• Title/Summary/Keyword: RFID Security

Search Result 517, Processing Time 0.032 seconds

Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application (RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

Lightweight Cryptography and RFID: Tackling the Hidden Overhead

  • Poschmann, Axel;Robshaw, Matthew J.B.;Vater, Frank;Paar, Christof
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.98-116
    • /
    • 2010
  • The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implementation there can be significant hidden overheads. In this paper we consider the case of cryptoGPS and we outline a full implementation that has been fabricated in ASIC. Interestingly, the implementation requirements still remain within the typically-cited limits for on-the-tag cryptography.

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

An Development of Security System based on The Home Gateway (홈 게이트웨이 기반 보안 시스템 개발)

  • Cho, Soo-Hyung;Lee, Sang-Hak
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06b
    • /
    • pp.299-302
    • /
    • 2010
  • 보안 시스템에 사용되는 많은 감시 카메라들이 RS-485 통신 방식을 통해 제어된다. 이러한 상황에서 RS-485 연결을 센서 네트워크 기술을 이용한 무선 연결로 대체할 수 있다면 선으로 연결할 필요가 없어 설치가 쉬워지고 카메라의 배치 또한 자유로워 질 것이다. 본 논문은 RS-485 연결을 대체할 수 있는 무선 센서 네트워크 기반의 감시 카메라 제어 시스템에 대한 개발로 홈게이트웨이와 무선 센서 노드, 스마트폰 감시 카메라 제어 어플리케이션의 개발 및 구현에 대해 설명한다. 홈 게이트웨이는 유 무선 인터넷 뿐만 아니라 무선 센서 네트워크를 지원하도록 설계되었으며 MicaZ 기반의 센서 노드는 RS-485 인터페이스로 카메라와 연결된다. 넓은 지역에 분산된 보안 카메라들을 제어하기 위해 멀티-홉 또한 지원하도록 구현되었다. 보안 시스템의 감시 카메라들은 스마트폰 기반의 어플리케이션에 의해 제어 된다. 실제 환경에 배치하여 실험한 결과, 스마트폰에서의 카메라 제어에 대해 실제 카메라가 매우 빠르게 반응하는 것을 확인할 수 있었다.

  • PDF

Study on 2BP Distance Bounding Protocol to Prevent Relay Attack in RFID environment (RFID 환경에서 중계공격을 방지를 위한 2BP Distance Bounding 프로토콜 연구)

  • Jung, Youn-Sung;Kim, Hyeong-Ju;Lee, A-Young;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.892-895
    • /
    • 2012
  • RIFD 시스템은 개체 인증, 전자결제 등 다양한 분야에서 사용되고 있다. 무선통신의 특성상 악의적인 공격자로부터 중계공격이 가능하여 공격자가 정당한 사용자로 가장할 수 있다. 이러한 중계공격을 예방하기 위하여 Distance Bounding이라는 개념의 프로토콜이 제안되어 왔다. 하지만, 기존 연구는 태그 ID 전달의 기밀성을 보장하지만 ID 검색의 비효율성 및 불필요한 두 번째 저속 단계가 존재하는 단점이 있다. 따라서 본 논문은 ID의 검색 없고, 시도 값과 응답 값을 2bits로 하여 마지막 저속 단계를 생략하며, 고속 단계에서 공격자의 공격 탐지 및 Terrorist 공격에 대하여 $(1/2)^n$의 공격 성공률을 갖는 2BP(2Bit 2Phase) Distance Bounding 프로토콜을 제안한다.

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

System Design for Access to Subway Vent based Bluetooth Smart Door-Lock (지하철 환기구 출입관리를 위한 블루투스 스마트 도어락 시스템)

  • Kim, Tae-Yong;Lee, Dae-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.63-65
    • /
    • 2016
  • In this paper, smart door-lock system to access public facilities will be proposed. An existed door-lock system using physical door-lock, NFC Tag, and RFID could be replaced by our proposed system. Automatic access control management system with security authentication module enables the worker to access public facilities efficiently.

  • PDF

Development of a Web Based Diligence and Indolence Management System (웹 기반 근태관리 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1845-1850
    • /
    • 2009
  • Generally, small and medium scale enterprises have conventionally been performing diligence and indolence management by hand, but many of them have been recently costing a lot of money for their diligence and indolence management and security maintenance. But yet, they have annoying sides due to the initial stage cost for the introduction of the system which is consisted of a terminal for reading a card, an RFID card, an administrative sewer and an application program for the diligence and indolence management as well as the insufficiency of the fixing skill being able to cope with the problems originating from hardware and software troubles. For this reasons, we developed a new diligence and indolence management system that the initial stage cost is moderate because it is needless to purchase a new server and to issue a new card, and the operation and management of the system is convenient because an RFID card reader communicates with a central administrative server in IDC(Internet Data Center) over internet for the diligence and indolence management.