• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 99 / 246 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ±×¸®µå ȯ°æ¿¡¼­ RFID ÅÂ±× ÆǺ° ½Ã°£ Àý°¨À» À§ÇÑ ÅÂ±× ÆǺ° ó¸®
¿µ¹®Á¦¸ñ(English Title) Reducing Process Time for RFID Tag Identification on the Grid Environment
ÀúÀÚ(Author) ½Å¸í¼÷   Myeong-Sook Shin  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 05 PP. 1049 ~ 1056 (2010. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù RFID ½Ã½ºÅÛÀÇ Ã¤ÅÃÀÌ ´Ù¾çÇÑ ºÐ¾ß¿¡¼­ ºü¸£°Ô ÁøÇàµÇ°í ÀÖ´Ù. ±×·¯³ª RFID ½Ã½ºÅÛÀÇ ´ëÁßÈ­¸¦ À§Çؼ­´Â RFID ű×ÀÇ Á¤º¸¸¦ ¹«´ÜÀ¸·Î ȹµæÇÔÀ¸·Î½á ¹ß»ýÇÒ ¼ö ÀÖ´Â ÇÁ¶óÀ̹ö½Ã ħÇØ ¹®Á¦¸¦ ÇØ°áÇØ¾ß ÇÑ´Ù. ÀÌ ¹®Á¦¸¦ ÇØ°áÇϱâ À§Çؼ­ ±âÁ¸ ¿¬±¸µé Áß¿¡¼­ °¡Àå ¾ÈÀüÇÑ M. Ohkubo µîÀÇ Hash-Chain ±â¹ýÀÌ ÀÖ´Ù. ±×·¯³ª ÀÌ ±â¹ýÀº ű׸¦ ÆǺ°ÇÒ ¶§ ¾öû³­ ÅÂ±× ¼öÀÇ Áõ°¡·Î ÀÎÇØ ¸·´ëÇÑ °è»ê ´É·ÂÀ» ¿ä±¸ÇÏ´Â ¹®Á¦Á¡ÀÌ ÀÖ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â ÇÁ¶óÀ̹ö½Ã º¸È£ ±â¹ýÀÇ Çʼö º¸¾È ¿ä°Ç 3°¡Áö¸¦ ¸ðµÎ ¸¸Á·Çϸ鼭 ÅÂ±× ÆǺ° ½Ã°£À» °¨¼ÒÇÒ ¼ö ÀÖ´Â SPºÐÇÒ ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. ±×¸®°í Á¦¾ÈÇÑ ¾Ë°í¸®ÁòÀ» Àû¿ëÇÏ¿© °¢ ³ëµå¿¡ ºÐÇÒµÈ µ¥ÀÌÅÍ Áß¿¡¼­ ÃÖÃÊÀÇ Å°¸¦ ã´Â ½Ã°£ ±âÁØÀ¸·Î ±¸ÇöÇÑ´Ù. ±¸Çö °á°ú Hash-Chain ±æÀÌ 1000À¸·Î °íÁ¤µÈ »óÅ¿¡¼­ SPµéÀÇ ÃѼö¸¦ 1000, 2000, 3000, 4000À¸·Î Áõ°¡ÇÏ°í ³ëµå ¼ö¸¦ 1, 2, 3, 4·Î È®ÀåÇϸ鼭 SPµéÀÇ ÃѼö, ³ëµå ¼ö¿¡ µû¸¥ ÅÂ±× ÆǺ° ½Ã°£À» ´ÜÀÏ ³ëµå¿Í ºñ±³ÇÏ¸é ³ëµå ¼ö°¡ 2°³ÀÏ ¶§ 40%, ³ëµå ¼ö°¡ 3°³ÀÏ ¶§ 56%, ³ëµå ¼ö°¡ 4°³ÀÏ ¶§ 71%·Î ¼º´ÉÀÌ Çâ»ó µÇ¾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently RFID system has been adopted in various fields rapidly. However, we should solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system. To solve these problems, There is the Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore We, suggest SP-Division algorithm satisfied with all necessary security of Privacy Protection Scheme and decreased in Tag Identification Time in this paper. And this paper implemented it in time standard finding the first key among the data devided into each nodes. The length of Hash-Chain holds 1000, and the total number of SPs increases 1000, 2000, 3000, and 4000. Comparing tag identification time by the total number of SPs and the number of Nodes with single node, extending the number of nodes to 1, 2, 3 and 4, when the number of nodes is 2, 40% of Performance, when the number of nodes is 3, 56%, and when the number of nodes is 4, 71% is improved.
Å°¿öµå(Keyword) RFID   °è»ê ±×¸®µå   MPICH-G2   °³ÀÎÁ¤º¸º¸È£   Çؽà üÀÎ ±â¹ý   RFID   Computational Grid   MPICH-G2   Privacy Protection   Hash-Chain Scheme  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå