• Title/Summary/Keyword: 태그위치

Search Result 428, Processing Time 0.026 seconds

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

Passive RFID Based Efficient Mobile Robot Localization (수동 RFID 기반 효율적인 이동로봇 위치 추정)

  • Kim, Sung-Bok;Lee, Sang-Hyup
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.67-68
    • /
    • 2008
  • 본 논문에서는 수동 RFID 환경 아래서 공간/시간 정보를 효과적으로 활용하여, 기존 연구결과에 비해 추정 오차를 감소시킴과 동시에 경제성을 향상시키는 새로운 위치 추정 기법을 개발하고자 한다. 기본적으로 이동로봇이 일련의 직선 구간을 구간별로 정속 주행하며 또한 매 순간 이동로봇에 의해 감지되는 태그의 수는 한 개 이하라고 가정한다. 이러한 가정 아래서, 이동로봇이 위치 정보가 알려진 태그의 감지 범위를 경유하는 과정에서의 시간 정보를 이용하여, 주어진 구간에 대해서 이미 알려져 있는 지점을 출발하여 정속으로 직선 주행하는 이동로봇의 속도 및 위치를 추정하는 알고리즘을 개발한다.

  • PDF

A Study on the RTLS Performance Improvement Using WLAN RSSI Level Filtering (무선랜 RSSI 신호의 필터링을 통한 RTLS의 성능 개선에 관한 연구)

  • Lee, Joo-Hyun;Kang, Byeong-Gwon
    • 한국ITS학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.184-187
    • /
    • 2010
  • RFID 기술은 각 사물에 전자태그를 부착하고, 사물의 고유 ID를 무선으로 인식하여, 해당 정보를 수집, 저장, 추적함으로써 사물에 대한 측위, 원거리 관리 및 사물 간 정보교환 등의 서비스를 제공하는 기술이다. RFID의 응용 분야의 하나로 전자태그가 부착되어 있는 대상의 위치를 실시간으로 파악하고 확인할 수 있는 RTLS(Real Time Locating Systems) 기술이 새로이 부각되고 있다. 본 논문에서는 AP의 RSSI(Received Signal Strength Indication)를 이용해 데이터의 정확도를 위해 약 30회의 위치 추정을 통한 위치 추정의 정확도를 알아보고 스무딩을 통한 측정 거리의 오차를 확인했다. AP의 RSSI를 통한 위치추정은 AP가 설치된 건물내의 실내환경에서 이루어졌으며, 비교적 정확한 약 3m의 오차를 보였고, 필터링을 통한 교통 추정값은 그보다 약 0.5~1m 향상된 성능을 보였다.

  • PDF

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF

Unproved Mutual Authentication Scheme based on Quadratic Residue for RFID (RFID를 위한 이차잉여 기반의 개선된 상호인증 기법)

  • Park, Han-Nah;Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.425-429
    • /
    • 2009
  • Recently, Chen et al.'s proposed mutual authentication scheme based on the quadratic resiidue, finding the squaring root problem, for avoiding exhaustive search on the server. But, if a malicious reader sends same random value, the tag is traced by an adversary. Moreover, there is realization problem because of its limited ability to compute squaring and hash function. In this paper, we analyze Chen et al.'s scheme and its weakness. Furthermore we present an improved mutual authentication scheme based on the quadratic residue which solves the tracing problem by generating random value on the tag and uses only squaring. We also make the scheme satisfy to forward secrecy without updating and synchronizing and avoid exhaustive search.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.999-1005
    • /
    • 2008
  • RFID(Radio Frequency IDintification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a high efficiency improvement effect was visible.

Implementation of a Real Time Indoor Positioning System for Medical Equipment Using Triangulation and Fingerprinting (삼각 측량 및 핑거프린트 방식을 이용한 의료 기기의 실시간 실내 측위 시스템 구현)

  • Nam, Hyo-Jin;Kim, Ju Hyun;Kim, Hyun Ah;Song, Hyun Ji;Baek, Se In;Song, Yang-Eui;Lee, Yong Kyu
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.20-23
    • /
    • 2017
  • 의료 기기 관리의 중요성에 따라 의료 기기의 실시간 실내 측위의 필요성이 대두되고 있다. 본 논문에서는 의료 기기에 Wi-Fi 태그를 부착하여 삼각 측량과 핑거프린트 방식을 이용한 의료 기기의 실시간 실내 측위 시스템을 구현하고자 한다. 중앙 제어 모듈과 의료 기기에 부착한 Wi-Fi 태그와의 통신을 통하여, 의료 기기의 위치 정보를 관리하는 데이터베이스를 실시간으로 파악함으로써 의료 기기의 정확한 위치 확인이 가능하다. 본 시스템을 통해 의료 기기에 부착한 Wi-Fi 태그의 실시간 위치 파악 및 정보 관리가 가능하여 의료 기기의 관리가 용이할 것으로 기대한다.

Development Portable Pipe Spool Location-Confirm System Based UHF RFID (UHF RFID기반 이동형 파이프 스풀 위치 인식 시스템 개발)

  • Kim, Jinsuk;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.329-336
    • /
    • 2014
  • Pipe spool is the most important element of plant equipment in plant construction site. Currently, the plant construction site manage the pipe spool location and usage history by handwriting. Frequently, the pipe spool is moved to unpredictable places by field workers in many construction sites and in cases like this, the pipe stool is replaced with another similar pipe spool. Since it's hard to determine the exact location of some of the pipe spools, it takes unnecessary time and labour to find the missing pipe spools, which proves that stock management is not under control. The purpose of our system is to make the identification of real-time location of the field pipes possible by attaching UHF RFID tags to the pipe spool, which will be used to connect with UHF RFID reader and antenna on vehicles. A field test conducted by the proposed system resulted in the success rate of 98% and the missing 2% was recuperated by hands-on correction, which proved that stock management through the proposed method can be 100% effective. The proposed system is expected to reduce labour costs and make stock control of assets possible, as well as applicable to similar stock management environments.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

Investigating an Automatic Method in Summarizing a Video Speech Using User-Assigned Tags (이용자 태그를 활용한 비디오 스피치 요약의 자동 생성 연구)

  • Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.1
    • /
    • pp.163-181
    • /
    • 2012
  • We investigated how useful video tags were in summarizing video speech and how valuable positional information was for speech summarization. Furthermore, we examined the similarity among sentences selected for a speech summary to reduce its redundancy. Based on such analysis results, we then designed and evaluated a method for automatically summarizing speech transcripts using a modified Maximum Marginal Relevance model. This model did not only reduce redundancy but it also enabled the use of social tags, title words, and sentence positional information. Finally, we compared the proposed method to the Extractor system in which key sentences of a video speech were chosen using the frequency and location information of speech content words. Results showed that the precision and recall rates of the proposed method were higher than those of the Extractor system, although there was no significant difference in the recall rates.