Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
Çؽà ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ RFID ÀÎÁõ |
¿µ¹®Á¦¸ñ(English Title) |
Effective RFID Authentication Using Hash Function |
ÀúÀÚ(Author) |
½ÅÈ¿¿µ
Á¤°èµ¿
Hyo-Young Shin
Gye-Dong Jung
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 14 NO. 05 PP. 1171 ~ 1177 (2010. 05) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù RFID ½Ã½ºÅÛÀº À¯Åë, ÀÇ·á, ±º»ç µî ´Ù¾çÇÑ ¿µ¿ª¿¡¼ È°¿ëÇÏ´Â ±â¼ú·Î µîÀåÇÏ°í ÀÖ´Ù. RFID ½Ã½ºÅÛÀ» ¿©·¯ °¡Áö ÀÀ¿ë ¼ºñ½º¿¡ Àû¿ëÇÏ·Á¸é °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ±â¼úÀÌ °³¹ßµÇ¾î¾ßÇÑ´Ù. º» ³í¹®¿¡¼´Â Çؽà ÇÔ¼ö¸¦ ÀÌ¿ëÇÏ¿© RFID ÅÂ±×¿Í µ¥ÀÌÅͺ£À̽º°£ÀÇ »óÈ£ ÀÎÁõÀ» È¿À²ÀûÀ¸·Î ¼öÇàÇÒ ¼ö ÀÖ´Â ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÏ¿´´Ù. Á¦¾ÈÇÑ ÇÁ·ÎÅäÄÝÀº »óÈ£ ÀÎÁõ, ÀÍ¸í¼º, ºñ¹Ð¼º, ¹«°á¼º, ÀçÀü¼Û °ø°Ý, À§Ä¡ ÃßÀû µî ¿©·¯ °¡Áö º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·½ÃÅ°¸é¼, µ¥ÀÌÅͺ£À̽º¿¡¼ÀÇ Çؽà ¿¬»ê Ƚ¼ö¸¦ ÁÙ¿© Àüü ÀÎÁõ ½Ã°£À» ÁÙÀÏ ¼ö ÀÖ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.
|
Å°¿öµå(Keyword) |
RFID
ÀÎÁõ
Çؽà ÇÔ¼ö
Á¤º¸º¸È£
RFID
Authentication
Hash function
Security
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|