• Title/Summary/Keyword: Tag Authentication

Search Result 157, Processing Time 0.029 seconds

Design of an RFID Authentication Protocol Using Nonlinear Tent-Map (비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계)

  • Han, Kyu-Kwang;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1145-1152
    • /
    • 2014
  • The RFID (Radio-Frequency Identification) system is a technology to discern things by radio and an epoch-making new method to improve product management such as distribution, transport, mobilization, inventory control. However, RFID, which uses radio, is at risk for information leakage and falsification due to the vulnerability of security of the communication section. We designed the new authentication protocol by applying the tent map, which is the representative complex systems, to the RFID communication system. A more solid and simple authentication system was designed by applying the initial value sensitivity and irregularity, which are the representative characteristics of the complex system, to the reader and tag of RFID. The purpose of this paper is to verify the usability of the RFID authentication protocol design that uses the nonlinear system shown in this thesis by the new system differentiated from the authentication system that depends on the existing hash function or random numbers.

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Design of Modified Authentication Protocol for RFID Tags (RFID Tag를 위한 개선된 인증 프로토콜 설계)

  • Lee Kwang-Ho;Son Myoung-Jin;Kang Min-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1019-1022
    • /
    • 2006
  • 본 논문에서는 RFID Tag을 위한 개선된 인증 프로토콜의 설계 및 검증에 관하여 기술한다. 제안한 프로토콜은 ISO/IEC 18000 standard를 기본으로하고 있으며, 강인한 인증을 위해 표준 프로토콜 frame format 을 수정한다. 상호 인증을 위해 three-way challenge response 프로토콜을 사용하며, 인증 알고리듬은 SHA-1이 추가되었다. 제안한 프로토콜의 검증을 위해 Xilinx ISE 6.2i 툴을 사용하여 RFID Tag의 디지털 part를 설계하였고, Virtex Xcv4000 FPGA 를 타겟으로 합성을 수행하였다. RFID Tag의 디지털 part는 Mentor's Modelsim을 이용하여 시뮬레이션을 수행하였고, 동작속도는 약 75MHz를 가지며, 1290개의 슬라이스가 사용되었다.

  • PDF

A Study on RF Tag Authentication Protocol of Based on Password applied Product Management (물류 관리에 적용 가능한 패스워드 기반의 RF Tag 인증 프로토콜에 관한 연구)

  • 서대희;이임영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.298-300
    • /
    • 2004
  • 휴대 단말기 보유율의 급격한 증가는 새롭고 다양한 형태의 무선 통신 기술의 개발을 촉진시키는 계기가 되었으며, 특히 국내의 경우 이동통신 시장의 경제적이나 양적으로 급속한 성장을 이루어 사회 전반에 걸쳐서 새로운 가치를 생산해 내어 생활 모습을 크게 바꾸어 놓고 있다 따라서 이러한 환경의 변화는 사용자 중심의 다양한 서비스를 제공할 수 있는 차세대 무선 통신 기술의 연구가 필요한 실정이다. 따라서 본 논문에서는 물류 관리에 적용을 고려하여 RF Tag 인증 프로토콜을 제안하고자 한다. 제안된 방식의 경우 기존 RF Tag 인증 연구에서 보다 하드웨어적 경량성을 제공할 뿐만 아니라 물류적용을 위한 식별 회수에 제한 둠으로 해서 보다 안전하고 효율적인 물류 관리 서비스를 적용할 수 있는 방식이다

  • PDF

Analyses of Security and Privacy Issues in Ultra-weight RFID Protocol

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.441-446
    • /
    • 2011
  • Radio frequency identification (RFID) tags are cheap and simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we analyzed a lightweight privacy and authentication protocol for passive RFID tags.

UHF-HF Dual-Band RFID Tag Antenna Design for Boxes (박스용 UHF-HF 이중대역 RFID 태그 설계)

  • Nam, Seahyeon;Kang, Juwon;Chung, Youchung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • This paper introduces the development of HF(NFC) and UHF band(13.56 MHz, 920 MHz) tag antennas, imbedded in a box. In dual band antennas, the HF band tag can be used to inspect the box using NFC, and the UHF band tag can be used for logistics. The dielectric constant of the box material is measured and used for simulation. The Ntag213 chip manufactured by NXP is used in HF loop antennas, since NFC is possible with Ntag213. For the UHF band, the Higgs-3 chip manufactured by Alien is used. The HF tag antenna is located at the center of the UHF tag antenna, and the location of the HF tag antenna is calculated while considering coupling effects. The designed tag can be used by both the bands for the purposes of logistics and authentication.

RFID Authentication Protocol Using Shift Operation and Light-weight Operations (Shift연산과 경량 연산자를 사용한 저비용 RFID 인증프로토콜)

  • Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.55-62
    • /
    • 2007
  • In ubiquitous environment the authentication protocol design for RFID security is studied to protect user privacy in RFID system. The XOR-based approach of RFID security is implemented inexpensively and simply. However because of using same security informations, ones of tag is disclosed easily. In this paper, we enhance the previous XOR-based authentication protocol using a circular shift operation.

  • PDF

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.

RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service attack (위치 추적과 서비스 거부 공격에 강한 RFID 인증 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.71-82
    • /
    • 2005
  • Though there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag's hardware limitation, these protocols suffer from many security threats, especially from DoS (Denial of Service) attack. In this paper, we explain location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we suggest an authentication protocol that is strong against location tracing, spoofing attack and DoS attack