• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 80 / 246 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ±×¸®µå ȯ°æ¿¡¼­ SPºÐÇÒ ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ È®À强 ÀÖ´Â RFID ÅÂ±× ÆǺ°
¿µ¹®Á¦¸ñ(English Title) RFID Tag Identification with Scalability Using SP-Division Algorithm on the Grid Environment
ÀúÀÚ(Author) ½Å¸í¼÷   ¾È¼º¼ö   ÀÌÁØ   Myeong-Sook Shin   Seong-Soo Ahn   Joon Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 13 NO. 10 PP. 2105 ~ 2112 (2009. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù RFID ½Ã½ºÅÛÀÇ Ã¤ÅÃÀÌ ´Ù¾çÇÑ ºÐ¾ß¿¡¼­ ºü¸£°Ô ÁøÇàµÇ°í ÀÖ´Ù. ±×·¯³ª RFID ½Ã½ºÅÛÀÇ ´ëÁßÈ­¸¦ À§Çؼ­´Â RFID ű×ÀÇ Á¤º¸¸¦ ¹«´ÜÀ¸·Î ȹµæÇÔÀ¸·Î½á ¹ß»ýÇÒ ¼ö ÀÖ´Â ÇÁ¶óÀ̹ö½Ã ħÇØ ¹®Á¦¸¦ ÇØ°áÇØ¾ß ÇÑ´Ù. ÀÌ ¹®Á¦¸¦ ÇØ°áÇϱâ À§Çؼ­ ±âÁ¸ ¿¬±¸µé Áß¿¡¼­ °¡Àå ¾ÈÀüÇÑ M. Ohkubo µîÀÇ Hash-Chain ±â¹ýÀÌ ÀÖ´Ù. ±×·¯³ª ÀÌ ±â¹ýÀº ű׸¦ ÆǺ°ÇÒ ¶§ ¾öû³­ ÅÂ±× ¼öÀÇ Áõ°¡·Î ÀÎÇØ ¸·´ëÇÑ °è»ê ´É·ÂÀ» ¿ä±¸ÇÏ´Â ¹®Á¦Á¡ÀÌ ÀÖ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â ÇÁ¶óÀ̹ö½Ã º¸È£ ±â¹ýÀÇ Çʼö º¸¾È ¿ä°Ç 3°¡Áö¸¦ ¸ðµÎ ¸¸Á·Çϸ鼭 ÅÂ±× ÆǺ° ½Ã°£À» °¨¼ÒÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. ¸ÕÀú ÀÌÁúÀûÀÎ ½Ã½ºÅÛÀ¸·Î ±¸¼ºµÇ´Â ±×¸®µå ȯ°æÀÇ Æ¯¼ºÀ¸·Î ÀÎÇØ ÃÖÀûÈ­µÈ ¼º´ÉÀ» ¾ò±â À§ÇÏ¿© Hash-Chain °è»ê Å×À̺íÀ» »ý¼ºÇÏ´Â ÇÁ·Î±×·¥À» ÀÛ¼ºÇÑ ÈÄ °¢ ³ëµåµéÀÇ ¼º´É ÃøÁ¤ÇÑ´Ù. ±× ÃøÁ¤ °á°ú¸¦ ÀÌ¿ëÇÏ¿© SPµéÀ» ºÐÇÒÇÏ´Â SPºÐÇÒ ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. ¶ÇÇÑ, ±¸Çö °á°ú Hash-Chain ±æÀÌ 1000, ³ëµå ¼ö 4·Î °íÁ¤µÈ »óÅ¿¡¼­ ÃøÁ¤ÇÑ °á°ú¸¦ ´ÜÀÏ ³ëµå¿Í ±ÕµîºÐÇÒ, SPºÐÇÒÀ» ºñ±³Çϸé SPµéÀÇ ÃѼö°¡ 1000°³ ÀÏ ¶§ 40%, 49%, 2000°³ ÀÏ ¶§ 42%, 51%, 3000°³ ÀÏ ¶§ 39%, 49%, 4000°³ ÀÏ ¶§ 46%, 55%°¡ Çâ»óµÇ¾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, We suggest the way(process) satisfied with all necessary security of Privacy Protection Shreme and decreased in Tag Identification Time in this paper. First, We¡®ll suggest the SP-Division Algorithm seperating SPs using the Performance Measurement consequence of each node after framing the program to create Hash-Chain Calculated table to get optimized performance because of character of the grid environment comprised of heterogeneous system. If we compare consequence fixed the number of nodes to 4 with a single node, equal partition, and SP partition, when the total number of SPs is 1000, 40%, 49%, when the total number of SPs is 2000, 42%, 51%, when the total number of SPs is 3000, 39%, 49%, and when the total number of SPs is 4000, 46%, 56% is improved.
Å°¿öµå(Keyword) RFID   Computational Grid   MPICH-G2   Privacy Protection   Hash-Chain Scheme  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå