• Title/Summary/Keyword: Passive Tag

Search Result 152, Processing Time 0.021 seconds

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.

Design of Reader Baseband Receiver Structure for Demodulating Backscattered Tag Signal in a Passive RFID Environment

  • Bae, Ji-Hoon;Choi, Won-Kyu;Park, Chan-Won;Pyo, Cheol-Sig;Kim, Kyung-Tae
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.147-158
    • /
    • 2012
  • In this paper, we present a demodulation structure suitable for a reader baseband receiver in a passive radio frequency identification (RFID) environment. In a passive RFID configuration, an undesirable DC-offset phenomenon may appear in the baseband of the reader receiver, which can severely degrade the performance of the extraction of valid information from the received tag signal. To eliminate this DC-offset phenomenon, the primary feature of the proposed demodulation structures for the received FM0 and Miller subcarrier signals is to reconstruct the signal corrupted by the DC-offset phenomenon by creating peak signals from the corrupted signal. It is shown that the proposed method can successfully detect valid data, even when the received baseband signal is distorted by the DC-offset phenomenon.

Algorithm for the passive RFID Tag Forgery Problem (수동형 RFID 태그 위조 방지를 위한 알고리즘)

  • Sohn, Jong-Soo;Kong, Sin-Jo;Chung, In-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.423-429
    • /
    • 2007
  • 본 논문은 RFID 시스템 상의 RFID Tag의 보안 취약점을 보완하는 방법을 제시한 논문으로서 임의로 취득한 RFID 태그의 데이터를 불법적으로 위조하는 것을 회피하는 알고리즘을 제시한다. 현재까지 제안된 RFID Tag의 보안 문제 해결방법들은 일정정도의 계산능력을 가진 칩을 내장해야만 구현기 가능하기 때문에 작은 메모리 용량을 갖는 수동형 RFID Tag를 사용하는 현업에서는 해당 알고리즘을 적용하는 것이 불가능했다. 본 논문에서 제시하는 방법은 기존 RFID Tag 보안문제 해결방법에서 제시한 해싱 함수를 사용하지만 해싱함수를 Tag에 내장하지 않고 해싱 키를 내장함으로서 현실적용이 가능하도록 하였다. 본 논문에서 제시한 방법을 통해 FRID Tag의 내용을 임의로 바꾸는 것을 회피할 수 있다.

  • PDF

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.3
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.

Design of an Ultra-Compact UHF Passive RFID Tag Antenna for a Medical Sample Tube

  • Lee, Jung-Nam;Hwang, Moon-Young;Lee, Sang-Il;Lee, Kwang-Chun;Park, Jong-Kweon
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.974-977
    • /
    • 2012
  • In this letter, a small-sized ultra-high frequency (UHF) RFID tag antenna for a medical sample tube is proposed. The RFID tag antenna is designed and fabricated based on the circular loop antenna used in the UHF band (Korea standard, 917 MHz to 923.5 MHz). The tag antenna size is reduced using a circular meander stub. The antenna has a physical size of 8 mm, which is about ${\lambda}$/40 in electrical length. The proposed tag antenna is molded into a medical sample and multitag identification is performed.

RFID Smart Tag System (RFID 스마트 태그 시스템)

  • Eum, Sang-hee;Lee, Byung-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.232-234
    • /
    • 2018
  • In this study, We developed the non-contact RFID smart tag system. which are consists of passive RFID Tag and Reader. The system was designed for the low frequency of 13.56Mhz-band. The developed RFID smart tag board was developed to improve response time through simulation experiments were conducted. We introduced in the body of an RFID tag technology, circuit design and simulation and experimental results are described.

  • PDF

Techniques for Efficient Reading of Semi-Passive Sensor Tag Data (반수동형 센서 태그 데이터의 효율적인 읽기 기법)

  • Kim, Soo-Han;Ryu, Woo-Seok;Hong, Bong-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.34-41
    • /
    • 2009
  • This paper investigates the issue of efficient reading for sensor data of semi-passive sensor tag. The Cold Chain management system requires complete sensor data without data loss and the short processing time of reading sensor tag data. However, reading the sensed data could be interfered by RF environment such as a jamming, obstacle and so on. This study found that it could lead to loss of the sensed data and takes much time to read it when data loss is occurred. To solve this problem, we propose the transaction processing mechanism that guarantees efficient reading of the sensed data. To do this, we present the technique of dynamic packet size and technique of data recovery to execute read transaction. These techniques improve the reliability of reading operation as well as speed up of read process for the large capacity data. This paper contributes to the improvement of efficient reading of sensed data without any loss of data and large time required.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.

Passive RFID SensorTag

  • 윤현철;김재권;박주용;범진욱
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.3 s.55
    • /
    • pp.16-24
    • /
    • 2005

Gen2-Based Tag Anti-collision Algorithms Using Chebyshev's Inequality and Adjustable Frame Size

  • Fan, Xiao;Song, In-Chan;Chang, Kyung-Hi;Shin, Dong-Beom;Lee, Heyung-Sub;Pyo, Cheol-Sig;Chae, Jong-Suk
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.653-662
    • /
    • 2008
  • Arbitration of tag collision is a significant issue for fast tag identification in RFID systems. A good tag anti-collision algorithm can reduce collisions and increase the efficiency of tag identification. EPCglobal Generation-2 (Gen2) for passive RFID systems uses probabilistic slotted ALOHA with a Q algorithm, which is a kind of dynamic framed slotted ALOHA (DFSA), as the tag anti-collision algorithm. In this paper, we analyze the performance of the Q algorithm used in Gen2, and analyze the methods for estimating the number of slots and tags for DFSA. To increase the efficiency of tag identification, we propose new tag anti-collision algorithms, namely, Chebyshev's inequality, fixed adjustable framed Q, adaptive adjustable framed Q, and hybrid Q. The simulation results show that all the proposed algorithms outperform the conventional Q algorithm used in Gen2. Of all the proposed algorithms, AAFQ provides the best performance in terms of identification time and collision ratio and maximizes throughput and system efficiency. However, there is a tradeoff of complexity and performance between the CHI and AAFQ algorithms.

  • PDF