Learn More
Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, this paper propose a secure authentication scheme based on EPC Class Gen-2 The Proposed scheme is a(More)
As the utilization range of smart devices for infrastructure has widen its application owing to flourishing of smart devices, studies on the technologies to graft IT onto underground utilities are actively carried out. In particular, as underground utilities have a characteristic of invisibility, studies on a management system converged with augmented(More)
Recently diverse studies have emerged on the ubiquitous environment including the ones on RFID tag. In terms of security, in particular, RFID tag is not able to provide complex forms of security services due to its hardware limits, putting in turn limits on its wider use. Therefore, this thesis is to suggest an improved RFID tag authentication scheme using(More)
This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be(More)
  • 1