• Title/Summary/Keyword: RF Identification(RFID)

Search Result 64, Processing Time 0.027 seconds

Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification (RFID의 프로토콜 및 인터페이스 파라미터)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

RF-Kanban System : Inventory-Replenishment System with RF-Kanban (RF간반시스템 : RF간반을 통한 재고보충시스템)

  • Paik, Si-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • Inventory Management has become a very important issue in supply chain management, because inventories may be used as a means to accomplish the certain strategic goals in company decisions. RFID(radio frequency identification) technology is used to help manage inventories. It is known that the ideal control of inventories is to replenish item by item. This paper points out several misinterpretations from the Wal-mart report presented in '07 Seoul Forum and suggests the new direction of RFID application. In this paper we consider RFID as not 'identification technology' but 'information technology.' The 'RF-Kanban' suggested here is adopted from the'Kanban'concept of TPS(Toyota Production System). The RF-Kanban system shows the easier control for replenishing various items in boxes. Lots of inventories can be reduced through RF-Kanban System. This work develops the protocol of RF-Kanban and introduces the case study for easier understanding.

Implementation of RFID Data Transmission System using Wireless LAN (Wireless LAN 기반 RFID 데이터 전송시스템 구현)

  • 백수열;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.41-44
    • /
    • 2004
  • A RFID(Radio Frequency IDentification) system Is a kind of Radio Frequency Communication System and a branch of Automatic Data Collection System. The RFID System is composed of RF Tag(or Transponder) and RFID Reader(controller). This paper deal with Wireless communications that acquired RF Tag ID by RFID reader, and then target system will transmit Tag ID to RFID Server through the internet using Wireless LAN. The RFID system of Todays are commonly used by a wired RFID system. In this system uses commonly used Wireless LAN, and then we can connect the internet if we have a AP(Wireless Lan Access Point). Internet connection can make a transmission of RF Tag ID, and can make a reception of returning data that are images or information.

  • PDF

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.

An Efficient Tag Identification Algorithm Using Improved Time Slot Method (개선된 타임 슬롯 방법을 이용한 효과적인 태그 인식 알고리즘)

  • Kim, Tae-Hee;Kim, Sun-Kyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.1-9
    • /
    • 2010
  • In recent year, the cores of ubiquitous environment are sensor networks and RFID systems. RFID system transmits the electronic information of the tag to the reader by using RF signal. Collision happens in RFID system when there are many matched tags, and it degrades the tag identification performance. Such a system needs algorithm which is able to arbitrate tag collision. This paper suggests a hybrid method which reduces collision between the tags, and can quickly identify the tag. The proposed method operates based on certainty, which takes an advantage of tree based algorithm, and to reduce collision it selects transmission time slot by using tag ID. The simulation results show the suggested method has higher performance in the number of queries and collision compared to other tree based and hybrid algorithms.

Design of an active RFID system for collision avoidance at MAC (충돌방지 매체접속 제어방식이 가능한 Active RFID 시스템 설계)

  • Jung, Sung-Jae;Ahn, Jun-Sick;Kim, Il-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.181-183
    • /
    • 2007
  • 본 논문은 RF 리더기와 RF 태그 상호간의 통신시에 발생할 수 있는 충돌을 감지하고 이를 능동적으로 회피할수 있는 RFID(Radio Frequency IDentification)의 설계에 관한 내용이다. RFID는 사람, 자동차, 화물, 상품 등에 정보를 부가하는 시스템으로 그 부가정보를 무선통신매체를 이용하여 비접족으로 해독하는 시스템으로 기존의 바코드보다 데이터의 전송속도와 용량의 증가 그리고 편리성이 향상되는 장점이 있으나, 동시에 여러개의 RF태그와의 무선통신으로 인한 데이터의 충돌이 발생할 수 있다. 이러한 충돌을 감지하고 이를 적절하게 회피하는 것은 RFID 시스템의 신뢰성을 높이는데 필수적인 요소이다. RFID 태그로 사용되기 위해서는 건전지로 구동될 수 있도록 저전력소모가 요구되며 또한 통신의 시작과 충돌을 파악할 수 있는 캐리어 감지기능이 필수적이다. 본 논문에서는 이러한 조건들을 만족하는 Chipcon 사(社)의 양방향 RF IC를 사용하였다. Chipcon 사(社)의 양방향 RF IC는 다중 주파수 대역의 선택과 변조방식을 시리얼통신을 통해서 손쉽게 변경할 수 있기 때문에 충돌감지시 다양한 회피알고리즘을 상황에 맞게 구현할 수 있다. 본 논문에서는 양방향 RF IC를 사용하여 충돌을 감지하고 회피할 수 있는 RFID시스템을 설계하고 구현하였다.

  • PDF

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

Record Processing System using the Attendance Information of RFID (RFID 출결 정보를 이용한 성적 처리 시스템)

  • Baek, Mi-Hye;Kim, Bong-Gi;Choo, Yeon-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.549-552
    • /
    • 2011
  • RFID technology is one of the verification technology that use radio frequency. Use and study of RFID are on the increase because RFID is a one of main technologies in ubiquitous. In this paper, we address to develop a Record Processing System using RFID. The purpose of this paper is improvement of accuracy and efficiency on Record Processing System by applying RFID. Later, This paper will be able to help to establish of u-Campus.

  • PDF

Measurements of Dark Area in Sensing RFID Transponders

  • Kang, J.H.;Kim, J.Y.
    • Journal of Sensor Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.103-108
    • /
    • 2012
  • Radiofrequency(RF) signal is a key medium to the most of the present wireless communication devices including RF identification devices(RFID) and smart sensors. However, the most critical barrier to overcome in RFID application is in the failure rate in detection. The most notable improvement in the detection was from the introduction of EPC Class1 Gen2 protocol, but the fundamental problems in the physical properties of the RF signal drew less attention. In this work, we focused on the physical properties of the RF signal in order to understand the failure rate by noting the existence of the ground planes and noise sources in the real environment. By using the mathematical computation software, Maple, we simulated the distribution of the electromagnetic field from a dipole antenna when ground planes exist. Calculations showed that the dark area can be formed by interference. We also constructed a test system to measure the failure rate in the detection of a RFID transponder. The test system was composed of a fixed RFID reader and an EPC Class1 Gen2 transponder which was attached to a scanner to sweep in the x-y plane. Labview software was used to control the x-y scanner and to acquire data. Tests in the laboratory environment showed that the dark area can be as much as 43 %. One who wants to use RFID and smart sensors should carefully consider the extent of the dark area.