;Kim, Jung-Hyo;Ji, Dong-Hwan;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1238-1245
    • /
    • 2006
  • Interest to the RTLS that is one of RFID applications is increasing in recent. The RTLS(Real Time Locating Systems) is one of applications for locating and tracking using RFID tags which are attached to something like container, pallet, or all the things. This paper presents the design and the implementation of an RTLS system using 433MHz active RFID tags and use radio frequency to provide the scalability. Our system we developed using RFID platform takes into account an RTLS standard. Also, in this paper a routing protocol is included to data delivery to server via each reader. In order to perform the evaluation, in addition, some experiments in out door are performed and results such as error metric and distance are also included. Furthermore, simulation for the routing protocol we supposed is also included.

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.

Design and Implementation of Mobile RFID Middleware Modules for the Mobile Environments (모바일 환경을 위한 모바일 RFID 미들웨어 모듈 설계 및 구현)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.10-18
    • /
    • 2008
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement a mobile RFID middleware system that supports the mobile handset environment for real-time based processing of the necessary data in the mobile environment. The proposed mobile RFID middleware system includes a mobile reader interface that collects the tag data, a mobile filtering engine that processes the tag data into more meaningful data that is sent to the application interface, and finally the mobile application interface that supports the m-SOAP application access protocol for interfacing with existing mobile applications. The filtering speed of the newly-developed middleware engine was found to be suitable for the characteristics of mobile handsets.

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Design and Implementation of a Ubiquitous Health Care System based on Sensor Network (센서네트워크에 기반한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFID reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the tinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.