• Title/Summary/Keyword: 전자 Tag

Search Result 436, Processing Time 0.037 seconds

Optimal Time Structure for Tag Cognizance Scheme based on Framed and Slotted ALOHA in RFID Networks (RFID 망에서 프레임화 및 슬롯화된 ALOHA에 기반한 Tag 인식 방식을 위한 최적 시간 구조)

  • Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.9
    • /
    • pp.29-36
    • /
    • 2010
  • Consider an RFID network configured as a star such that a single reader is surrounded by a crowd of tags. In the RFID network, prior to attaining the information stored at a tag, the reader must cognize the tags while arbitrating a collision among tags' responses. For this purpose, we present a tag cognizance scheme based on framed and slotted ALOHA, which statically provides a number of slots in each frame for the tags to respond. For the evaluation of the cognizance performance, we choose the cognizance completion probability and the expected cognizance completion time as key performance measures. Then, we present a method to numerically calculate the performance measures. Especially, for small numbers of tags, we derive them in a closed form. Next, we formulate a problem to find an optimal time structure which either maximizes the cognizance completion probability under a constraint on the cognizance time or minimizes the expected cognizance completion time. By solving the problem, we finally obtain an optimal number of slots per frame for the tags to respond. From numerical results, we confirm that there exist a finite optimal number of slots for the tags to respond. Also, we observe that the optimal number of slots maximizing the cognizance completion probability tends to approach to the optimal number of slots minimizing the expected cognizance completion time as the constraint on the cognizance time becomes loose.

A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy (이동형 리더의 프라이버시를 보호하는 안전하고 효율적인 RFID 태그 검색 프로토콜)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.109-117
    • /
    • 2010
  • Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.

Gen2-Based Tag Anti-collision Algorithms Using Chebyshev's Inequality and Adjustable Frame Size

  • Fan, Xiao;Song, In-Chan;Chang, Kyung-Hi;Shin, Dong-Beom;Lee, Heyung-Sub;Pyo, Cheol-Sig;Chae, Jong-Suk
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.653-662
    • /
    • 2008
  • Arbitration of tag collision is a significant issue for fast tag identification in RFID systems. A good tag anti-collision algorithm can reduce collisions and increase the efficiency of tag identification. EPCglobal Generation-2 (Gen2) for passive RFID systems uses probabilistic slotted ALOHA with a Q algorithm, which is a kind of dynamic framed slotted ALOHA (DFSA), as the tag anti-collision algorithm. In this paper, we analyze the performance of the Q algorithm used in Gen2, and analyze the methods for estimating the number of slots and tags for DFSA. To increase the efficiency of tag identification, we propose new tag anti-collision algorithms, namely, Chebyshev's inequality, fixed adjustable framed Q, adaptive adjustable framed Q, and hybrid Q. The simulation results show that all the proposed algorithms outperform the conventional Q algorithm used in Gen2. Of all the proposed algorithms, AAFQ provides the best performance in terms of identification time and collision ratio and maximizes throughput and system efficiency. However, there is a tradeoff of complexity and performance between the CHI and AAFQ algorithms.

  • PDF

A Fully Integrated CMOS Security-Enhanced Passive RFID Tag

  • Choi, Suna;Kim, Hyunseok;Lee, Sangyeon;Lee, Kangbok;Lee, Heyungsub
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.141-150
    • /
    • 2014
  • A fully integrated CMOS security-enhanced passive (SEP) tag that compensates the security weakness of ISO/IEC 18000-6C is presented in this paper. For this purpose, we propose a security-enhanced protocol that provides mutual authentication between tag and reader. We show that the proposed protocol meets the security demands of the ongoing international standard for RFID secure systems, ISO/IEC 29167-6. This paper fabricates the SEP tag with a 0.18-${\mu}m$ CMOS technology and suggests the optimal operating frequency of the CMOS SEP tag to comply with ISO/IEC 18000-6C. Furthermore, we measure the SEP tag under a wireless environment. The measured results show that communications between the SEP tag and reader are successfully executed in both conventional passive and SEP modes, which follow ISO/IEC 18000-6C and the proposed security enhanced protocol, respectively. In particular, this paper shows that the SEP tag satisfies the timing link requirement specified in ISO/IEC 18000-6C.

