• Title/Summary/Keyword: RFID Implementation

Search Result 466, Processing Time 0.032 seconds

Modified AES having same structure in encryption and decryption (암호와 복호가 동일한 변형 AES)

  • Cho, Gyeong-Yeon;Song, Hong-Bok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. In this paper, we propose a SPN which has a symmetric structure in encryption and decryption. The whole operations of proposed algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2 round, applies a right function and the last half of them, (N+1)/2 to N round, employs an inverse function. And a symmetry layer is located in between the right function layer and the inverse function layer. In this paper, AES encryption and decryption function are selected for the right function and the inverse function, respectively. The symmetric layer is composed with simple matrix and round key addition. Due to the simplicity of the symmetric SPN structure in hardware implementation, the proposed modified AES is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

  • Li, Wei;Zhang, Wenwen;Gu, Dawu;Tao, Zhi;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.793-810
    • /
    • 2015
  • The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

Implementation of USN based Personal Safety Belt Monitoring System (USN 기반 개인 안전벨트 모니터링 시스템의 구현)

  • Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.724-730
    • /
    • 2015
  • The safety-related accident in which the field operators of all sorts of industrial sites don't fasten the seat belt properly and which it generates is the tendency that it increases constantly every year. By sounding the announcement sound in case the operator did not fasten the seat belt and the person seat belt monitoring system proposed in this paper progressed the work the operator fastened the seat belt properly. In addition, at the same time with that, since the administrator monitored the seat belt wearing or no of the operators on a real time basis the safety-related accident which did not wear the safety equipment properly and which it generates was prevented.

Implementation of Zigbee-based Publish/Subscribe System for M2M/IoT Services (M2M/IoT 서비스를 위한 지그비 기반의 Publish/Subscr ibe 시스템 구현)

  • Lee, Dokyeong;Choi, Deokjai
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1461-1472
    • /
    • 2014
  • Recently, smart devices has been spreaded and the definition of RFID/USN(Radio Frequency Identification/Ubiquitous Sensor Network) technology has also extended. So, originally, human is an agent of communications but now, 'the things' are also an agent of communication. That is, Internet of Things(IoT). IoT is very big IT infra technology that is based on wire-wireless network technologies such as Bluetooth and Wi-Fi. However, in reality, IoT service that can provide various meaning and integrate smoothly is not appear yet. To solve these problems of IoT, we implemented Publish/Subscribe system, which operate in Zigbee based wireless sensor network by using MQTT-SN protocol. Moreover, this system can operate with combining MQTT system that is already existed in external Internet network so, extensibility and flexibility aspect is excellent. We show that possibility of IoT services that is combined between different heterogeneous network through the MQTT-SN.

An Implementation of Attendance Management System using NFC (NFC를 활용한 출결관리 시스템 구현)

  • Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1639-1644
    • /
    • 2013
  • Recently, interest is rapidly increasing in short-range wireless communication such as NFC (Near Field Communication). In order to minimize the attendance time, we propose the attendance management system using the NFC tags attached in all of the desks in a classroom and NFC readers embedded in most of the smart-phones released in lately. The system consists of PC version web-application for professors and the android version app-application for students. And it provides the professors with more lecture time by saving the attendance check time. The contribution of this paper include that it proposes and develops the prototype of the attendance management system using NFC and proves that the system is applicable to the various kinds of educational organizations.

Implementation of Context based Service Framework for Mobile Environment (모바일 환경에 적합한 상황정보 기반 서비스 프레임워크의 개발)

  • Jeong, Seong-Hun;Kang, Bum-Seok;Yoon, Hyung-Min;Han, Tack-Don
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1381-1384
    • /
    • 2005
  • 빠른 속도로 확산되고 있는 모바일 기기는 카메라, GPS, RFID 등과 같은 다양한 센서를 장착하고 Wi-Fi, WiMAX, WiBro 등의 무선 네트워크를 지원하는 형태로 발전하고 있다. 이러한 발전으로 사용자는 언제 어디서나 주변의 컴퓨팅 자원을 이용할 수 있게 되었고 모바일 기기의 서비스는 주변의 센서 또는 임베디드 컴퓨팅 장치로부터 수집되는 다양한 주변 환경 정보와 시스템 상태정보, 네트워크 상황정보 등의 디지털 정보를 이용하여 주변상황인식(context awareness)이 가능한 스마트 서비스로 발전하고 있다. 주변상황인식을 위하여 서비스는 주변에 존재하는 다양한 장치를 효율적으로 검색하고 이질적인(Heterogeneous) 장치와 정보의 표현 및 전송에 대한 호환성이 필요하다. 이러한 문제는 규격화된 프레임워크의 사용으로 해결할 수 있으며 상황정보의 관리 기능을 추가하여 서비스 개발의 생산성을 높일 수 있다 본 논문에서는 모바일 컴퓨팅 환경에서 상황정보의 제공과 사용에 적합한 프레임워크로서 MoCE(Mobile Context Exploerer) 아키텍처를 설계하였다. MoCE 는 상황정보의 수집, 변환, 분류, 통합 등의 기능을 제공하고 모바일 환경의 특성에 기인한 상황정보 발견 및 전송 프로토콜을 설계하여 사용하고 있다. 또한 Surround multiCam 서비스 예제를 구현하여 제안한 아키텍처의 안정성 및 성능을 실험하였다.

  • PDF

Issues and Roles of the Transportation Technology under the Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 교통기술의 이슈와 역할)

  • Lee, Chungwon;Byun, Wanhee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.2D
    • /
    • pp.259-263
    • /
    • 2006
  • As the concept of Ubiquitous Computing has become an important issue, we need to have a voice in the field of Transportation. Ubiquitous Computing means that IT network based on realization of 5 Any(Anytime, Anywhere, Anything, Anynetwork, Anydevice) is deeply penetrated into our daily life. As ITS has developed with the aid of IT and Transportation Technology together, we need to discuss u-Transportation concept with Ubiquitous Computing and Transportation Technology. According to the recent papers and studies, Transportation or Transportation Information sector is mentioned as a major application of Ubiquitous Computing. However, most of the studies are limited to the basic concept without any in-depth understanding about Transportation. This paper present the implementation of u-Transportation and the role of Transportation Technology based on recent technology trend.

Design and Implementation of Unified Index for Moving Objects Databases (이동체 데이타베이스를 위한 통합 색인의 설계 및 구현)

  • Park Jae-Kwan;An Kyung-Hwan;Jung Ji-Won;Hong Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.33 no.3
    • /
    • pp.271-281
    • /
    • 2006
  • Recently the need for Location-Based Service (LBS) has increased due to the development and widespread use of the mobile devices (e.g., PDAs, cellular phones, labtop computers, GPS, and RFID etc). The core technology of LBS is a moving-objects database that stores and manages the positions of moving objects. To search for information quickly, the database needs to contain an index that supports both real-time position tracking and management of large numbers of updates. As a result, the index requires a structure operating in the main memory for real-time processing and requires a technique to migrate part of the index from the main memory to disk storage (or from disk storage to the main memory) to manage large volumes of data. To satisfy these requirements, this paper suggests a unified index scheme unifying the main memory and the disk as well as migration policies for migrating part of the index from the memory to the disk during a restriction in memory space. Migration policy determines a group of nodes, called the migration subtree, and migrates the group as a unit to reduce disk I/O. This method takes advantage of bulk operations and dynamic clustering. The unified index is created by applying various migration policies. This paper measures and compares the performance of the migration policies using experimental evaluation.

Design and Implementation of Real-Time Support System for Purchasing Activities Based on Ambient Service Model (엠비언트 서비스 모델 기반의 실시간 구매활동 지원 시스템 설계 및 구현)

  • Seo, Kyung-Seok;Lee, Ryong;Jang, Yong-Hee;Kwon, Yong-Jin
    • Spatial Information Research
    • /
    • v.18 no.2
    • /
    • pp.67-75
    • /
    • 2010
  • When people are shopping at a large shopping mall, they usually become to go around many stores for looking for better products and comparing them. In this paper, we design and implement a purchasing activity support system based on an Ambient Service Model that provides relevant stores information on map interface hierarchically through user contexts based search, to support such user's purchasing activities with the help of relevant information. In this system, users can search for relevant stores information through the system by Ambient Query which is created by their location and stores information with a mobile device. Then, users obtain relevant stores information provided in the form of hierarchy of keywords as a highly condensed summary and easily figure out the locations of the stores on a map interface. Moreover, users search additional other kinds of relevant stores information over the hierarchy of keywords. Eventually, users can obtain relevant stores information intuitively and conveniently without complex search processes. We implemented this system by integrating the subordinate technologies such as RFID, map-based, location-based and ontology technology. We also performed experiments on a well-known shopping region (Ilsan Lapesta shopping mall, Goyang-city Gyeonggi-do, Korea). Finally, we also confirmed that users' shopping activities were significantly improved by utility the present system.