Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

서버와 리더의 위장공격 탐지가 가능한랜덤 ID기반 RFID 상호 인증 프로토콜

Full metadata record
DC Field Value Language
dc.contributor.author여돈구-
dc.contributor.author이상래-
dc.contributor.author장재훈-
dc.contributor.author염흥열-
dc.date.accessioned2021-08-12T07:29:34Z-
dc.date.available2021-08-12T07:29:34Z-
dc.date.created2021-06-17-
dc.date.issued2010-
dc.identifier.issn1598-3986-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/18306-
dc.description.abstractRecently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.-
dc.language한국어-
dc.language.isoko-
dc.publisher한국정보보호학회-
dc.title서버와 리더의 위장공격 탐지가 가능한랜덤 ID기반 RFID 상호 인증 프로토콜-
dc.title.alternativeA Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader-
dc.typeArticle-
dc.contributor.affiliatedAuthor염흥열-
dc.identifier.bibliographicCitation정보보호학회논문지, v.20, no.4, pp.89 - 108-
dc.relation.isPartOf정보보호학회논문지-
dc.citation.title정보보호학회논문지-
dc.citation.volume20-
dc.citation.number4-
dc.citation.startPage89-
dc.citation.endPage108-
dc.type.rimsART-
dc.identifier.kciidART001479273-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorHash-based RFID-
dc.subject.keywordAuthorRandom ID-
dc.subject.keywordAuthorMutual Authentication-
dc.subject.keywordAuthorSelf-depence-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Youm, Heung youl photo

Youm, Heung youl
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE