Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
±×¸®µå ȯ°æ¿¡¼ SPºÐÇÒ ¾Ë°í¸®ÁòÀ» ÀÌ¿ëÇÑ È®À强 ÀÖ´Â RFID ÅÂ±× ÆǺ° |
¿µ¹®Á¦¸ñ(English Title) |
RFID Tag Identification with Scalability Using SP-Division Algorithm on the Grid Environment |
ÀúÀÚ(Author) |
½Å¸í¼÷
¾È¼º¼ö
ÀÌÁØ
Myeong-Sook Shin
Seong-Soo Ahn
Joon Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 13 NO. 10 PP. 2105 ~ 2112 (2009. 10) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù RFID ½Ã½ºÅÛÀÇ Ã¤ÅÃÀÌ ´Ù¾çÇÑ ºÐ¾ß¿¡¼ ºü¸£°Ô ÁøÇàµÇ°í ÀÖ´Ù. ±×·¯³ª RFID ½Ã½ºÅÛÀÇ ´ëÁßȸ¦ À§Çؼ´Â RFID ű×ÀÇ Á¤º¸¸¦ ¹«´ÜÀ¸·Î ȹµæÇÔÀ¸·Î½á ¹ß»ýÇÒ ¼ö ÀÖ´Â ÇÁ¶óÀ̹ö½Ã ħÇØ ¹®Á¦¸¦ ÇØ°áÇØ¾ß ÇÑ´Ù. ÀÌ ¹®Á¦¸¦ ÇØ°áÇϱâ À§Çؼ ±âÁ¸ ¿¬±¸µé Áß¿¡¼ °¡Àå ¾ÈÀüÇÑ M. Ohkubo µîÀÇ Hash-Chain ±â¹ýÀÌ ÀÖ´Ù. ±×·¯³ª ÀÌ ±â¹ýÀº ű׸¦ ÆǺ°ÇÒ ¶§ ¾öû³ ÅÂ±× ¼öÀÇ Áõ°¡·Î ÀÎÇØ ¸·´ëÇÑ °è»ê ´É·ÂÀ» ¿ä±¸ÇÏ´Â ¹®Á¦Á¡ÀÌ ÀÖ´Ù. µû¶ó¼ º» ³í¹®¿¡¼´Â ÇÁ¶óÀ̹ö½Ã º¸È£ ±â¹ýÀÇ Çʼö º¸¾È ¿ä°Ç 3°¡Áö¸¦ ¸ðµÎ ¸¸Á·ÇÏ¸é¼ ÅÂ±× ÆǺ° ½Ã°£À» °¨¼ÒÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. ¸ÕÀú ÀÌÁúÀûÀÎ ½Ã½ºÅÛÀ¸·Î ±¸¼ºµÇ´Â ±×¸®µå ȯ°æÀÇ Æ¯¼ºÀ¸·Î ÀÎÇØ ÃÖÀûÈµÈ ¼º´ÉÀ» ¾ò±â À§ÇÏ¿© Hash-Chain °è»ê Å×À̺íÀ» »ý¼ºÇÏ´Â ÇÁ·Î±×·¥À» ÀÛ¼ºÇÑ ÈÄ °¢ ³ëµåµéÀÇ ¼º´É ÃøÁ¤ÇÑ´Ù. ±× ÃøÁ¤ °á°ú¸¦ ÀÌ¿ëÇÏ¿© SPµéÀ» ºÐÇÒÇÏ´Â SPºÐÇÒ ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. ¶ÇÇÑ, ±¸Çö °á°ú Hash-Chain ±æÀÌ 1000, ³ëµå ¼ö 4·Î °íÁ¤µÈ »óÅ¿¡¼ ÃøÁ¤ÇÑ °á°ú¸¦ ´ÜÀÏ ³ëµå¿Í ±ÕµîºÐÇÒ, SPºÐÇÒÀ» ºñ±³Çϸé SPµéÀÇ ÃѼö°¡ 1000°³ ÀÏ ¶§ 40%, 49%, 2000°³ ÀÏ ¶§ 42%, 51%, 3000°³ ÀÏ ¶§ 39%, 49%, 4000°³ ÀÏ ¶§ 46%, 55%°¡ Çâ»óµÇ¾ú´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, We suggest the way(process) satisfied with all necessary security of Privacy Protection Shreme and decreased in Tag Identification Time in this paper. First, We¡®ll suggest the SP-Division Algorithm seperating SPs using the Performance Measurement consequence of each node after framing the program to create Hash-Chain Calculated table to get optimized performance because of character of the grid environment comprised of heterogeneous system. If we compare consequence fixed the number of nodes to 4 with a single node, equal partition, and SP partition, when the total number of SPs is 1000, 40%, 49%, when the total number of SPs is 2000, 42%, 51%, when the total number of SPs is 3000, 39%, 49%, and when the total number of SPs is 4000, 46%, 56% is improved.
|
Å°¿öµå(Keyword) |
RFID
Computational Grid
MPICH-G2
Privacy Protection
Hash-Chain Scheme
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|