• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 97 / 246 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Çؽà ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ RFID ÀÎÁõ
¿µ¹®Á¦¸ñ(English Title) Effective RFID Authentication Using Hash Function
ÀúÀÚ(Author) ½ÅÈ¿¿µ   Á¤°èµ¿   Hyo-Young Shin   Gye-Dong Jung  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 05 PP. 1171 ~ 1177 (2010. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù RFID ½Ã½ºÅÛÀº À¯Åë, ÀÇ·á, ±º»ç µî ´Ù¾çÇÑ ¿µ¿ª¿¡¼­ È°¿ëÇÏ´Â ±â¼ú·Î µîÀåÇÏ°í ÀÖ´Ù. RFID ½Ã½ºÅÛÀ» ¿©·¯ °¡Áö ÀÀ¿ë ¼­ºñ½º¿¡ Àû¿ëÇÏ·Á¸é °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ±â¼úÀÌ °³¹ßµÇ¾î¾ßÇÑ´Ù. º» ³í¹®¿¡¼­´Â Çؽà ÇÔ¼ö¸¦ ÀÌ¿ëÇÏ¿© RFID ÅÂ±×¿Í µ¥ÀÌÅͺ£À̽º°£ÀÇ »óÈ£ ÀÎÁõÀ» È¿À²ÀûÀ¸·Î ¼öÇàÇÒ ¼ö ÀÖ´Â ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÏ¿´´Ù. Á¦¾ÈÇÑ ÇÁ·ÎÅäÄÝÀº »óÈ£ ÀÎÁõ, ÀÍ¸í¼º, ºñ¹Ð¼º, ¹«°á¼º, ÀçÀü¼Û °ø°Ý, À§Ä¡ ÃßÀû µî ¿©·¯ °¡Áö º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·½ÃÅ°¸é¼­, µ¥ÀÌÅͺ£À̽º¿¡¼­ÀÇ Çؽà ¿¬»ê Ƚ¼ö¸¦ ÁÙ¿© Àüü ÀÎÁõ ½Ã°£À» ÁÙÀÏ ¼ö ÀÖ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.
Å°¿öµå(Keyword) RFID   ÀÎÁõ   Çؽà ÇÔ¼ö   Á¤º¸º¸È£   RFID   Authentication   Hash function   Security  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå