• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 92 / 246 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) RFID ½Ã½ºÅÛ º¸¾È °­È­¸¦ À§ÇÑ ºñ°ø°³ ÄÚµå ±â¹ÝÀÇ ÀÎÁõ ÇÁ·ÎÅäÄÝ
¿µ¹®Á¦¸ñ(English Title) Authentication Protocol of Private Code-based for Advanced Security of RFID System
ÀúÀÚ(Author) ÀåºÀÀÓ   ±è¿ëÅ   Á¤À±¼ö   ¹Ú±æö   Bong-Im Jang   Yong-Tae Kim   Yoon-Su Jeong   Gil-Cheol Park  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 03 PP. 0737 ~ 0744 (2010. 03)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù »ê¾÷ ¹× »ýÈ° Àü¹Ý¿¡ °ÉÃÄ RFID(Radio Frequency IDentification)ÀÇ »ç¿ëÀº Áõ°¡ Ãß¼¼¿¡ ÀÖÀ¸¸ç, ´õ¿í È®´ëµÉ Àü¸ÁÀÌ´Ù. ±×·¯³ª RFID´Â ÀÎÁõ°úÁ¤¿¡¼­ µµÃ», ÀçÀü¼Û °ø°Ý, ½ºÇªÇÎ °ø°Ý(Spoofing attack), À§Ä¡ ÃßÀû °ø°Ý µîÀÇ ¾ÇÀÇÀûÀÎ À§ÇùÀ¸·ÎºÎÅÍ Ãë¾àÇÏ´Ù. ƯÈ÷ Àú°¡Çü RFIDű׿¡´Â ±âÁ¸ÀÇ ´Ù¸¥ ½Ã½ºÅÛ¿¡¼­ »ç¿ëµÇ´ø ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ Àû¿ëÀÌ ¾î·Á¿î ½ÇÁ¤ÀÌ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â RFID ÇÁ¶óÀ̹ö½Ã º¸È£¸¦ À§ÇÑ È¿À²ÀûÀÎ ÀÎÁõ ÇÁ·ÎÅäÄÝ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. Á¦¾È ±â¹ýÀº ±âÁ¸ÀÇ ±â¹ý¿¡ ºñÇØ Àü¼Û µ¥ÀÌÅÍÀÇ °ËÁõ°úÁ¤À» °­È­ÇÏ¿© µµÃ»À̳ª ½ºÇªÇÎ °ø°ÝÀ¸·ÎºÎÅÍ ¾ÈÀüÇϸç, ű×ÀÇ ¿¬»ê ÀÛ¾÷À» ÃÖ¼ÒÈ­ÇÏ¿© Àú°¡Çü ű׷ÎÀÇ Àû¿ëÀÌ À¯¿ëÇÏ´Ù. ¶ÇÇÑ Åë½Å ¶ó¿îµå ¼ö¸¦ ÁÙ¿© Åë½ÅÀÇ È¿À²¼ºÀ» º¸ÀåÇÏ´Â ÀåÁ¡À» °¡Áø´Ù.
¿µ¹®³»¿ë
(English Abstract)
The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.
Å°¿öµå(Keyword) RFID ½Ã½ºÅÛ   ÀÎÁõ ÇÁ·ÎÅäÄÝ   Çؽ¬ ÇÔ¼ö   º¸¾È   RFID System   Authentication Protocol   Hash Function   Security  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå