• Title/Summary/Keyword: 리더프로토콜

Search Result 224, Processing Time 0.024 seconds

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Power-Saving Asynchronous Event Delivering Protocol in Mobile Ubiquitous Sensor Network (Mobile USN) (모바일 USN 에서의 에너지 절감형 비동기 이벤트 전송 프로토콜)

  • Kim, Young-Man;Park, Hong-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1311-1314
    • /
    • 2005
  • 최근 정부는 IT839 전략을 발표하여 IT 산업의 새로운 서비스 도입과 신규 수요 창출에 역량을 집중하고 있으며, 신규 서비스로서 RFID/USN 도입을 강력히 추진[1][2]하고 있다. 또한 RFID/USN 활성화를 위한 새로운 시도의 일환으로 핸드폰에 RFID 리더기능을 접목시킨 모바일 RFID 구조를 제안[3]하여 기존의 RFID 리더기가 가지는 시공간 제약을 완화함으로서 더욱 다양한 서비스를 지원할 수 있는 초석을 세우고 모바일 RFID 포럼을 설립하여 다양한 서비스모델들을 검토중에 있다. 본 논문에서는 이러한 모바일 RFID 개념을 한단계 더 진화시켜 진정한 유비쿼터스 정보처리를 가능하게 해주는 모바일 USN 을 제안한다. 모바일 USN 은 RFID 태그를 진화시킨 USN 노드와 RFID 리더 내장형 휴대폰(줄여서 RFID 폰)을 개선한 USN 기능 내장형 휴대폰(줄여서 USN 폰)으로 구성된다. 본 논문에서는 또한 USN 노드와 USN 폰 간의 정보전달을 위하여 사용되는 소비에너지에 대하여 분석해보고 USN 노드와 USN 폰의 유지보수 비용을 대폭 개선하는 USN 노드-USN 폰간의 에너지 절감형 이벤트 전송 프로토콜을 제안한다.

  • PDF

Real Time Security Authentication Protocol of RFID Tag & Reader (RFID 태그-리더에서의 실시간 보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Won-Ho;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.11a
    • /
    • pp.225-228
    • /
    • 2006
  • RFID 시스템에서 전자태그와 리더사이의 통신은 무선을 통해 이루어짐에 따라 현재 보안상 많은 취약점이 존재한다. 본 논문에서는 여러 보안 문제 중 프라이버시 보호를 위한 기존 기법의 취약점을 보완하여 태그가 리더로부터 수신한 난수로부터 매 세션마다 실시간으로 새로운 해쉬 함수를 생성하는 인증 프로토콜을 제안한다. 제안한 알고리즘은 RFID 무선 인증 시스템에서 다양한 유용성을 제공할 수 있으며, 기존의 알고리즘에 비해 계산량을 절감할 수 있는 장점이 있다. 또한 추후 예상되는 주변의 수많은 태그중 필요한 태그만 선별하여 사용하며, 시간 기반으로 불필요 태그의 동작을 종료시켜 서버부담을 줄이는 방법이 될 것으로 기대된다.

  • PDF

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

Anti-Collision Protocol with Stop Signal in RFID Systems (RFID 시스템에서 중지 신호를 이용한 충돌방지 프로토콜)

  • Lim In-Taek;Choi Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.638-644
    • /
    • 2006
  • In this paper, a QT_ss protocol is proposed for identifying all the tags within the identification range. The proposed QT_ss protocol revises the QT protocol, which has a memoryless property. In the QT_ss protocol, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. While the tags are sending their identification codes, if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ss protocol outperforms the QT protocol in terms of the number of response bits.

A Query Tree Protocol with Stop Signal in RFID Systems (RFID 시스템에서 중지신호를 이용한 쿼리 트리 프로토콜)

  • Lim In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.526-529
    • /
    • 2006
  • In this paper, a QT_ss protocol is proposed for identifying all the tags within the identification range. The proposed QT_ss protocol revises the QT protocol. which has a memoryless property. In the QT_ss protocol, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. While the tags are sending their identification codes. if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ss protocol outperforms the QT protocol in terns of the number of response bits.

  • PDF

A method for various RFID reader processing based on Ontology (온톨로지 기반 다양한 RFID 리더 처리 방법)

  • No, Young-sik;Byun, Ji-Yoong;Yang, Moon-seok;Cha, Ji-Yun;Byun, Yung-cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.579-582
    • /
    • 2008
  • Since there are a lot of researches regarding RFID nowadays, the idea of RFID Middleware has great popular appeal to improve the efficiency of most use the data from RFID Readers. Even though, there are many RFID Middleware products and solutions in the developing processing, there are unsatisfied researches to manage RFID equipments effectively. In this paper, highly recommends a solution to support various RFID Readers from ALE-complient RFID Middleware in an efficient path of constructing Middleware Connection Information and data protocol form various RFID Readers as an ontology metadata. Therefore, not only reuses of RFID Reader Ontology, but also, by adding the ontology regarding additional RFID Reader and protocol data as a Middleware in a near future, it is able to extend to be treated easily.

  • PDF

An Implementation of Management Function based on RM for Smart Active RFID Reader (스마트 능동형 RFID 리더를 위한 RM 기반 관리 기능 구현)

  • Kwon, Yoon-Geun;Chung, Sang-Hwa;Lee, Yun-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1159-1167
    • /
    • 2011
  • In this paper, we proposed and implemented an EPCglobal Reader Manegement (RM) based management protocol. Using RFID Reader's management function, we could diagnose an active RFID Reader concretely which was impossible with only using Reader protocols and check the problem quickly when the RFID Reader is in failure. When diagnosing RFID Readers using the proposed RM based management protocol, we can check on their failure in stages and specifically, and can estimate range of failure. This helps RFID Reader's fast recovery, reduce loss of failure and improve QoS. We could get reader information with almost same overhead compared with the management message in LLRP. And we could get more information about RFID Reader's operation status.