• Title/Summary/Keyword: ID Reader

Search Result 100, Processing Time 0.028 seconds

Anti-collision algorithm using Bin slot information for UHF (Bin 슬롯 정보를 이용한 UHF 대역 Anti-collision 알고리즘)

  • Choi Ho-Seung;Kim Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.41-48
    • /
    • 2006
  • An anti-collision algorithm is very important in the RFID system because it decides tag identification time and tag identification accuracy. We propose improved anti-collision algorithms using Bin slot in RFID system. In the proposed algorithms, if the reader memorizes the Bin slot information, it can reduce the repetition of unnecessary PingID command and the time to identify tags. If we also use ScrollA11ID command in the proposed algorithm, the reader knows the sequence of collided E bits. Using this sequence, the reader can reduce the repetition of PingID command and tag identification time. We analyze the performance of the proposed anti-collision algorithms and compare the performance of the proposed algorithms with that of the conventional algorithm. We also validate analytic results using simulation. According to the analysis, for the random tag n, comparing the proposed algorithms with the conventional algorithm, the performance of the proposed algorithms is about $130\%$ higher when the number of the tags is 200. And for the sequential tag ID, the performance of the conventional algorithm decreases. On the contrary, the performance of the proposed algerian using ScrollA11ID command is about $16\%$ higher than the case of using random tag ID.

SAW Device Reader Platform using FPGA (FPGA를 이용한 SAW Device Reader Platform 구현)

  • Son, Young-Tae;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.447-450
    • /
    • 2010
  • SAW Device 라는 Passive 소자는 ID Tag나 소형센서들을 대체할 수 있는 MEMS 기술의 초소형 Device 다. 이 SAW Device를 이용하면 독립된 공간이나 전원이 필요한 센서 제어 등을 대신할 수 있을 것이다. 이렇게 활용범위가 확대됨에 따라 다양한 SAW Device를 사용하기 위한 플랫폼이 요구된다. 하지만 현재 SAW Sensor는 많은 발전을 해왔지만 SAW Sensor를 활용할 수 있는 플랫폼의 발전은 미흡하기 때문에 본 논문에서는 이러한 SAW Device를 측정할 수 있는 SAW Reader를 FPGA를 이용하여 좀 더 간단하고 효율적인 Reader platform을 구현해 보고자 한다.

  • PDF

A Study of ID resolution technologies in REID System (RFID 시스뎀에서 ID 변환 기술 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1224-1230
    • /
    • 2006
  • ID registered in RFID tag is written as a binary or code form and interpreted by RF reader. It must be changed to FQDN structure for the internet service. FQDN(Fully Qualified Domain Name) form also must be resolved during the several steps in the application service networks. In this paper, we studied the technical issues and proposed the resolution mechanism fur the sample ID system. As a sample ID, we applied ISBN to RFID system.

  • PDF

A Study on the Band Shifted Ubiquitous-lD Reader Platform (Band Shifted Ubiquitous-ID Reader Platform 연구개발)

  • Park, Kyung-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1045-1048
    • /
    • 2005
  • This paper is for the design and implementation of the reader which can recognize the tag of the UHF band that we do not become internationally the standardization. Universal RFID Reader uses the software and specifies the class of UHF band. And then, it can recognize UHF band tags controlling the hardware.

  • PDF

Enhanced Anti-Collision Protocol for Identification Systems: Binary Slotted Query Tree Algorithm

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1092-1097
    • /
    • 2011
  • An anti-collision protocol which tries to minimize the collision probability and identification time is the most important factor in all identification technologies. This paper focuses on methods to improve the efficiency of tag's process in identification systems. Our scheme, Binary Slotted Query Tree (BSQT) algorithm, is a memoryless protocol that identifies an object's ID more efficiently by removing the unnecessary prefixes of the traditional Query Tree (QT) algorithm. With enhanced QT algorithm, the reader will broadcast 1 bit and wait the response from the tags but the difference in this scheme is the reader will listen in 2 slots (slot 1 is for 0 bit Tags and slot 2 is for 1 bit Tags). Base on the responses the reader will decide next broadcasted bit. This will help for the reader to remove some unnecessary broadcasted bits which no tags will response. Numerical and simulation results show that the proposed scheme decreases the tag identification time by reducing the overall number of request.

A Design and Implementation of 2.4GHz Active RFID Reader Protocol using Channel Switching (채널 스위칭을 이용한 2.4GHz 능동형 RFID 리더 프로토콜 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.95-98
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the informatin and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. there is ISO/IEC 18000-7 as typical standard of active RFID. it is single channel system of 433.92MHz and has limitation of collection of a number of tags. to overcome limitation of collection of many tags, we propose the new 2.4GHz active RFID technology which can use the multi-channel. if reader has multi-interface and uses another channel in each, reader could fast collect the tags. but, if a reader which has many interfaces collects tags through the specific interface, the performance may not improve any more comparing with a reader using single interface. in this paper, we show the fast collection through design and implementation of protocol for load balancing between interfaces in multi-interface RFID reader.

  • PDF

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

Design and Implementation of VLID System by Back-Scattering Visible Light (가시광의 후방산란을 이용한 VLID 시스템 설계 및 구현)

  • Yun, Jisu;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.1
    • /
    • pp.10-18
    • /
    • 2017
  • In this paper, we designed and implemented a visible light identification(VLID) system consisting of a VLID reader and a tag which backscatters incident lights from the reader. A VLID tag sends its ID to the reader by switching an LCD shutter which is located on its surface. The VLID reader consists of six LEDs and a photodiode(PD). The LEDs emit visible light and a PD located in a center position of LEDs receives backscattered light from the VLID tag. A microcontroller and a commercial liquid crystal display(LCD) shutter for 3D-TV glasses are used to implement a VLID tag. Experiments were conducted to confirm VLID system performance. We successfully demonstrated experiments to send NRZ-OOK signal of 100 bps over a distance of 35 cm at daytime. Also, we suggested the theoretical maximum transmission rate and the various methods to enhance the separation distance between a VLID reader and a tag.

A Hybrid Hyper Query Tree Algorithm for RFID System (RFID 시스템을 위한 하이브리드 하이퍼 쿼리 트리 알고리즘)

  • Kim, Tae-Hee;Lee, Seong-Joon;Ahn, Kwang-Seon
    • The KIPS Transactions:PartA
    • /
    • v.15A no.5
    • /
    • pp.287-294
    • /
    • 2008
  • A tag collision arbitration algorithm for RFID passive tags is one of the important issues for fast tag identification, since reader and tag have a shared wireless channel in RFID system. This paper suggests Hyper-Hybrid Query Tree algorithm to prevent the tag-collisions. The suggested algorithms determine the specified point in time for tag to transfer ID to reader by using value 1 of the upper 3 bit based on Query Tree. Also, because the transferred upper 3 bits of tag is different depending on the time of transfer, it is possible to predict in the suggested Algorithm. In the performance evaluation through simulation, it shows the suggested algorithm has higher performance in the number of queries compared to other Tree-based protocols.