Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
¾ÈÀüÇÑ RFID ȯ°æÀ» À§ÇÑ Å±×-¸®´õ »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝ |
¿µ¹®Á¦¸ñ(English Title) |
Tag-Reader Mutual Authentication Protocol for secure RFID environments |
ÀúÀÚ(Author) |
ÀÌ¿µ¼®
ÃÖÈÆ
Young-seok Lee
Hoon Cho
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 19 NO. 02 PP. 0357 ~ 0364 (2015. 02) |
Çѱ۳»¿ë (Korean Abstract) |
RFID ȯ°æ¿¡¼´Â ű×-¸®´õ »çÀÌ¿¡ ¹«¼±À¸·Î µ¥ÀÌÅ͸¦ ¼Û¼ö½ÅÇϱ⠶§¹®¿¡, °ø°ÝÀÚ°¡ ¹°¸®ÀûÀÎ Á¦¾à¾øÀÌ ³×Æ®¿öÅ©¿¡ Âü°¡ÇÒ ¼ö ÀÖ¾î µµÃ» ¹× µ¥ÀÌÅÍ À§¡¤º¯Á¶¿Í °°Àº ´Ù¾çÇÑ °ø°Ý ±â¹ý¿¡ ½±°Ô ³ëÃâµÉ ¼ö ÀÖ´Ù. ¶ÇÇÑ, RFID ű×ÀÇ ÀÚ¿ø Á¦¾à¼ºÀÌ ³ô¾Æ ¿ÜºÎ °ø°Ý¿¡ ¹æ¾îÇϱâ À§ÇÑ º¸¾È ±â¼úÀ» Àû¿ëÇÏ´Â °ÍÀÌ ½±Áö ¾Ê´Ù. º» ³í¹®¿¡¼´Â ½ºÇªÇÎ °ø°Ý, ÀçÀü¼Û °ø°Ý, Æ®·¡ÇÈ ºÐ¼® °ø°Ý, À§Ä¡ Æ®·¡Å· °ø°Ý°ú °°Àº ¿ÜºÎ »çÀ̹ö °ø°Ý¿¡ ´ëÇØ ¾ÈÀüÇÏ°Ô RFID ÅÂ±× Á¤º¸¸¦ º¸È£ÇÏ°í, ´Ù¾çÇÑ ¿ÜºÎ °ø°Ý¿¡ °ßµô ¼ö ÀÖ´Â »õ·Î¿î ű×-¸®´õ »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ ¼º´É Æò°¡¸¦ ¼öÇàÇÏ°í ½Ã¹Ä·¹ÀÌ¼Ç °á°ú¸¦ Á¦½ÃÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high . In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.
|
Å°¿öµå(Keyword) |
RFID
ű×
¸®´õ
»óÈ£ ÀÎÁõ
ÇÁ·ÎÅäÄÝ
RFID
Tag
Reader
Mutual Authentication
Protocol
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|