• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö (The Journal of Korea Information and Communications Society)

Çѱ¹Åë½ÅÇÐȸ ³í¹®Áö (The Journal of Korea Information and Communications Society)

Current Result Document : 22 / 246 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Àúºñ¿ë RFID ÀÎÁõÀ» À§ÇÑ PUF ±â¹Ý ¾Ïȣȭ ÇÁ·Î¼¼¼­¿Í »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝ ¼³°è
¿µ¹®Á¦¸ñ(English Title) Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication
ÀúÀÚ(Author) ÃÖ¿ø¼®   ±è¼º¼ö   ±è¿ëȯ   À±ÅÂÁø   ¾È±¤¼±   ÇѱâÁØ   Wonseok Che   Sungsoo Kim   Yonghwan Kim   Taejin Yun   Kwangseon Ahn   Kijun Han  
¿ø¹®¼ö·Ïó(Citation) VOL 39B NO. 12 PP. 0831 ~ 0841 (2014. 12)
Çѱ۳»¿ë
(Korean Abstract)
RFID ½Ã½ºÅÛÀº ¹«¼± Åë½ÅÀ» ÀÌ¿ëÇÏ¿© ¿î¿ëµÇ±â ¶§¹®¿¡ ¿ÜºÎÀÇ ºÒ¹ýÀûÀÎ °ø°Ý¿¡ ³ëÃâµÇ¾î ÀÖÀ¸¸ç ÀÌ¿¡ ´ëÇÑ ½Ã½ºÅÛ Ä§ÇØÀÇ À§Ç輺ÀÌ ³ô´Ù. ÀÌ·¯ÇÑ °ø°Ýµé¿¡ ´ëÇÑ º¸¾È ±â¹ýµé Áß PUF ±â¹ÝÀÇ ÀÎÁõ ±â¹ýÀÌ Á¸ÀçÇÑ´Ù. ±×·¯³ª ±âÁ¸ÀÇ PUF ±â¹Ý ±â¹ýµéÀº Çؽ¬³ª AES ¾Ë°í¸®ÁòÀ» ÇÔ²² ÀÌ¿ëÇϱ⠶§¹®¿¡, ºñ¿ë ¹× ¼º´ÉÀûÀÎ Ãø¸é¿¡¼­ Àúºñ¿ë RFID ű׿¡ ÀûÇÕÇÏÁö ¾Ê´Ù. º» ³í¹®¿¡¼­´Â, Àúºñ¿ë RFID ÀÎÁõÀ» À§ÇÏ¿© PUF ±â¹Ý ¾Ïȣȭ ÇÁ·Î¼¼¼­¿Í À̸¦ ÀÌ¿ëÇÑ »óÈ£ ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù. PUFÀÇ challenge-response ½ÖµéÀ» ÀÎÁõÅ°·Î È°¿ëÇÏ°í, À̸¦ PUFÀÇ Æ¯¼ºÀ» ÀÌ¿ëÇÏ¿© ¾ÏȣȭÇÔÀ¸·Î½á Çؽ¬ ¹× AES µîÀÇ ¾Ë°í¸®Áò »ç¿ëÀ» ¹èÁ¦ÇÏ¿´´Ù. ¸Å ¼¼¼Ç¸¶´Ù º¯°æµÇ´Â ¾Ïȣȭ ¹æ¹ý°ú ÀÏȸ¼º ³­¼ö¸¦ ÀÌ¿ëÇÑ XOR ¿¬»ê ±â¹ýÀ» È°¿ëÇÔÀ¸·Î½á °ø°ÝÀÚÀÇ challenge-response ½Ö¿¡ ´ëÇÑ ºÐ¼®À» Â÷´ÜÇÏ¿© ½Ã½ºÅÛ °ø°ÝÀ» ¹«·ÂÈ­ ½ÃŲ´Ù. ¶ÇÇÑ, PUF Ư¼ºÀ¸·Î ÀÎÇÏ¿© ¹°¸®Àû °ø°Ý¿¡ °­ÇÏ°í ű׿¡ ÀúÀåµÈ ÀÎÁõ µ¥ÀÌÅÍ°¡ Á¸ÀçÇÏÁö ¾Ê±â ¶§¹®¿¡ ¹°¸®Àû °ø°Ý¿¡ ÀÇÇÑ ÅÂ±× º¹Á¦ À§ÇèÀ» ¹æÁöÇÑ´Ù. Á¦¾ÈµÈ PUF ±â¹ÝÀÇ ¾Ïȣȭ ÇÁ·Î¼¼¼­´Â Àúºñ¿ëÀ¸·Î ±¸ÇöµÇ¸ç Àú¸éÀû ¹× ÀúÀü·ÂÀÇ Æ¯Â¡À» °®´Â´Ù.
¿µ¹®³»¿ë
(English Abstract)
The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.
Å°¿öµå(Keyword) RFID   Security   PUF   Authentication   Protocol  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå