• 제목/요약/키워드: Identification Protocol

검색결과 352건 처리시간 0.023초

A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification

  • Jia, Xiaolin;Feng, Yuhao;Gu, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권4호
    • /
    • pp.1460-1478
    • /
    • 2020
  • This paper proposes a novel anti-collision protocol for large-scale RFID tags identification, named Bi-response Collision Tree Protocol (BCT). In BCT, two group of tags answer the reader's same query in two response-cycles respectively and independently according to the bi-response pattern. BCT improves the RFID tag identification performance significantly by decreasing the query cycles and the bits transmitted by the reader and tags during the identification. Computation and simulation results indicate that BCT improves the RFID tag identification performance effectively, e.g. the tag identification speed is improved more than 13.0%, 16.9%, and 22.9% compared to that of Collision Tree Protocol (CT), M-ary Collision Tree Protocol (MCT), and Dual Prefix Probe Scheme (DPPS) respectively when tags IDs are distributed uniformly.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

RFID의 프로토콜 및 인터페이스 파라미터 (Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification)

  • 최성운
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2007년도 추계학술대회
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜 (A Revised QT Protocol for Tag Identification in RFID Systems)

  • 임인택;최진오
    • 한국정보통신학회논문지
    • /
    • 제10권3호
    • /
    • pp.430-436
    • /
    • 2006
  • 본 논문에서는 RFID 시스템에서 식별영역 내에 있는 태그들을 식별하기 위하여 무기억 특성을 갖는 QT 프로토콜을 개선한 QT_rev 프로토콜을 제안한다. QT_rev 프로토콜에서는 질의 문자열이 식별코드의 처음 비트들과 일치하는 태그는 식별코드 중에서 질의 문자열을 제외한 나머지 비트들로만 응답한다. 또한 리더는 태그들의 응답 문자열 중에서 충돌이 발생한 비트 위치를 알 수 있으므로 충돌이 발생한 위치가 태그 식별코드의 마지막 비트이면 리더는 더 이상의 질의가 없이 두 개의 태그를 동시에 식별할 수 있다. 성능 분석의 결과, 본 논문에서 제안한 QT_rev 프로토콜은 QT 프로토콜에 비하여 리더의 질의 횟수와 태그의 응답 비트 수가 월등히 적음을 알 수 있었다.

RFID 시스템에서 중지 신호를 이용한 충돌방지 프로토콜 (Anti-Collision Protocol with Stop Signal in RFID Systems)

  • 임인택;최진오
    • 한국정보통신학회논문지
    • /
    • 제10권4호
    • /
    • pp.638-644
    • /
    • 2006
  • 본 논문에서는 RFID 시스템에서 식별영역 내에 있는 태그들을 식별하기 위하여 무기억 특성을 갖는 QT 프로토콜을 개선한 QT_ss 프로토콜을 제안한다. QT_ss 프로토콜에서는 질의 문자열이 식별코드의 처음 비트들과 일치하는 태그는 자신의 식별코드로 응답한다. 태그가 응답하는 동안 리더가 충돌을 감지하면 리더는 중지 신호를 방송한다. 한편 태그들이 응답을 전송하는 도중에 중지 신호를 수신하면 전송을 중단한다. 성능 분석의 결과, 본 논문에서 제안한 QT_ss 프로토콜이 QT 프로토콜에 비하여 태그의 응답 비트 수가 월등히 적음을 알 수 있었다.

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제26권5_6호
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

RFID 시스템에서 중지신호를 이용한 쿼리 트리 프로토콜 (A Query Tree Protocol with Stop Signal in RFID Systems)

  • 임인택
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2006년도 춘계종합학술대회
    • /
    • pp.526-529
    • /
    • 2006
  • 본 논문에서는 RFID 시스템에서 식별영역 내에 있는 태그들을 식별하기 위하여 무기억 특성을 갖는 QT 프로토콜을 개선한 QT_ss 프로토콜을 제안한다. QT_ss 프로토콜에서는 질의 문자열이 식별코드의 처음 비트들과 일치하는 태그는 자신의 식별코드로 응답한다. 태그가 응답하는 동안 리더가 충돌을 감지하면 리더는 중지 신호를 방송한다. 한편 태그들이 응답을 전송하는 도중에 중지 신호를 수신하면 전송을 중단한다. 성능 분석의 결과, 본 논문에서 제안한 QT_ss 프로토콜이 QT 프로토콜에 비하여 태그의 응답 비트 수가 월등히 적음을 알 수 있었다.

  • PDF

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • 충청수학회지
    • /
    • 제20권4호
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제29권3_4호
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

Fair Identification Scheme for STAC Protocol in 13.56MHz RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제9권3호
    • /
    • pp.260-265
    • /
    • 2011
  • In RFID System, when multiple tags respond simultaneously, a collision can occur. A method that solves this collision is referred to anti-collision algorithm. In 13.56MHz RFID system, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. In STAC protocol, there is no differentiation between the collided tags and others in the identification process. Therefore, tags may never be successfully identified because its responses may always collide with others. This situation may cause the tag starvation problem. This paper proposes a fair identification scheme for STAC protocol. In the proposed scheme, if the number of collided slots is large during a query round, the reader broadcasts a CollisionRound command to begin a collision round. During the collision round, the reader identifies only tags that are experienced collision during the previous query round.