XML Mapping Rules for UN/CEFACT Messages (UN/CEFACT 전자문서의 XML변환규칙)

  • 정용규;김운섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.151-153
    • /
    • 2002
  • 전자문서교환(EDI, Electronic Data Interchange)은 기업과 기업간에 컴퓨터와 컴퓨터의 통신을 통하여 필요한 거래문서를 구조화된 형식으로 교환하여 업무를 처리하는 방식을 말한다. 그동안 EDI 표준은 북미를 중심으로 한 ANSI X.12를 시작으로, 이에 대웅되는 유럽중심의 UN/CEFACT 표준이 제정되었다. UN/CEFACT로 표준을 통합하기로 합의한 양대 표준은 또 다른 XML환경을 접하게 되었다. ISO TC154에서는 UN/CEFACT전자문서의 XML변환에 관한 논의하게 되었으나 표준으로 권고되지 못하고 있는 실정이다. 이런 표준간 연동의 문제를 위하여 본 논문에서는 Speaking Tag방식과 UN/CEFACT Tag방식의 두가지를 제안하며 각각에 대해 변환규칙을 제안한다.

  • PDF

Design of an Ultra-Compact UHF Passive RFID Tag Antenna for a Medical Sample Tube

  • Lee, Jung-Nam;Hwang, Moon-Young;Lee, Sang-Il;Lee, Kwang-Chun;Park, Jong-Kweon
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.974-977
    • /
    • 2012
  • In this letter, a small-sized ultra-high frequency (UHF) RFID tag antenna for a medical sample tube is proposed. The RFID tag antenna is designed and fabricated based on the circular loop antenna used in the UHF band (Korea standard, 917 MHz to 923.5 MHz). The tag antenna size is reduced using a circular meander stub. The antenna has a physical size of 8 mm, which is about ${\lambda}$/40 in electrical length. The proposed tag antenna is molded into a medical sample and multitag identification is performed.

RFID Tag Antenna Coupled by Shorted Microstrip Line for Metallic Surfaces

  • Choi, Won-Kyu;Kim, Jeong-Seok;Bae, Ji-Hoon;Choi, Gil-Young;Pyo, Cheol-Sig;Chae, Jong-Suk
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.597-599
    • /
    • 2008
  • This letter presents the design of a small and low-profile RFID tag antenna in the UHF band that can be mounted on metallic objects. The designed tag antenna, which uses a ceramic material as a substrate, consists of a radiating patch and a microstrip line with two shorting pins for a proximity-coupled feeding structure. Using this structure, impedance matching can be simply obtained between the antenna and tag chip without a matching network. The fractional impedance bandwidth for $S_{11}$ <3 dB and radiation efficiency are about 1.4% and 56% at 911 MHz, respectively. The read range is approximately from 5 m to 6 m when the tag antenna is mounted on a metallic surface.

  • PDF

Shorted Microstrip Patch Antenna Using Inductively Coupled Feed for UHF RFID Tag

  • Kim, Jeong-Seok;Choi, Won-Kyu;Choi, Gil-Young;Pyo, Cheol-Sig;Chae, Jong-Suk
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.600-602
    • /
    • 2008
  • A very small patch-type RFID tag antenna (UHF band) using ceramic material mountable on metallic surfaces is presented. The size of the proposed tag is 25 mm${\times}$25 mm${\times}$3 mm. The impedance of the antenna can be easily matched to the tag chip impedance by adjusting the size of the shorting plate of the patch and the size of the feeding loop. The measured maximum reading distance of the tag at 910 MHz was 5 m when it was mounted on a 400 mm${\times}$400 mm metallic surface. The proposed design is verified by simulation and measurements which show good agreement.

  • PDF

Instruments Access Management System using NFC Tag (NFC Tag를 통한 기기 출입 관리 시스템)

  • Jeong, Nan;Kook, Jiwon;Park, Soyoung;Sim, Taeyoung;Lee, Chung-sei
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.77-79
    • /
    • 2014
  • 시스템은 대중화된 NFC 기술을 이용하여 회사 보안실의 전자 기기의 반입과 출입을 관리하는 시스템이다. NFC Tag를 이용하여 전자 기기의 정보를 저장, 수정, 삭제가 가능하고 이 정보는 회사 내의 데이터베이스에 저장이 된다. 시스템을 통한 전자 기기의 반입과 출입 정보는 시스템의 웹페이지에서 확인할 수 있다. 이 시스템을 통하여 데이터의 관리의 효과적인 운영이 가능하도록 한다.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.