• Title/Summary/Keyword: Mobile RFID

Search Result 407, Processing Time 0.032 seconds

Middleware Implementation for Mobile RFID Terminal (모바일 RFID 단말을 위한 미들웨어 개발)

  • Ye, Seoung-Bin;Ceong, Hee-Taek;Han, Soon-Hee;Kang, Young-Man
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.236-243
    • /
    • 2007
  • Radio frequencies used by the logistics of RFID in various areas, including research the core of ubiquitous computing. Moreover, RFID and the convergence of mobile terminals RFID research started as a B2B service area, B2C services and the expansion of the zone. B2B2C to in order to provide services ranging from mobile terminals for RFID technology development is needed. We develop middleware for a mobile RFID terminal. It consists of multi-code recognition module, the reader control module, the module code interpretation, and Dispatcher module. We present the implementation of these functions on an emulator.

  • PDF

The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems (모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법)

  • Kim, Dong-Chul;Chun, Ji-Young;Choi, Eun-Young;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.189-198
    • /
    • 2009
  • Mobile RFID system is a next generation technology which combines the existing RFID systems with mobile systems. It is newly expected to provide additional services and will be broadly used in everyday life; however, it sometimes causes the privacy or security problems generated by existing RFID systems and the additional privacy or security problems. Moreover, even if many methods have been proposed to solve those problems, it is still difficult to adapt to reality or to guarantee the security perfectly. Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID systems which require to protect the privacy. This mechanism suggests that own tagging-products needed to protect privacy using mobile reader of personal don't provide any information to other readers except their own reader. In addition to, proposing mechanism is the efficient mechanism which largely reduces the process to maintain the synchronization when happen to the DoS attack or system error.

An Empirical Study on Assessment of Mobile RFID Service (모바일 RFID 서비스 평가에 관한 연구)

  • Park, Yong-Jae;Rim, Myung-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.939-942
    • /
    • 2008
  • In this study, some useful implications related to mobile RFID service will be given to the mobile communication service providers and staff in charge through developing and assessing the evaluation dimensions considering quality, value, and customer's satisfaction, complaint and loyalty in mobile RFID service which is in trial service stage. For this purpose, web based survey was performed for general customers who had experienced mobile RFID trial service, 350 pieces of collected samples were analyzed, mobile RFID service was assessed with the tool of SPSS 12.0k, and the difference to customers' characteristic was analyzed. On the basis of the result through the empirical research, before commercial launch, serviceable implications such as service improvements which can be obtained through the evaluation result of mobile RFID service were provided for the staff and the managers in charge of mobile communication service.

  • PDF

Design and Implementation of Mobile RFID Middleware based Pet Management System (모바일 RFID 미들웨어 기반 Pet 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.19-26
    • /
    • 2010
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement the Pet management system for optimized mobile RFID middleware that supports real-time data processing. The proposed Pet management system consists of registration module, retrieval module, communication module, and display module in order to display retrieval result from server. Also, the captured data in the PDA is transmitted to the server and another client system using the mobile application interface that supports the SOAP application access protocol.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

Performance Evaluation of Authentication Protocol for Mobile RFID Privacy (모바일 RFID 프라이버시를 위한 인증 프로토콜 성능 평가)

  • Eom, Tae-Yang;Yi, Jeong-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.618-630
    • /
    • 2011
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. Although the users can get the information about a certain product anytime anywhere, there is high probability that their privacy may be violated because their belongings with RFID tags can be scanned by other mobile readers at any time. Several RFID authentication schemes have been proposed to deal with these privacy issues. However, since the existing solutions require heavy computation on the tag side, most of them is not applicable to the general low-cost passive tags which do not have any processing unit. In this paper, we propose the efficient authentication scheme for mobile RFID system applicable to the passive tags as well as the active ones by the best use of computing capability of mobile devices. The proposed scheme satisfies the import security issues such as tag protection, untraceability, anti-traffic analysis. We also implement the proposed scheme on top of real smartphone for feasibility and show the experimental results from it.

A Probabilistic Approach for Mobile Robot Localization under RFID Tag Infrastructures

  • Seo, Dae-Sung;Won, Dae-Heui;Yang, Gwang-Woong;Choi, Moo-Sung;Kwon, Sang-Ju;Park, Joon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1797-1801
    • /
    • 2005
  • SLAM(Simultaneous localization and mapping) and AI(Artificial intelligence) have been active research areas in robotics for two decades. In particular, localization is one of the most important issues in mobile robot research. Until now expensive sensors like a laser sensor have been used for the mobile robot's localization. Currently, as the RFID reader devices like antennas and RFID tags become increasingly smaller and cheaper, the proliferation of RFID technology is advancing rapidly. So, in this paper, the smart floor using passive RFID tags is proposed and, passive RFID tags are mainly used to identify the mobile robot's location on the smart floor. We discuss a number of challenges related to this approach, such as RFID tag distribution (density and structure), typing and clustering. In the smart floor using RFID tags, because the reader just can senses whether a RFID tag is in its sensing area, the localization error occurs as much as the sensing area of the RFID reader. And, until now, there is no study to estimate the pose of mobile robot using RFID tags. So, in this paper, two algorithms are suggested to. We use the Markov localization algorithm to reduce the location(X,Y) error and the Kalman Filter algorithm to estimate the pose(q) of a mobile robot. We applied these algorithms in our experiment with our personal robot CMR-P3. And we show the possibility of our probability approach using the cheap sensors like odometers and RFID tags for the mobile robot's localization on the smart floor.

  • PDF

Adult Certification System on Mobile RFID Service Environments (모바일 RFID 서비스 환경에서의 성인 인증 시스템)

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.131-138
    • /
    • 2009
  • This paper is about adult certification on Mobile RFID Service Environments coming through the combination of RFID(Radio Frequency IDentification) technology, as the core technology of ubiquitous environments, and mobile telecommunication technology. To overcome the shortcoming of simple adult certification on current internet, we suggest a framework for content-based classification and propose an adult certification system using it. At first, we explain conventional methods for adult certification, and show a criteria of content-based classification for preventing an exposure of adult contents from minors. Additionally, we describe data structure and system for the proposed adult certification on mobile RFID environment, and finish it with concluding remarks.

Functions for RFID Middleware Development on Mobile Device Emulator (모바일 단말 에뮬레이터에서 RFID 미들웨어 구현을 위한 기능 연구)

  • Ye, Seoung-Bin;Han, Soon-Hee;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.106-111
    • /
    • 2008
  • At the ubiquitous computing, Mobile RFID, which the convergence RFID and mobile device, researches are core method and infra to service B2B, B2C, and B2B2C service domain. We propose the functions of middleware to develop the mobile RFID device. It consists of multi-code integrated recognition module, the reader control module, the module code interpretation, and Dispatcher module. These functions can recognize the tag of EPC/ISO and mCode type. We describe the zone file of local ODS and the implemented module to read the 13.56MHz tag.

  • PDF

Design of RFID Mutual Authentication Protocol for Mobile RFID (모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계)

  • Lee, Seung-Min;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.183-190
    • /
    • 2010
  • Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.