• Title/Summary/Keyword: Low-Cost RFID 시스템

Search Result 47, Processing Time 0.022 seconds

Security Issues in Combined Protocol Between RFID Application and Wireless Sensor Network (RFID와 무선 센서네트워크를 융합한 프로토콜에서의 보안 문제)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.154-155
    • /
    • 2013
  • This paper presents a user authentication scheme for healthcare application using wireless sensor networks, where wireless sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals. Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we propose a user authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor user authentication, where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Localization Algorithm for a Mobile Robot using iGS (iGS를 이용한 모바일 로봇의 실내위치추정 알고리즘)

  • Seo, Dae-Geun;Cho, Sung-Ho;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.242-247
    • /
    • 2008
  • As an absolute positioning system, iGS is designed based on ultrasonic signals whose speed can be formulated clearly in terms of time and room temperature, which is utilized for a mobile robot localization. The iGS is composed of an RFID receiver and an ultra-sonic transmitter, where an RFID is designated to synchronize the transmitter and receiver of the ultrasonic signal. The traveling time of the ultrasonic signal has been used to calculate the distance between the iGS system and a beacon which is located at a pre-determined location. This paper suggests an effective operation method of iGS to estimate position of the mobile robot working in unstructured environment. To expand recognition range and to improve accuracy of the system, two strategies are proposed: utilization of beacons belonging to neighboring blocks and removal of the environment-reflected ultrasonic signals. As the results, the ubiquitous localization system based on iGS as a pseudo-satellite system has been developed successfully with a low cost, a high update rate, and relatively high precision.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Ring-type Heart Rate Sensor and Monitoring system for Sensor Network Application (센서 네트워크 응용을 위한 반지형 맥박센서와 모니터링 시스템)

  • Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.619-625
    • /
    • 2007
  • As low power, low cost wireless communication technology like Bluetooth, Zigbee, RFID has been put to practical use together with the wellbeing trend, the concern about ubiquitous health care has been greatly increased and u-Health is becoming one of the most important application in the sensor network field. Especially, development of the medical services to be able to cope with a state of emergency for solitary senior citizens and the aged in silver town is very meaningful itself and their needs are also expected to continuously increase with a rapid increase in an aging population. In this paper we demonstrate the feasibility of extracting accurate heart rate variability (HRV) measurements from photoelectric plethysmography(PPG) signals gathered by a ring type pulse oximeter sensor attached to the finger. For this, we made 2 types of ring sensor, that is reflective and pervious type, and developed the remote monitoring system which is able to collect HR data from ring sensor, analyze and cope with a state of emergency.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

NFC-based Attendance Checking System for Institutions of Higher Education (NFC 기반의 고등교육기관 출결지원 시스템에 대한 실증적 연구)

  • Cho, Yun Seok;Kim, KyungMi
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.283-289
    • /
    • 2015
  • We propose a low cost attendance checking system using NFC (Near Field Communication) and show a case study of an actual operation of the system in a higher education institute. The system offers a direct attendance check service when a student touches NFC tag on a classroom desk with his/her own smartphone. Our service was first developed and operated in 2012, and then additional functions like massive real time processing were reinforced. In the fall semester, 58 courses use the service and 96% of the class attendance was checked with mobile devices. The only hardware requirement of the system was NFC tag on the classroom desk, which reduced hardware cost dramatically. However, it also minimized attendance checking time into 1 minute regardless of enrolled student number.

Design of Diigence/Indolence System using a Smart Phone (스마트폰을 이용한 근태관리시스템의 설계)

  • Jo, Hyun Joon;Lee, Dong Gi;Kim, Min Gyu;Park, Jin Soo;Kim, Dong Hyun;Ban, Chae Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.307-309
    • /
    • 2013
  • Diligence/Indolence records are the basic data at a human resource management and the essential data for measure salaries of employees. However, since the D/I systems using RFIDs or biometric sensors require hish costs to build and operate the D/I systems, it is difficult for to small business or self-employed business to use them. In this paper, we propose the Diligence/Indolence system to use the location identification of a smart phon. To locate the position of an employee, the WiFi signal of a smart phone and the wireless access point are exploited. Because the pre-owned hardware resources are used and initial building costs are low, it is easy for small business to use the proposed D/I system with low cost.

  • PDF