• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2012³â Ãß°èÇмú´ëȸ

2012³â Ãß°èÇмú´ëȸ

Current Result Document : 30 / 171 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Çà·Ä±â¹Ý RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ °üÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A study on the matrix-based RFID authentication protocol
ÀúÀÚ(Author) ½ÅÈ¿¿µ   Á¤°èµ¿   Hyo-Young Shin   Kye-Dong Jung  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 02 PP. 0800 ~ 0803 (2012. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù RFID ½Ã½ºÅÛÀ» ¹°·ù, À¯Åë ºÐ¾ß¸¦ ºñ·ÔÇÑ ¿©·¯ ºÐ¾ß¿¡¼­ È°¿ëÇϱâ À§ÇØ RFID ½Ã½ºÅÛ¿¡ ´ëÇÑ Á¤º¸º¸È£¿¡ ´ëÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. º» ³í¹®¿¡¼­´Â ±âÁ¸¿¡ Á¦¾ÈµÈ Çà·Ä±â¹Ý RFID ÀÎÁõ ÇÁ·ÎÅäÄÝÀÌ °®´Â ´ÜÁ¡À» °³¼±ÇÏ°í, Çà·ÄÀ» ÀÌ¿ëÇÏ¿© ¼º´ÉÀÌ Çâ»óµÈ ÀÎÁõ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ ÀÎÁõ ÇÁ·ÎÅäÄÝÀº »óÈ£ÀÎÁõÀ» Á¦°øÇÏ°í, µµÃ» °ø°Ý, ÀçÀü¼Û °ø°Ý, ½ºÇªÇÎ °ø°Ý, Æ®·¡ÇÈ ºÐ¼® °ø°Ý µî¿¡µµ °­Çϸç, ¹é¿£µå µ¥ÀÌÅͺ£À̽ºÀÇ ºÎÇϸ¦ ÁÙ¿© ½Ã½ºÅÛ È¿À²ÀÌ ¿ì¼öÇÑ ÀåÁ¡À» °®´Â´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently, research on security of RFID system has been conducted actively in order to utilize RFID system in various fields including distribution and logistics. This paper suggests an authentication protocol which supplement the flaws of previous RFID authentication protocols and we improved its performance using matrix-based authentication. The suggested authentication protocol provides mutual authentication, protects from wiretapping attack, replay attack, spoofing attack, and traffic analysis attack and so on, and reduces overload of back-end database so that has efficient performance.
Å°¿öµå(Keyword) RFID   ÀÎÁõ   Çà·Ä   Á¤º¸º¸È£  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå