• Title/Summary/Keyword: Contactless Protocol

Search Result 13, Processing Time 0.025 seconds

Design of hardware module to process contactless protocol for IC card system (IC카드 시스템을 위한 비접촉 프로토콜 처리모듈 설계)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.713-716
    • /
    • 2003
  • In recent, the contactless IC card is widely used in traffic, access control system and so forth. Contactless smart cards use a technology that enables card readers to provide power for transactions and communications without making physical contact with the cards. Usually electromagnetic signal is used for communication between the card and the reader. Contactless card is highly suitable for large quantity of card access and data transaction. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process contactless protocol for implementation contactless IC card. And the hardware module consists of specific digital logic circuits that analyze digital signal from analog circuit and then generate data & status signal for CPU, and that convert the data from CPU into digital signal for analog circuit.

  • PDF

Design and Implementation of Embedded Contactless (Type-B) Protocol Module for RFID (RFID를 위한 내장형 비접촉(Type-B) 프로토콜 지원 모듈 설계 및 구현)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.255-260
    • /
    • 2003
  • In recent, as a typical example of RFID, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process embedded contactless protocol for implementation contactless IC card. And the hardware module consists of analog circuits and specific digital logic circuits. This paper also describes more effective design method of contactless IC card, which method separates into analog circuit parts, digital logic circuit part, and software parts according to the role of the design parts.

Design and Implementation of hardware module to process contactless protocol(Type-B) for IC card (IC카드를 위한 비접촉 프로토콜(Type-B) 처리 모듈의 설계 및 구현)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.481-484
    • /
    • 2002
  • In recent, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process contactless protocol for implementation contactless IC card. And the hardware module consists of specific digital logic circuits that analyze digital signal from analog circuit and then generate data & status signal for CPU, and that convert the data from CPU into digital signal for analog circuit.

  • PDF

Contactless Smart Card as a Cache for Geocaching

  • Burda, Karel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.205-210
    • /
    • 2021
  • In this paper, the possibility of using a contactless smart card as a cache for geocaching is analyzed. Geocaching is an outdoor game in which players search for hidden boxes, or caches based on geographical coordinates. The problems with this game are the possibility of players cheating and the need to maintain the caches. And then there is the problem of the ignorant public accidentally discovering a cache and considering it an explosive device. This paper proposes a concept for a possible solution to the above problems by replacing the boxes with conventional contactless smart cards. Also, this concept makes geocaching more attractive by using various games. This paper proposes a system architecture as well as the cryptographic protocol required for secure communication between the player's smartphone and the card.

Implementation of the contact and contactless IC Card OS for Java Card (자바 카드에서 접촉 및 비접촉 겸용 IC카드 OS의 설계 및 구현)

  • 주홍일;손수호;전용성;전성익
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.375-378
    • /
    • 2002
  • This paper describes tile design and implementation of contact and contactless If card OS(Operating System) for Java Card, namely JCOS(Java Card 05). The JCOS complies with ISO/IEC 7816 and IS0/1EC 14443 standards. The JCOS conforms to Java Card 2.1.2 specifications. The JCOS is running on 32-bit ARMTTDMI with public key crypto-coprocssor. This paper describes only the dual-interface protocol of the JCOS which supports contact and contactless applications in a single chip. The JCOS has been completed with our sample banking service and access control service in ETRI up to now.

  • PDF

Implementation of the T:1 protocol based on lava Card for USIM (자바 카드를 기반으로 한 UISM 용 T=1 프로토콜의 구현)

  • 주홍일;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.800-803
    • /
    • 2004
  • This paper describes the design and implementation of the T=1 protocol based on lava Card. The T=1 protocol implemented in this paper complies with ISO/IEC 7816 standard. Also, JCOS(Java Card Operating Systems) including the contactless card protocol conforms to Java Card 2.2.1 specification and is running on 32-bit ARM7/TDMI processor. The protocol stack proposed and implemented in this paper is easy to maintenance of protocol independently. To verify the T=1 protocol implemented in this paper we tested the T=1 protocol scenarios defined in ISO/IEC 7816-3 Annex A. And we tested using USIM(Universal Subscriber Identity Module) cards, which include the implemented T=1 protocol. The T=1 protocol was tested and passed all against the specification 3GPP TS 31.122, which was the Conformance Test Specification for USIM cards including the test suites of both transmission protocols.

  • PDF

Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment

  • Song, In-Chan;Fan, Xiao;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.299-311
    • /
    • 2008
  • The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs when there is interference in communication between one reader and the tags, due to the signals from other readers. The reader collision problem is considered as the fundamental problem affecting high density RFID reader installations. In this paper, we analyze the existing reader anti-collision algorithms. We also propose a pulse protocol-based reader anti-collision algorithm using slot occupied probability (SOP). The implementation of this improvement is simple, yet it effectively mitigates most reader collisions in dense reader mode, as shown in our simulation. That is, the proposed algorithm reduces the identification time, and increasesthe system throughput and system efficiency compared with the conventional reader anti-collision algorithms.

Strong Yoking Proof Protocols for RFID Tags (RFID tag를 위한 강력한 Yoking Proof Protocols)

  • Cho, Jung-Sik;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.310-318
    • /
    • 2007
  • The RFID system is a non-contact automatic identification system that identifies tags through a reading device by attaching small, inexpensive tags on goods. This system is expected to supplant barcodes, the contactless reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously And he presented a yoking proof protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either. In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for n tags.

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.