• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.026 seconds

A Efficient and Secure RFID Mutual Authentication Protocol based on Hash Function (효율적이고 안전한 해쉬함수 기반의 RFID 상호 인증 프로토콜)

  • Hae-Soon Ahn;Eun-Jun Yoon;In-Gil Nam;Ki-Dong Bu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1508-1509
    • /
    • 2008
  • 본 논문에서는 기존에 제안된 RFID 인증 프로토콜이 임의의 RFID 태그로 위장한 공격자로부터 스푸핑 공격을 당할 수 있음을 증명하고, 이러한 보안 문제점을 해결한 안전하고 효율적인 RFID 상호 인증 프로토콜을 제안한다. 제안한 RFID 상호 인증 프로토콜은 기존의 RFID 인증 메커니즘들이 가지고 있는 보안 문제점들을 해결할 뿐만 아니라, 스푸핑 공격에 대한 취약점을 해결하고, 해쉬함수 연산 오버헤드를 줄여줌으로써 빠른 인증 시간을 보장하여 더욱 강력한 안전성과 효율성을 제공한다.

Enhanced Secure RFID Authentication Protocol with Searching Specific Tag (특정 태그 검색기능을 지원하는 향상된 안전성의 RFID 인증 프로토콜)

  • Ham, Hyoung-Min;Oh, Hee-Kuck;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1096-1099
    • /
    • 2008
  • 본 논문에서는 RFID시스템에서 일어날 수 있는 위험요소들을 나열하고, 이에 맞는 해결책으로 RFID 인증프로토콜을 제시하며, 일반적인 RFID 인증프로토콜에서 볼 수 없었던 RFID 검색 프로토콜에 관한 소개와 검색 프로토콜이 갖는 새로운 요구사항을 제시한다. 또한 기존에 제안된 RFID검색 프로토콜보다 향상된 보안성을 지원하는 프로토콜을 제안하며 앞으로 연구할 방향을 제시한다.

A Study on the Industrial SWOT Analysis and Benefits for the Successful RFID Implementation (성공적인 RFID 구현을 위한 산업별 SWOT 분석과 성과에 관한 연구)

  • Chang, Yun-Hee
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.93-122
    • /
    • 2007
  • RFID has fundamental influences on today's business management. This research seeks to formulate the opportunities and challenges, the strengths and weaknesses and the perceived benefits of RFID implementation in three industries: manufacturing, medical-service, and distribution. Ten companies of successful RFID deployment in Korea are presented. Field interview and panel discussion were used to explore the research purpose. The core challenges include RFID readability issues, lack of best practices, increasing prime cost, visible ROI, implementation cost, and employee's resistance. The strengths include IT infrastructure, system integration competency, RFID business model creation ability, executive's support. There is little weakness in Korea companies, there are many perceived benefits in three industries. The most distinctive finding is that the visible ROI was found out in the manufacturing industry, not in the distribution industry. The opportunities and challenges, the strengths and weaknesses and the perceived benefits are some different in three industries, which provide valuable guidance for Korean companies in seeking the RFID opportunities. This case study represents a pioneer research of RFID adoption in Korea.

  • PDF

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.

An Implementation of Management Function based on RM for Smart Active RFID Reader (스마트 능동형 RFID 리더를 위한 RM 기반 관리 기능 구현)

  • Kwon, Yoon-Geun;Chung, Sang-Hwa;Lee, Yun-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1159-1167
    • /
    • 2011
  • In this paper, we proposed and implemented an EPCglobal Reader Manegement (RM) based management protocol. Using RFID Reader's management function, we could diagnose an active RFID Reader concretely which was impossible with only using Reader protocols and check the problem quickly when the RFID Reader is in failure. When diagnosing RFID Readers using the proposed RM based management protocol, we can check on their failure in stages and specifically, and can estimate range of failure. This helps RFID Reader's fast recovery, reduce loss of failure and improve QoS. We could get reader information with almost same overhead compared with the management message in LLRP. And we could get more information about RFID Reader's operation status.

A Study on Design of RF/UHF RFID Tag Antenna Using One-Sheet Inlay Pattern (One-Sheet Inlay 패턴을 이용한 RF/UHF RFID 태그 안테나 설계에 관한 연구)

  • Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1943-1949
    • /
    • 2010
  • In this paper, we developed a RFID tag antenna using one-sheet inlay pattern which consist of two different frequencies in one layer. The antenna in one-sheet inlay RFID tag does not use different kind RFID antennas in a card but implement 13.56MHz and 900MHz RFID tag antennas in one sheet. In order to evaluate the usability of proposed method, we configured test equipments and designed 6 different patterns and test the recognition distance of each pattern. Among the one-sheet inlay RFID tag antenna designs, the pattern no.5 has good performance with recognition distance of 5.34m at 900MHz and 3.5m at 13.56MHz.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

Cold Storage Management System using RFID Deployment Simulator for Optimized Business Process (최적화된 비즈니스 프로세스를 위한 RFID 배치 시뮬레이터 기반의 냉동창고 관리 시스템)

  • Baek, Sun-Jae;Moon, Mi-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1453-1459
    • /
    • 2010
  • Recently, the aim of cold storage warehouse is not only to provide preservation of the quality of perishable foods but also to use state-of-the-art information systems to rapidly move products across the cold chain. An RFID (Radio Frequency Identification) is an automatic identification method that detects signals from mobile objects, and tracks and traces movement of the objects. RFID can be used to turn a cold storage warehouses into a real-time system. In this paper, we develop an cold storage management system to support the optimized business processes with RFID system. First of all, business processes in the cold storage warehouse are analyzed. Then design factors which should be considered for incorporating RFID are defined. Design values which set to the design factors can be extracted from using RFID deployment simulator. as a result, the design values make RFID to be efficiently integrated to existing business processes.