A Study on Authentication Protocol for Secure RFID Tag 


Vol. 34,  No. 8, pp. 805-811, Aug.  2009


PDF
  Abstract

Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Jung, J. Kim, M. Jun, "A Study on Authentication Protocol for Secure RFID Tag," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 8, pp. 805-811, 2009. DOI: .

[ACM Style]

Yong-Hoon Jung, Jung-Jae Kim, and Moon-Seog Jun. 2009. A Study on Authentication Protocol for Secure RFID Tag. The Journal of Korean Institute of Communications and Information Sciences, 34, 8, (2009), 805-811. DOI: .

[KICS Style]

Yong-Hoon Jung, Jung-Jae Kim, Moon-Seog Jun, "A Study on Authentication Protocol for Secure RFID Tag," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 8, pp. 805-811, 8. 2009.