• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
¿µ¹®Á¦¸ñ(English Title) Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
ÀúÀÚ(Author) Jin-Suk kang   Yong-Sik Choi   Mee Young Sung   Seung-Ho Shin   Taikeong T. Jeong  
¿ø¹®¼ö·Ïó(Citation) VOL 05 NO. 03 PP. 0254 ~ 0258 (2007. 09)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.
Å°¿öµå(Keyword) USN(Ubiquitous Sensor Network)   HASH LOCK Approach   HASH Function  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå