Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð
ÇѱÛÁ¦¸ñ(Korean Title) |
Á¤Çü°ËÁõÀ» ÅëÇÑ RFID º¸¾ÈÇÁ·ÎÅäÄÝ ºÐ¼® ¹× ±¸Çö |
¿µ¹®Á¦¸ñ(English Title) |
Analysis and Implementation of RFID Security Protocol using Formal Verification |
ÀúÀÚ(Author) |
±èÇö¼®
±èÁÖ¹è
ÇѱÙÈñ
ÃÖÁø¿µ
Hyun-Seok Kim
Ju-Bae Kim
Keun-Hee Han
Jin-Young Choi
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 35 NO. 07 PP. 0332 ~ 0339 (2008. 08) |
Çѱ۳»¿ë (Korean Abstract) |
Radio Frequency Identification(RFID ¹«¼±ÁÖÆļö½Äº°) ±â¼úÀº À¯ºñÄõÅͽº ±¸Á¶ ±â¼úÀÇ Áß¿äÇÑ ÇÑ ºÎºÐÀ» ÀÌ·ç°í ÀÖ´Ù. ű׸¦ ÀÌ¿ëÇÑ ¸ðµç Á¦Ç°µéÀÌ ÀÌ·¯ÇÑ ¼ºñ½ºÀÇ ´ë»óÀÌ µÇ°í ÀÖÁö¸¸ ºÒÇàÈ÷µµ ´Ù¹æ¸é¿¡ ÀÌ¿ëµÇ´Â À̸鿡´Â »ç¿ëÀÚÀÇ »ç»ýÈ°°ú »ç¿ëÀÚ ¹× ÆǸÅÀÚ °£ÀÇ ÀÎÁõ¹®Á¦¸¦ ÀÌ¿ëÇÑ ¼ºñ½º °ø°ÝÀÇ ´ë»óÀÌ µÇ°í ÀÖ´Ù. ÇöÀç ÀÌ·¯ÇÑ RFID ½Ã½ºÅÛÀÇ º¸¾È ¸ÞÄ¿´ÏÁòµéÀº À̽´ÈµÇ°í ÀÖÀ¸¸ç º» ³í¹®¿¡¼´Â ¿©·¯°¡Áö ¸ÞÄ¿´ÏÁòµé Áß »ç»ýÈ° ¹× ÀÎÁõ¹®Á¦ ÇØ°áÀ» À§ÇØ Á¤Çü°ËÁõÀ» ÅëÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ ºÐ¼® ¹× Ãë¾à¼ºÀ» ¼öÁ¤ÇÑ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÏ°íÀÚ ÇÑ´Ù. ¶ÇÇÑ Á¦¾ÈµÈ ÇÁ·ÎÅäÄÝÀÇ ½ÇÇö°¡´É¼ºÀ» À§ÇÑ ±¸Çö°¡´É¼ºÀ» ¾ð±ÞÇÏ°íÀÚ ÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Radio Frequency Identification (RFID) technology is an important part of infrastructures in ubiquitous computing. Although all products using tags is a target of these services, these products also are a target of attacking on user privacy and services using authentication problem between user and merchant, unfortunately. Presently, it is very important about security mechanism of RFID system and in this paper, we analyze the security protocol among many kinds of mechanisms to solve privacy and authentication problem using formal verification and propose a modified novel protocol. In addition, the possibility of practical implementation for proposed protocol will be discussed.
|
Å°¿öµå(Keyword) |
Radio Frequency Identification (RFID)
RFID: ¹«¼±ÁÖÆļö½Äº°
º¸¾È ÇÁ·ÎÅäÄÝ
ÇÁ¶óÀ̹ö½Ã
Á¤Çü°ËÁõ
Security Protocol
Privacy
Formal Verification
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|