Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

온라인 백-엔드-데이터베이스가 없는안전한 RFID 상호 인증 프로토콜

Full metadata record
DC Field Value Language
dc.contributor.author원태연-
dc.contributor.author유영준-
dc.contributor.author천지영-
dc.contributor.author변진욱-
dc.contributor.author이동훈-
dc.date.accessioned2021-09-08T08:41:10Z-
dc.date.available2021-09-08T08:41:10Z-
dc.date.created2021-06-17-
dc.date.issued2010-
dc.identifier.issn1598-3986-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/118122-
dc.description.abstractRFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile readers, instead of static readers. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader, 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국정보보호학회-
dc.title온라인 백-엔드-데이터베이스가 없는안전한 RFID 상호 인증 프로토콜-
dc.title.alternativeSecure Mutual Authentication Protocol for RFID Systemwithout Online Back-End-Database-
dc.typeArticle-
dc.contributor.affiliatedAuthor이동훈-
dc.identifier.bibliographicCitation정보보호학회논문지, v.20, no.1, pp.63 - 72-
dc.relation.isPartOf정보보호학회논문지-
dc.citation.title정보보호학회논문지-
dc.citation.volume20-
dc.citation.number1-
dc.citation.startPage63-
dc.citation.endPage72-
dc.type.rimsART-
dc.identifier.kciidART001421014-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorRFID-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorMutual authentication-
dc.subject.keywordAuthorRFID-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorMutual authentication-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE