• Title/Summary/Keyword: RFID security

Search Result 517, Processing Time 0.03 seconds

A Study on the Military Secret Management System Development Plan using RFID (RFID를 이용한 국방 비밀관리시스템 발전방안에 관한 연구)

  • Chung, Young-Ho;Jang, Worl-Su;Park, Mok-Min;Park, Jin-Woo
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.151-168
    • /
    • 2007
  • The secret management of the Korea Military is one of the most significant operation. But the present method of the Korea Military requires much manpower and time, also the range of an object of administration become wider. In this study, We look into an instance of KIDA's 'The Secret Management System Construction Project' which was the first case to incorporate RFID in secret management system. From this instance, We analyze the effect of RFID on security operation in terms of the efficiency, accuracy and usability of security administration. We also present expected problems and possible solutions when it is extended to the field unit.

An Encryption Algorithm Based on Light-Weight SEED for Accessing Multiple Objects in RFID System (RFID 시스템에서 다중 객체를 지원하기 위한 경량화된 SEED 기반의 암호화 알고리즘)

  • Kim, Ji-Yeon;Jung, Jong-Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.41-49
    • /
    • 2010
  • Recently, RFID systems are spreading in various industrial areas faster but cause some serious problems of information security because of its unstable wireless communication. Moreover, traditional RFID systems have a restriction that one tag per each application object. This restriction deteriorates their usability because it is difficult to distinguish many tags without some kind of effort. Therefore, efficient information sharing of objects based on information security has to be studied for more spreading of RFID technologies. In this paper, we design a new RFID tag structure for supporting multiple objects which can be shared by many different RFID applications. We also design an encryption/decryption algorithm to protect the identifying information of objects stored in our tag structure. This algorithm is a light revision of the existing SEED algorithm which can be operated in RFID tag environment. To evaluate the performance of our algorithm, we measure the encryption and decryption times of this algorithm and compare the results with those of the original SEED algorithm.

A Fully Integrated CMOS Security-Enhanced Passive RFID Tag

  • Choi, Suna;Kim, Hyunseok;Lee, Sangyeon;Lee, Kangbok;Lee, Heyungsub
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.141-150
    • /
    • 2014
  • A fully integrated CMOS security-enhanced passive (SEP) tag that compensates the security weakness of ISO/IEC 18000-6C is presented in this paper. For this purpose, we propose a security-enhanced protocol that provides mutual authentication between tag and reader. We show that the proposed protocol meets the security demands of the ongoing international standard for RFID secure systems, ISO/IEC 29167-6. This paper fabricates the SEP tag with a 0.18-${\mu}m$ CMOS technology and suggests the optimal operating frequency of the CMOS SEP tag to comply with ISO/IEC 18000-6C. Furthermore, we measure the SEP tag under a wireless environment. The measured results show that communications between the SEP tag and reader are successfully executed in both conventional passive and SEP modes, which follow ISO/IEC 18000-6C and the proposed security enhanced protocol, respectively. In particular, this paper shows that the SEP tag satisfies the timing link requirement specified in ISO/IEC 18000-6C.

A Study on Authentication Protocol in RFID System (저가에서의 효율적인 RFID 인증 프로토콜)

  • Park Jang-Su;Lee Im-Yeong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.719-722
    • /
    • 2006
  • RFID 기술은 유비쿼터스(Ubiquitous)환경에서의 핵심적인 기술로 인정받아 중요한 위치를 차지하고 있지만 RFID 태그의 정보가 쉽게 노출된다는 기본적인 특징으로 인해 사용자의 프라이버시 침해 위협이 발생할 수 있다. 따라서 현재 사용자의 프라이버시 보호에 관한 연구가 활발히 진행중에 있다. 하지만 저가의 태그에서는 연산량과 저장 공간이 제한적이기 때문에 기존방식들을 이용하기에는 많은 어려움이 있다. 본 논문에서는 저가의 태그에서 효율적으로 이용될 수 있는 RFID 인증 프로토콜을 제안하고자 한다. 우리가 제안하는 방식은 저가의 태그에서 연산량을 고려하여 XOR 연산으로만 구성되어 있다.

  • PDF

Enhanced Yoking Proofs Protocol (향상된 Yoking Proofs 프로토콜)

  • Cho Jung-Sik;Yeo Sang-Soo;Kim Sung-Kwon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.703-706
    • /
    • 2006
  • RFID 시스템은 전자태그를 이용한 자동 무선 식별 시스템으로써 RFID 전자 태그를 물체나 사람 또는 동물에게 부착하여 무선 주파수를 통해 태그의 정보를 인식할 수 있도록 해주는 시스템이다. 이는 동시에 다량의 정보를 인식할 수 있다는 장점을 무기로 현재 접촉식 판독 기법의 바코드 시스템을 대처할 수 있을 것이다. 반면 이러한 장점에도 불고하고 RFID 시스템이 사용되는데 걸림돌이 되는 가장 큰 단점은 RFID 태그 정보에 대한 접근이 자유롭다는 점에서 프라이버시 문제를 야기하기 때문이다. 현재 이러한 문제를 해결하기 위해 많은 연구가 진행되고 있으며, 그 중 Ari Juels는 두 개의 RFID 태그가 동시에 있다는 것을 증명하기 위한 프로토콜인 yoking proof 프로토콜을 제안하였다. 하지만 이는 재생(replay) 공격이 가능하다는 취약점을 가지고 있으며, 이를 보안하기 위해 제안된 여러 프로토콜 들에서도 역시 재생 공격에 대한 취약점이 발견되고 있다. 따라서 본 논문에서는 이러한 yoking proof 프로토콜의 취약점을 보안하기 위하여 공격에 대한 복잡도를 높여 공격자로 하여금 재생 공격이 어렵게 하는 프로토콜을 제안한다.

  • PDF

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol (RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

G-Pedigree and G-code System of RFID-based Development for Forward & Reverse Logistics Management (순물류와 역물류 관리에 적합한 RFID 기반의 G-Pedigree 시스템과 G-code 체계 개발)

  • Hwang, Bo-Hyun;Yun, Jong-Ho;Choi, Myung-Ryul
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.112-118
    • /
    • 2010
  • This paper propose G-code and G-Pedigree system that are development based on the e-Pedigree and EPC, and RFID solutions for logistics management is proposed. The proposed G-Pedigree system to include the forward logistics and reverse logistics all logistics and management systems are appropriate for the event, with security features, security and accessibility of critical data was strengthened. The proposed G-code systems and the EPC code of the existing RFID readers, tags can be applied to, the more you can manage the logistics-related information.

  • PDF

Analyses of Framework for Enhanced RFID Security and Privacy (개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

Role of Radio Frequency Identification (RFID) in Warehouse and Logistic Management System using Machine Learning Algorithm

  • Laviza Falak Naz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.109-118
    • /
    • 2024
  • The world today is advancing towards a digital solution for every indusial domain varying from advanced engineering and medicine to training and management. The supply cycles can only be boosted via an effective management of the warehouse and a stronger hold over the logistics and inventory insights. RFID technology has been an open source tool for various MNCs and corporal organization who have progressed along a considerable drift on the charts. RFID is a methodology of analysing the warehouse and logistic data and create useful information in line to the past trends and future forecasts. The method has a high tactical accuracy and has been seen providing up to 99.57% accurate insights for the future cycle, based on the organizational capabilities and available resources. This paper discusses the implementation of RFID on field and provides results of datasets retrieved from controlled data of a practical warehouse and logistics system.