• Title/Summary/Keyword: ID Reader

Search Result 100, Processing Time 0.024 seconds

A Method to Protect the Information of Tag Using Forced Collision Mechanism in RFID System (RFID 시스템에서 강제 충돌을 이용한 태그 정보 보호 기법)

  • Park Ju-Sung;Kang Jeonil;Nyang Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.25-33
    • /
    • 2005
  • We propose a method to protect the tag's information from illegal reader in RFID system. In this method, a special tag called ownership tag makes intentionally collisions during singulation. By the forced collision of an ownership tag a reader can obtain the information of ordinary tags. Whereas a reader can not find my information on tag's ID without the ownership tag.

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

A Study on the Implementation of SAW ID Reader Platform (SAW ID리더 플랫폼 구현에 관한 연구)

  • Yu, Ho-Jun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.766-771
    • /
    • 2008
  • As the practical range of SAW Device extended into various fields including physical sensor, chemical sensor and ID Tag, the platform for various SAW Devices is required more than ever. While SAW ID or Sensors advanced remarkably, the development of platform which applies to SAW Sensor left much to be desired. Therefore this paper represents the SAW platform in order to use SAW ID such as ID Tag or Sensors more conveniently. The SAW platform consists of a RF module which can recognize SAW ID and a main module which has a hish performance processor in order to process the response signal of SAW ID. The main module which has a high performance processor is designed by GUI environmental type to ensure that users are able to use the platform more easily. In this paper, the SAW platform, which is based on ARM9 core processor, used Windows Embedded CE 6.0 OS which brings friendly interface to users. Also the developers can make less effort to design various applications with sensors.

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

Application of RF-ID in Subway System (지하철 시스템에 대한 RF-ID의 적용)

  • Lee, Yong-Jea;Kim, Do-Hun;Kim, Yong-Sang;Yim, Sang-Wook;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2003.04a
    • /
    • pp.402-404
    • /
    • 2003
  • Radio frequency identification (RF-ID) is an automatic data capture (ADC) technology that comprises small data-carrying device(is called Tag) and fixed or mobile device(is called reader). Tags are attached or deattached device. Readers may be installed at locations where data capture is required, and may also be in the form of portable readers. In this paper, we are proposing an application for the subway station using the RF-ID system and a system for the gateless fare collection passing through the booth in only carrying the card. In this system that RF-ID system and Bluetooth are applied. We designed two wireless communication channels. One is the 125kHz communication channel by FSK and PSK for power supplying on the card and identification and the other is 2.4GHz channel for the collection.

  • PDF

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

Authentication Protocol Using Reader ID In RFID System (RFIE 시스템에서 리더 ID를 이용한 인증 프로토콜)

  • Kim, Tae-Eun;Ju, So-Jin;Lee, Jae-Sik;Lee, Seung-Min;Jun, Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.34-36
    • /
    • 2005
  • RFID는 IC칩에 내장된 정보를 무선주파수를 이용하여 비접촉방식으로 읽는 기술로서 유비쿼터스 시대를 맞이하여 주목받는 기술이다. 그러나 사용자도 알지 못하는 사이에 리더가 요구하는 질의에 자동으로 응답하는 RFID 태그의 특성은 사용자의 개인 정보 노출의 위험이 있다. 본 논문에서는 이러한 RFID 시스템의 문제점을 해결하기 위한 기존의 방법을 알아보고, 문제점을 분석한다. 또한 해쉬 함수를 이용하여 암호화하고, 리더 ID를 사용하여 데이터베이스와 리더간의 인증을 보완한 안전한 RFID 인증 프로토콜을 제안하고 설명한다.

  • PDF

Modeling of Propagation Interference and Channel Application Solution Suggestion In the UHF Band RFID Propagation Path (UHF 대역 RFID 전파경로에서의 전파간섭 모델링 및 채널 운용 방안 제안)

  • Moon, Young-Joo;Yeo, Seon-Mi;Jeon, Bu-Won;Roh, Hyoung-Hwan;Joung, Myoung-Sub;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.11
    • /
    • pp.2047-2053
    • /
    • 2008
  • Auto-ID industries and their services have been improved since decades ago, and radio frequency identification (RFID) has been contributing in many applications. Product management can be the foremost example. In our industrial experiences, RFID in ultra high frequency (UHF) band provides much longer interrogation ranges than that of 13.56MHz; many more applications exist thereby. There should be several interesting and useful ideas on UHF RFID; however, those ideas can be limited due to the inevitable environmental circumstances that restrict the interrogation range in shorten value. This paper discusses the propagation interference among different types of readers (e.g, mobile RFID readers in stationary reader zone) in dense-reader environment. In most cases, UHF RFIDs in Korea will be dependent on the UHF mobile RFIDs. In this sense, the UHF mobile users accidently move into the stationary reader's interrogation zone. This is serious problem. In this paper, we analyze propagation loss and propose the effective channel allocation scheme that can contribute developing less-invasive UHF RFID networks. The simulation and practical measurement process using the commercial CAD tools and measurement equipments are presented.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.