• Title/Summary/Keyword: 비접촉 프로토콜

Search Result 23, Processing Time 0.024 seconds

Enhanced Authentication Protocol of RFID System (RFID 시스템의 개선된 인증 프로토콜)

  • Lee, Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.193-200
    • /
    • 2007
  • There is an advantage that RFID system is better than previous bar code system in storage ability and noncontact property. But, everyone can easily receive the transmitting information by using RF signal. So, there is a problem that system security and personal privacy are threatened. In this paper, I propose RFID system that is secure against attacks like eavesdropping, replay, spoofing and location tracking and can efficiently provide mutual authentication services between reader and tag. The proposed RFID system can be used in various sections of ubiquitous computing environment.

  • PDF

Design and Implementation of hardware module to process contactless protocol(Type-B) for IC card (IC카드를 위한 비접촉 프로토콜(Type-B) 처리 모듈의 설계 및 구현)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.481-484
    • /
    • 2002
  • In recent, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process contactless protocol for implementation contactless IC card. And the hardware module consists of specific digital logic circuits that analyze digital signal from analog circuit and then generate data & status signal for CPU, and that convert the data from CPU into digital signal for analog circuit.

  • PDF

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

FQTR : Novel Hybrid Tag Anti-Collision Protocols in RFID System (FQTR : RFID 시스템을 위한 새로운 하이브리드 태그 충볼 방지 프로토콜)

  • Jung, Seung-Min;Cho, Jung-Sik;Kim, Sung-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.560-570
    • /
    • 2009
  • RFID, Radio Frequency Identification, is a technology of automated identification replacing bar-code. RFID technology has advantages that it recognizes fast and it is strong to contamination using wireless communication. However, there are difficult problems that should be solved for popularization of RFID. Among of these, tag anti-collision problem is dealed in this paper. It affected the performance of RFID system directly. This paper analyzes conventional algorithms and proposes new algorithms of tag anti-collision. The algorithm proposed was composed of appropriate properties to each phase of distribution and recognition as hybrid between ALOHA-based algorithm and QT-based algorithm. At phase of distribution, the number of tags recognizing at a frame was reduced using ALOHA-based algorithm. It addressed the delay problem because of deep depth of tree. At phase of recognition, it solved ALOHA-based chronic problem that couldn't recognize all the tags sometimes. Moreover, QTR algorithm that recognize by reversed tag IDs was adopted for the performance. The FQTR algorithm proposed in this paper showed brilliant performance as compared with convention algorithms by simulation.

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

Simulation System for Anti-Collision Protocols in RFID (RFID 태그 충돌 방지 프로토콜의 성능 비교를 위한 시뮬레이션 시스템)

  • Shin Jae-Dong;Yeo Sang-Soo;Kim Sung-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.91-93
    • /
    • 2006
  • RFID(Radio Frequency IDentification) 기술은 RF 신호를 사용하여 물품에 부착된 전자 태그(tag)를 식별하는 비접촉자동인식 기술이다. 이런 RFID 기술의 확산을 위해서는 리더가 다수의 태그를 빠른 시간 안에 인식하는 다중 태그 식별 문제를 해결 해야만 한다. 지금까지 이 문제를 해결하기 위한 충돌 방지(anti-collision) 알고리즘이 많이 개발되었다. 본 논문에서는 이런 충돌 방지 알고리즘 중에서 18000-6 Type A, Type B와 Type C로 새롭게 채택된 EPCglobal Class1 Generation2, 그리고 Query Tree Protocol에 대한 시뮬레이션 시스템의 구조를 소개하고 실제 시뮬레이션 했을 때의 각 알고리즘에 대한 간단한 성능 평가를 한다.

  • PDF

Design of hardware module to process contactless protocol for IC card system (IC카드 시스템을 위한 비접촉 프로토콜 처리모듈 설계)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.713-716
    • /
    • 2003
  • In recent, the contactless IC card is widely used in traffic, access control system and so forth. Contactless smart cards use a technology that enables card readers to provide power for transactions and communications without making physical contact with the cards. Usually electromagnetic signal is used for communication between the card and the reader. Contactless card is highly suitable for large quantity of card access and data transaction. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process contactless protocol for implementation contactless IC card. And the hardware module consists of specific digital logic circuits that analyze digital signal from analog circuit and then generate data & status signal for CPU, and that convert the data from CPU into digital signal for analog circuit.

  • PDF

A Design and Simulation of Mobile RFID Contents Expression Language for Bus Guidance Services (버스 안내 서비스를 위한 모바일 RFID 컨텐츠 표현 언어 설계 및 시뮬레이션)

  • Yeon Dong-Hee;Kim Yong-Woon;Yoo Sang-Keun;Lee Jun-Seob;Kim Hyoung-Jun;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1432-1438
    • /
    • 2005
  • The RFID (Radio Frequency Identification) technology is a non-contact identification system which can wireless reading of information, by attaching tags on objects; various applications of the technology are feasible throughout a dive of industries, and researches are currently under way. Recently, in connection with the wireless communication industry, application service models conveying information to the users through mobile devices with RFID readers were suggested. Such application service based on mobile RFID technology requires schema that models the form of data. Therefore, this study analyzes the mobile RFID application service model that will be serviced in the mobile environment, functions and elements of the protocol, and the interface, designing a language to process the data and express contents in the said service models, and we simulated the service for test it.

A Design of Language for Mobile RFID Application Contents Expression (모바일 RFID 응용 컨텐츠 표현 언어 설계)

  • Yeon, Dong-Hee;Kim, Yong-Woon;Yoo, Sang-Keun;Lee, Jun-Sub;Kim, Hyoung-Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.975-978
    • /
    • 2005
  • The RFID(Radio Frequency Identification) technology is a non-contact identification system which can wireless reading of information, by attaching tags on objects; various applications of the technology are feasible throughout a diversity of industries, and researches are currently under way. Recently, in connection with the wireless communication industry, application service models conveying information to the users through mobile devices with RFID readers were suggested. Such application service based on mobile RFID technology requires schema that models the form of data. Therefore, this study analyses the mobile RFID application service model that will be serviced in the mobile environment, functions and elements of the protocol, and the interface, designing a language to process the data and express contents in the said service models.

  • PDF

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF