검색 상세

RFID 시스템에서 경량화된 태그를 사용한 출입인증 프로토콜

초록/요약

RFID 기술은 결제,출입통제,개인인증 등 다양한 분야에서 활용되고 있다.RFID 기술 중 MIFARE는 NXP사에서 만든 RFID 기술로서 태그 의 종류에 따라서 다양한 버전으로 출시되어 있다.MIFARE 버전 중에 MIFARE Classic은 태그에 연산능력이 전혀 없는 경량화된 저 비용 태 그로 출시된 버전이다.현재 RFID를 사용한 출입통제 연구는 많이 진행 되어 있다.그러나 MFIARE Classic과 같이 경량화된 태그를 사용한 출 입통제 시스템 구성을 위한 연구는 매우 미비하다. MIFARE Classic을 이용한 출입통제 시 무선통신 구간에서 인증정보 를 송수신한다.따라서 안전한 통신채널을 확보하지 않을 경우 공격자에 의해 데이터가 악용될 소지가 크다.대표적인 공격 유형으로는 데이터 도청,데이터 수정,재전송 공격 등과 같은 공격과 MIFARE Classic의 취약점을 이용한 공격이 존재한다. 본 논문에서는 기존 연구된 출입인증 프로토콜이 MIFARE Classic과 같은 경량화된 태그에서 사용할 수 없음을 보이려고 한다.더 나아가서 MIFARE Classic자체의 취약점을 분석하고 보완하여 MFIARE Classic 을 활용하는 출입인증 프로토콜을 제안하려고 한다.카드와 리더 간에 비밀키와 식별정보를 세션마다 서버에서 변경하여 카드에 Read/Write 함으로 안전성을 보장하였다.제안하는 프로토콜은 기존 연구에 비해서 해시함수 연산이 1.7배 빠름을 알 수 있었다.이를 활용하여 경량화된 태 그를 사용하여 출입인증 시스템을 구성할 수 있다.

more

목차

제 1장 서 론 ······························································································1
제 2장 관련연구 ·····························································································3
제 1절 RFID의 기술적 취약점 분석 및 대책 ·······································3
제 1항 RFID의 공격 유형에 따른 대응 방안 분석 ·························3
제 2항 기존 RFID 시스템의 인증 프로토콜 ·····································6
제 3항 출입 인증 시스템 보안 요구사항 ···········································9
제 2절 MIFARE Classic카드 ································································11
제 1항 MIFARE Classic카드의 구조 ··············································11
제 2항 MIFARE Classic카드의 취약점 ··········································16
제 3장 제안하는 프로토콜 ········································································19
제 1절 MIFARE Classic카드 기반의 출입인증 시스템 ··················19
제 2절 등록 단계 ·······················································································20
제 3절 인증 단계 ·······················································································22
제 4절 KCS&CID 관리 알고리즘 ····························································25
제 4장 프로토콜 검증 ·················································································29
제 1절 제안하는 프로토콜에 대한 안전성 분석 ·································29
제 1항 공격대응 ·····················································································29
제 2항 상호인증 ·····················································································31
제 3항 데이터 무결성 ···········································································33
제 4항 데이터 기밀성 ···········································································33
제 2절 기존 인증 프로토콜과의 비교 분석 ·········································33
제 1항 안전성 비교 분석 ·····································································33
제 2항 경량화 평가 ···············································································34
제 3절 유효성 평가 ···················································································33
제 5장 결 론 ···························································································38
참고문헌 ··············································································································39
Abstract·············································································································41

more