• Title/Summary/Keyword: Location of Tags

Search Result 125, Processing Time 0.032 seconds

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

Improving the Key Search using Parallelism in RFID Privacy Protection

  • Shin, Myeong-Sook;Kim, Choong-Woon;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.19-24
    • /
    • 2007
  • Abstract. In the ubiquitous environment of the next generation, RFID is predicted to occupy an important technical location and also expected to apply to various fields. However, the properties of tags in itself which is the core of RFID have a dysfunction like an invasion of privacy for user. An existing cryptanalytic protection scheme of the information leakage have a difficult problem to apply to RFID tags for privacy protection. We applied Ohkubo et al.'s scheme to the protection of the tag's information efficiently in the RFID system environment using low-cost tags. But, this method has all informations of tagsto identify tag's ID and then performs the process of identification in sequence in the Back-end server. These processes have lots of computations so that it have problems about a scalability. In this paper, we are based on Ohkubo et al.'s scheme to solve problems, and then analyze the parallelism with the Hellman's tradeoff method, divide it into nodesin parallel. In this paper, we are based on Okubo et al.'s scheme to solve problems, and then analyze the parallelism with Hellman's tradeoff method, divide it into the ${\omega}$ node in parallel. as a result, we can reduce the computing complexity of key search to $O(\frac{m^{2/3}n^{2/3}}{\omega})$ seconds from O(mm) seconds. finally we show the results to be enhanced the scalability.

  • PDF

Investigating an Automatic Method in Summarizing a Video Speech Using User-Assigned Tags (이용자 태그를 활용한 비디오 스피치 요약의 자동 생성 연구)

  • Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.1
    • /
    • pp.163-181
    • /
    • 2012
  • We investigated how useful video tags were in summarizing video speech and how valuable positional information was for speech summarization. Furthermore, we examined the similarity among sentences selected for a speech summary to reduce its redundancy. Based on such analysis results, we then designed and evaluated a method for automatically summarizing speech transcripts using a modified Maximum Marginal Relevance model. This model did not only reduce redundancy but it also enabled the use of social tags, title words, and sentence positional information. Finally, we compared the proposed method to the Extractor system in which key sentences of a video speech were chosen using the frequency and location information of speech content words. Results showed that the precision and recall rates of the proposed method were higher than those of the Extractor system, although there was no significant difference in the recall rates.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

RFID-based Automatic Entity Information Management System for Smart Refrigerator (스마트 냉장고를 위한 RFID 기반 물품 정보 자동 관리 시스템)

  • Lee, Ju-Dong;Kim, Hyung-Suk;Kim, Tae-Hyoun;Suh, Hyo-Joong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.43-54
    • /
    • 2008
  • In this paper, we implement an automatic entity information management system for smart refrigerator using RFID technology in which objects containing electronic tags are automatically identified using radio wave. Unlike current "smart" refrigerators, the system presented in this paper implements smart tag information acquisition mechanism and real-time information management system to provide various information on entities in refrigerators to local and remote users. As the first step, this paper analyzes the requirements for smart refrigerator system based on the RFID and suggests design considerations. Based on the analysis, we propose and implement an efficient tag location tracking method based on antenna transfer method and an intelligent tag information management system based on embedded database and web server. We also provide a wide range of experimental results on the number of tags identified at a time and the tag recognition ratio according to the RFID antenna transfer speed and the angle between tag reader and tags.

  • PDF

A Study on the RTLS based Dynamic Planning of Yard Tractors in Container Terminals

  • Lee, Seok-Yong;Lee, Chul-Ho
    • Journal of Navigation and Port Research
    • /
    • v.31 no.2
    • /
    • pp.141-149
    • /
    • 2007
  • The competitiveness of container terminals hinges on minimizing the time vessels spend in port and on schedule services. Many previous researches on container terminals have tried to optimize the equipment allocation plan and to improve the activity of resources. Nevertheless, there have been few researches conducted on yard tractors, which move containers between the quay and the yard. The aim of this study is to propose the use of Real Time Location Systems (RTLS) based Dynamic Planning for yard tractors. Only RFID (Radio Frequency Identification) tags, which are attached to yard tractors, are able to support RTLS implementation. The system can provide real time job ordering in terms of load balancing using the information on location, in regards to the movement of yard tractors. This study will present the practical feasibility of RTLS, which can ultimately reduce the congestion of Hot Queues in container terminals. As a result, container terminals can be more productive and competitive. In order to accomplish the purpose of this study, we examined previous studies on the competitiveness of container terminals and summarized the potential of RTLS using RFID. In addition, we identified the role of yard tractors and proposed the two rules of Dynamic Planning for the yard tractors. We then fulfilled computational experiments on how yard tractors carrying containers by RTLS ordering Finally, the benefits and the implications of this study are discussed.

Implementation of Mobile Node Monitoring System for Campus Vehicle Management (RSSI 기반 센서 노드 위치 관리 기법을 적용한 캠퍼스 차량 관리 시스템 구현)

  • Kim, Hyun-Joong;Yang, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.999-1004
    • /
    • 2010
  • Most of campus vehicle management systems, so far, simply manages coming in or go out of vehicles, issuing a parking tickets. Recently some of them use RFID tags to count total numbers of cars in the campus, excluding exact parking position management. In this paper we propose a new campus vehicle management system using wireless sensor network location management scheme. This system adopts RSSI based location management method with some performance improvement technique. According to the experimental result, this proposed scheme can be used to implement an effective campus vehicle management system.

Implementation of Mobile Node Monitoring System for Campus Vehicle Management (캠퍼스 내 차량 관리를 위한 이동노드 위치 감시 시스템 구현)

  • Kim, Hyun-Joong;Choi, Jun-Young;Yang, Hyun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.316-319
    • /
    • 2008
  • Most of campus vehicle management systems, so far, have simple functions such as managing vehicle in/out or issuing parking tickets. Recently some of them use RFID tags to count total numbers of cars in the campus, excluding exact parking position management. In this paper we propose a new campus vehicle management system using wireless sensor network location management scheme. This system adopts RSSI based location management method with some performance improvement technique. According to the experimental result, this proposed scheme can be used to implement an effective campus vehicle management system.

  • PDF

Mobile Reader Selection for Improving Precision of Location Estimation in RTLS (위치 측정 정확도 향상을 위한 RTLS의 이동형 리더 선택)

  • Kim, Jam-Je;Son, Sang-Hyun;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.45-49
    • /
    • 2010
  • RTLS (Real Time Locating Systems) are used to track and identify the location of objects in real time. RTLS generally consist of tags, readers and engine etc. and applied in various environments. One problem encountered in RTLS is constraints for setting up readers according to environments. In these challenging environments, it is necessary to develop techniques that can use mobile readers. As mobile reader increase, whole reader increase. And it is necessary to develop technique that can select useful readers. Selected readers including mobile readers take effect performance of RTLS. This paper introduces the technique for selecting good readers using the convex hull algorithm. The result show the good performance which based on tag's location error and reduce the networking overhead.