• Title/Summary/Keyword: RFID Security

Search Result 517, Processing Time 0.026 seconds

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

ITU-T SG17 Q.9(안전한 통신 서비스) 국제표준화 동향 및 향후 전망

  • Oh, Heung-Ryong;Nah, Jae-Hoon;Youm, Heung-Youl;Kim, Dae-Kyung
    • Review of KIISC
    • /
    • v.18 no.4
    • /
    • pp.30-41
    • /
    • 2008
  • 국제표준화기구 ITU-T에서는 SG17 WP2 그룹이 정보통신 보안에 관한 표준화를 리드하는 연구그룹으로, 산하 7개의 연구과제(Question)를 구성하여 정보보호 국제표준을 개발하고 있다. 이 연구과제들 중 Q.9(의장, 염흥열, 순천향대)에서 는 안전한 통신 서비스라는 주제로 모바일 보안, 홈네트워크 보안, 웹 서비스 보안, P2P보안, 멀티캐스트 보안, USN 보안, NID(RFID) 보안, IPTV 보안, 응용서비스 및 응용 프로토콜 보안 등 정보통신 환경에서 다양하게 응용될 수 있는 국제표준들의 개발을 담당하고 있다. 현재, Q.9에서는 앞서 언급된 분야로 총 16건의 국제표준을 제정하였으며, 총 6건의 표준초안들이 개발중에 있다. 본 논문에서는 Q.9에서 개발한 국제표준들과 개발중에 있는 표준초안들에 대해 간단히 소개하고, 차기 연구회기(’09${\sim}$’12) 구조조정 방향에 따른 향후 추진방향을 제시하고자 한다.

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

A Trend of Lightweight Block Ciphers (경량 블록 암호 개발 동향)

  • Kang, Jinkeon;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.749-752
    • /
    • 2012
  • 유비쿼터스 환경에서 보다 안전하고 편리하게 정보를 교환하기 위해서 암호 기술은 필수적인 요소이다. 유비쿼터스 컴퓨팅 및 네트워크 환경에서 사용되는 장치들은 기존의 장치보다 저사양이기 때문에 기존의 암호 기술을 그대로 적용하기는 어렵다. 이를 위해서 최근 경량 암호에 대한 연구가 활발히 진행되고 있다. 본 논문에서는 RFID/USN 등과 같이 자원이 제한적인 유비쿼터스 컴퓨팅 환경에 적합한 경량 블록 암호의 개발 동향을 분석한다. 기 제안된 경량 블록 암호의 구조와 특징을 분석하여 경량블록 암호 개발 시 고려해야 할 사항들을 살펴본다.

Access and Security System Design using QR(Quick Response) Code (QR(Quick Response)Code를 이용한 출입/보안 시스템 설계)

  • Kim, Hong-Il;Lee, Byeng-Joo;Won, So-Ra;Kim, Young-Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.958-960
    • /
    • 2013
  • 본 논문에서는 스마트 폰과 QR코드를 활용하여 기존의 출입 통제 시스템과 보안시스템의 역할을 수행하며 문제점을 해결할 수 있는 시스템을 제안하고자 한다. 출입 통제 시스템은 종이카드에 기록이 되기 때문에 전산화 하지 못하고 출근카드가 소진이 되면 추가로 구매해야하는 불편함이 있으며, RFID를 활용한 카드 출입기는 카드를 분실할 경우 복제의 위험성과 보안에 문제점이 발생하게 된다. 보안 시스템에서는 감시카메라를 전역 설치할 경우 비용이 커지며, 기록을 보존해야하기 때문에 대용량 저장 장치가 필요하게 된다. 이 시스템을 활용할 경우 스마트 폰의 사용자 정보와 QR코드의 정보를 통해 출입 통제 기능을 수행할 수 있으며, 카메라의 기능을 통해 감시카메라 역할을 대신하여 비용을 절감할 수 있고 출입 통제기록과 근태 관리 등을 전산화를 시킬 수가 있어 근무자를 관리하는데 용이해진다.

An efficient hardware implementation of 64-bit block cipher algorithm HIGHT (64비트 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현)

  • Park, Hae-Won;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1993-1999
    • /
    • 2011
  • This paper describes a design of area-efficient/low-power cryptographic processor for HIGHT block cipher algorithm, which was approved as standard of cryptographic algorithm by KATS(Korean Agency for Technology and Standards) and ISO/IEC. The HIGHT algorithm, which is suitable for ubiquitous computing devices such as a sensor in USN or a RFID tag, encrypts a 64-bit data block with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we optimize round transform block and key scheduler to share hardware resources for encryption and decryption. The HIGHT64 core synthesized using a 0.35-${\mu}m$ CMOS cell library consists of 3,226 gates, and the estimated throughput is 150-Mbps with 80-MHz@2.5-V clock.

Low Power Cryptographic Design based on Circuit Size Reduction (회로 크기 축소를 기반으로 하는 저 전력 암호 설계)

  • You, Young-Gap;Kim, Seung-Youl;Kim, Yong-Dae;Park, Jin-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.92-99
    • /
    • 2007
  • This paper presented a low power design of a 32bit block cypher processor reduced from the original 128bit architecture. The primary purpose of this research is to evaluate physical implementation results rather than theoretical aspects. The data path and diffusion function of the processor were reduced to accommodate the smaller hardware size. As a running example demonstrating the design approach, we employed a modified ARIA algorithm having four S-boxes. The proposed 32bit ARIA processor comprises 13,893 gates which is 68.25% smaller than the original 128bit structure. The design was synthesized and verified based on the standard cell library of the MagnaChip's 0.35um CMOS Process. A transistor level power simulation shows that the power consumption of the proposed processor reduced to 61.4mW, which is 9.7% of the original 128bit design. The low power design of the block cypher Processor would be essential for improving security of battery-less wireless sensor networks or RFID.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

Ontology Modeling and Its Application for Managing Control Points (기준점 관리를 위한 온톨로지 모델링과 적용 방안)

  • Cui, Yulan;Hwang, Hyun-Suk;Shin, Seong-Hyun;Suh, Yong-Cheol;Kim, Chang-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.34-42
    • /
    • 2008
  • The control points are important assets of countries which express the most accurate location information that is used in surveying land and other measurements. The location information has played an important role in our daily lives with the development of ubiquitous technology. While many researchers have recently applied new technology like RFID(Radio-Frequency Identification) to the effective management of control points, the research into data retrieval and the interoperability of control point data is still primitive step. Therefore, we construct a data modeling to effectively manage control points using ontology data structure and focus on semantic retrieval method. Our retrieval system can provide the inferred and associated information among data using Prot$\acute{e}$g$\acute{e}$-OWL tool. Our system has advantages in reducing the number of repeated queries by hierarchy searching and improving the searching time by association searching. Also, we propose an effective method to construct retrieval systems being able to edit items of categories and properties without editing the related codes.

  • PDF