• Title/Summary/Keyword: 무선인식 태그

Search Result 170, Processing Time 0.022 seconds

A Low-weight Authentication Protocol using RFID for IPTV Users (RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.105-115
    • /
    • 2009
  • At the most recent, IPTV service is increasing, which isa communicative broadcasting fusion service that provides various multimedia contents interactively followed by user's request through super high-speed internet. For IPTV user service with high mobility, IPTV user's enrollment is essential. However, IPTV service provided to mobile users can't provide the certification of mobile user securely. This paper proposes light user certification protocol which can certificate mobile users by attaching RFID to IPTV STB for secure awareness of mobile users who get IPTV service. The proposed protocol prevent reply attack and man-in-the-middle attack from happening oftenin a wireless section by transmitting the result value hashed by hash function with both its' ID and random number received from tag after tag transmits random number which generated randomly in the process of certification of mobile user to IPTV STB.

Improvement of Indoor Positioning Accuracy using Smart LED System Implementation (스마트 LED 시스템을 이용한 실내위치인식 정밀도 개선)

  • Lee, Dong Su;Huh, Hyeong Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.786-791
    • /
    • 2021
  • In this paper, in order to minimize limitations such as signal interference and positioning errors in existing indoor positioning systems, a smart LED-based positioning system for excellent line-of-sight radio environments and precise location tracking is proposed to improve accuracy. An IEEE 802.4 Zigbee module is mounted on the SMPS board of a smart LED; RSSI and LQI signals are received from a moving tag, and the system is configured to transmit the measured data to the positioning server through a gateway. For the experiment, the necessary hardware, such as the gateway and the smart LED module, were separately designed, and the experiment was conducted after configuring the system in an external field office. The positioning error was within 70cm as a result of performing complex calculations in the positioning server after transmitting a vector value of the moving object obtained from the direction sensor, together with a signal from the moving object received by the smart LED. The result is a significantly improved positioning error, compared to an existing short-range wireless communications-based system, and shows the level at which commercial products can be implemented.

An Implementation of Attendance Management System using NFC (NFC를 활용한 출결관리 시스템 구현)

  • Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1639-1644
    • /
    • 2013
  • Recently, interest is rapidly increasing in short-range wireless communication such as NFC (Near Field Communication). In order to minimize the attendance time, we propose the attendance management system using the NFC tags attached in all of the desks in a classroom and NFC readers embedded in most of the smart-phones released in lately. The system consists of PC version web-application for professors and the android version app-application for students. And it provides the professors with more lecture time by saving the attendance check time. The contribution of this paper include that it proposes and develops the prototype of the attendance management system using NFC and proves that the system is applicable to the various kinds of educational organizations.

Study on NFC Security Analysis and UICC Alternative Effect (NFC 보안 기술 분석 및 UICC 적용 효과 연구)

  • Lim, Sun-Hee;Jeon, Jae-Woo;Jung, Im-Jin;Yi, Ok-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.29-36
    • /
    • 2011
  • Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.

A Study on Evolution Strategy of the Next Generation Mobile Terminals (차세대 이동단말의 발전 전략에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.131-135
    • /
    • 2005
  • Nowadays, the demand for the wireless technology has gradually increased to support the services of high speed wired internet and also the interest of a mobile terminal convergence has increased. In the next generation, the mobile terminal could merge with the celluar phone, wireless LAN, portable internet, digital multimedia brodcasting, mobile game and sensor(smart-tag and biometrics) through the unified single user interface. Moreover, the system is supported to multi-mode at difference networks, which have variable functions and high performance for available service. Inthis paper, we investigate the minimum requirements and the core technologies of the next generation mobile terminals.

  • PDF

RFID Based Management System for Spare Parts in a Real Ship (RFID 기반 실선 물품관리 시스템)

  • Cho, Seong-Rak;Paik, Bu-Geun;Cho, In-Sung;Park, Beom-Jin;Lee, Dong-Kon;Bae, Byung-Dueg;Yun, Jong-Hwui
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.2
    • /
    • pp.171-178
    • /
    • 2009
  • In this paper, RFID (Radio Frequency Identification) based management system is introduced to control effectively logistic supply items and machinery spare parts in a ship. To apply an RFID system under very harsh environment in a ship which is a steel-structured small area with lots of compartment, we measured reading distances and angles in open space, in an steel compartment, and an real ship separately in order to investigate the reliability between various tags and RFID.

A Study on Key Distribution Using Level-key in Wireless Sensor Networks (무선 센서 네트워크에서 레벨 키를 이용한 효율적인 키 분배 방법에 관한 연구)

  • Kim, Do-Hoi;Choi, Jin-Young;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.815-818
    • /
    • 2007
  • 최근 유비쿼터스 시대가 도래하면서 센서 네트워크의 중요성이 대두되고 있다. 센서 네트워크란 필요한 모든 곳에 전자태그를 부착하고, 이를 통해 사물의 인식 정보를 기본으로 주변의 환경정보까지 각종 센서를 통해 실시간으로 수집하여 관리, 통제할 수 있도록 구성한 네트워크를 말한다. 이러한 센서 네트워크에서 각 노드들은 에너지, 계산 능력, 대역폭 등에 상당한 제한을 받으며, 정보가 저장된 장치를 쉽게 도난 당할 수도 있다. 특히 보안 통신을 하기 위해 키 설정 및 관리는 필수적이며 지금까지 그로 인해 여러 가지 키 분배 및 관리 방법이 제안되었다. 본 논문은 군대 등의 특정 상황과 같이 계층적 구조를 가지는 센서 네트워크에서 더욱 효율적으로 통신을 할 수 있는 키 관리 방법을 소개하고자 한다. 기존의 계층적 구조의 취약점을 분석하고, 이를 바탕으로 레벨 키를 제안하여 같은 레벨에서 다른 그룹간 통신이 가능한 효율적인 키 분배 방안을 제시한다.

Advanced Indoor Location Tracking Using RFID (RFID를 이용한 개선된 실내 위치 추적)

  • Joo, Won-lee;Kim, Hyo-Sun;Jung, Yeong-Ah;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.425-430
    • /
    • 2017
  • RFID is a technology that uses radio frequency to read information in tags attached to objects or people. Because it reads the information without contact when tracking the location using tags in a RFID system, there can be errors between the actual position and measured position. In this paper, three methods (the method of radiation pattern, the method of the median value, and the method using both the radiation pattern and median value) are proposed to identify the location of objects or people using the RFID technique. The location identification system based on RFID was constructed and tags were arranged in a square pattern. The real location and experimentally predicted location of an object containing a reader were compared to confirm the error. Instead of the existing papers that obtained the approximately location of a reader by calculating the center of gravity of all tags read by that reader, in this study, the predicted location was obtained by the median value and the radiation pattern. This study validated which method was the most efficient among the three methods proposed in this paper through the data of the read tags. As a result, the method of the median value had the smallest error among those assessed.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Development of RFID terminal for the Blind to Voice Guide Pharmaceutical E-pedigree (시각장애인을 위한 RFID 의약품 음성안내 단말기 개발)

  • Kang, Joon-Hee;Ahn, Sung-Soo;Kim, Jin-Young
    • 전자공학회논문지 IE
    • /
    • v.47 no.3
    • /
    • pp.19-25
    • /
    • 2010
  • We developed a RFID terminal to voice guide the blind who have difficulties in reaching out to the pharmaceutical information. In this work, we used RFID technology to instruct the pharmaceutical information to the blind. The voice guidance reader was made to read the RFID tag attached to the drugs and announced the pharmaceutical information matching to the tag specific ID. We had the reader to obtain the pharmaceutical information from the ezDrug site operated by Korea Food & Drug Association. The voice guidance reader was fabricated as necklace type for the easy carry, and we added mp3 player as dual uses. ARM series Cortex M3 chip was used for the reader's core chip and low power MFRC523 chipset of NXP was used to construct RFID circuit. MFRC523 chip uses low power to meet the mobile application. We used VS1003B MP3 Decoder IC to make the voice generation circuit and CC2500 chipset for the wireless communication to the pharmaceutical information server. We also developed the system that can support ISO 14443A type and ISO 14443B type so that the system can be used to extend to various RFID protocols. Utilization of this system can conveniently convey the pharmaceutical information to the blind and reduce the drug abuse.