• Title/Summary/Keyword: 2.4GHz 능동형 RFID

Search Result 13, Processing Time 0.016 seconds

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

Implementation of Improved Frame Slotted ALOHA Algorithm for Fast Tag Collection in an Active RFID System (고속 태그 수집을 위한 개선된 능동형 RFID 시스템용 프레임 Slotted ALOHA 알고리즘 구현)

  • Kim, Ji-Tae;Kang, Byeong-Gwon;Lee, Kang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.598-605
    • /
    • 2014
  • In this paper, we suggest a modified slotted ALOHA algorithm for fast tag collection in active RFID system and implement the reader and tag operation using CC2530 chip of Texas Instruments Co. to prove the performance of the proposed algorithm. In the present international standard related with active RFID including ISO/IEC 18000-7 the reader sends sleep command to each tag after successful obtaining tag's information. Meanwhile, in this paper, the tags decide to sleep after checking the second command from the reader resulting in enormously decreased tag collection time. We tested the proposed algorithm with 30 tags over the range of 0-3m and the results showed that the tag collection process was completed in 400msec at average. And 30 tags are collected in one second with 99.7% and the collection rate is 100% in 2m distance between reader and tag. The collection rates are 99.94% and 99.7% for distance 2.5m and 3m, respectively. The average collection rate is 99.91% over all range and it is concluded that the proposed algorithm is enough to apply to real fields.

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF