• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.028 seconds

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

RFID Agent based User Mobility Support Mechanism for Secure Information Transmission (안전한 정보 전송을 위한 RFID 네트워크 에이전트 기반의 사용자 이동성 제공 방안)

  • Yun, Dong-Geun;Seo, Chang-Ho;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.45-53
    • /
    • 2010
  • In this paper, we propose RFID network agent based user mobility support mechanism for secure information transmissions. When a user with RFID tag who enjoys service moves to different attachment points, the user mobility is supported to provide continuously service and the information can be securely transmitted. Although there is an existing study for providing user mobility, it has a problem which the handover latency time is long. To settle this problem, we present a scheme for minimizing handover latency time and compare handover latency time of existing and proposed scheme. We confirm that proposed mechanism has low latency time than existing mechanism by mathematical analysis using the queuing theory and show that proposed mechanism is more superior to the existing mechanism.

A Study on the Reliability Improvement of RFID System (REID 시스템의 신뢰성 향상에 관한 연구)

  • Ham, Jung-Ki;Lee, Cheong-Jin;Kwon, Oh-Heung
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.169-174
    • /
    • 2006
  • In recent years, RFID is widely used in industrial applications including factory, material flow, logistics and defense areas. In this paper, The convolutional encoding and viterbi decoding is also implemented to improve the system performance. in an FPGA chip. The used convolution code is constraint length K=3 and rate R=1/2. The length of command frame and response frame is total of 48bits consisting of SOF 8 bits, command 16 bits, CRC 16 bit, and EOF 8 bits. And also the frame error rates are measured under the channel of line-of-sight and non line-of-sight, respectively. The performances are analyzed with FSK modulation only and FSK modulation added with convolutional encoding. These two measured results are compared with that of a RFID system with ASK modulation.

  • PDF

The Design and Implementation of Automotive Smart-key System Using general-purpose RFID (교통카드와 같은 범용 RFID를 활용한 자동차용 스마트키 시스템 설계 및 구현)

  • Lee, Yun-Sub;Kim, Kyeong-Seob;Yun, Jeong-Hee;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.42-50
    • /
    • 2009
  • Ubiquitous computing technology is widely used in not only our everyday lives but also in education, medical care, military, environment and administration. RFID system, the basis of ubiquitous, is in the spotlight which can be an alternative solution of a bar code recognition system and magnetic system as they basically have practicality and security issues. An electronic authentication named smart-key system is recently concerned by an alternative solution of the security unit for an automobile. RFID system which has a general purpose is also in the limelight by an application technology. In this paper we designed vehicle smart key system with general-propose RFID system that is already in use. First, we designed control unit and RFID card reader for vehicle smart key system. Then we propose an algorithm and prove that the vehicle key system is controllable by showing the result of implementing and testing, after installing. Also security level is enlarged by proposing a authentication protocol between RFID reader and control unit.

Robust Matrix-based RFID Mutual Authentication Protocol (견고한 행렬기반 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.883-891
    • /
    • 2008
  • In 2006, Lee and Ahn proposed a matrix-based RFID authentication protocol which eliminates the security problems in HB and $HB^+$ RFID authentication protocols. Their proposed protocol provides the following three merits: (1) it reduces the computational costs of the RFID tag. (2) it reduces the communication overhead between the reader and the tag. (3) it protects the user privacy. However, this paper points out that Lee and Ahn's proposed protocol is insecure to various attacks because it does not provide mutual authentication which the RFID tag does not authenticate the legality of the RFID reader unlike their claims. In addition, this paper proposes an improved matrix-based RFID mutual authentication protocol that can provide the mutual authentication. As a result, the proposed protocol not only can provide strong security and but also guarantee high efficiency because it reduces the communication rounds compare with Lee-Ahn's protocol.

The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems (모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법)

  • Kim, Dong-Chul;Chun, Ji-Young;Choi, Eun-Young;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.189-198
    • /
    • 2009
  • Mobile RFID system is a next generation technology which combines the existing RFID systems with mobile systems. It is newly expected to provide additional services and will be broadly used in everyday life; however, it sometimes causes the privacy or security problems generated by existing RFID systems and the additional privacy or security problems. Moreover, even if many methods have been proposed to solve those problems, it is still difficult to adapt to reality or to guarantee the security perfectly. Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID systems which require to protect the privacy. This mechanism suggests that own tagging-products needed to protect privacy using mobile reader of personal don't provide any information to other readers except their own reader. In addition to, proposing mechanism is the efficient mechanism which largely reduces the process to maintain the synchronization when happen to the DoS attack or system error.

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

Development of Accelerated Life Test Method for UHF RFID Tags for Medicine Supply Management (의약품 유통 관리용으로 사용되는 UHF 대역 RFID Tag의 가속수명시험법 개발)

  • Yang, Il Young;Yu, Sang Woo;Park, Jung Won;Joe, Won-Seo
    • Journal of Applied Reliability
    • /
    • v.14 no.2
    • /
    • pp.93-96
    • /
    • 2014
  • RFID (Radio Frequency IDentification) system is recognition technology which can maintain various object's information. Reliability of RFID tags is the most important factor in RFID system. In this paper, we proposed ALT (Accelerated Life Test) method for UHF RFID tags. Temperature and humidity were adopted as stress factors and the accelerated life tests were conducted in three different conditions. We performed failure analysis for identifying failure mechanism and statistical analysis of test data. In the statistical analysis, we employed Inverse Power law for relationship between tag's life and stress. Through the statistical analysis, we proposed acceleration factor for several levels of temperature-humidity. The reliability qualification test plans were also designed for the tag's target reliability.

RFID/USN 서비스 시장 전망 및 적용 사례 분석

  • Im, Myeong-Hwan;Park, Yong-Jae
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.6
    • /
    • pp.3-12
    • /
    • 2008
  • 본 논문은 RFID/USN 서비스의 국내외 시장 전망 및 적용 사례를 분석하였으며, 향후 서비스를 확대 할 수 있는 방안을 제시하였다. 국내외 RFID/USN 서비스 시장 규모는 기기 시장보다 더 커질 것으로 전망되며, 국방/안보, 항공/항만, 도로/교통, 유통/물류, 산업/건설, 제조/공정, 식품/농수 축산, 의료/보건, 도서/출판, 교육/문화/엔터테인먼트, 보안/방범, 재난/재해/환경 등의 분야에서 다양하게 적용되고 있는 것으로 나타났다. RFID/USN 서비스를 확대하기 위해서는 공공 분야를 중심으로 한 대규모 선도 수요 창출이 선행되어야 하며, 모바일 RFID 등 신규 서비스의 창출 및 활성화를 위한 정책 대안이 마련되어야 한다. 그리고 RFID/USN 서비스의 시장 규모와 보급시기 등을 고려하여 우선적으로 적용해야 할 서비스의 발굴을 확대하고, RFID/USN 도입 성과를 가시화하여 민간의 수요를 촉발할 필요가 있다.

An RFID-based Patient Authentication Protocol for u-Healthcare (u-헬스케어를 위한 RFID 기반 환자 인증 프로토콜)

  • Yoo, Kee-young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.1
    • /
    • pp.45-49
    • /
    • 2014
  • In this paper, we propose a secure and efficient RFID-based patient authentication protocol to not only authenticate patients' authenticity but also protect patients' personal medical informations for u-Healthcare environments. Since the proposed RFID-based patient authentication protocol provides strong security and efficiency, it can be used practically for patient authentication and personal medical information protection on the high technology medical environments such as u-Hospital and u-Healthcare.