• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.031 seconds

Design & Implementation of Drug Management System based on RFID (RFID기반의 특수의약품 추적관리 시스템 설계 및 구현)

  • Lee, Bong-Keun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.977-984
    • /
    • 2006
  • This paper is intended to trace and management of drug based on RFID Technology at a circulation market, from manufacturer to end user, of drug. To avoid counterfeit and generic drug and establish of order in the circulation of drug, at the moment of manufacturing, tags for each bottle and each box are tagged. and then from factory to hospital, through whole logistics, e-pedigree for the drug is made and monitored. Using inventory information, it is easy to manage and control stock of drug. In addition to, RFID System enables storing and delivery to be simple, process time to be shortened. As this research is to study of applying RFID to drug, in this paper, standard RFID code for drug is suggested and tried to apply domestic middle win. Finally, the result of tag pattern design and how to tag for the drug based on 90Mhz is proposed

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

터미널 게이트의 유비쿼터스 연계효과에 대한 연구

  • Kim, Hyeon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.309-310
    • /
    • 2007
  • 컨테이너터미널의 Gate는 컨테이너의 출입구를 의미하는 것 외에 컨테이너 정보의 최초 입력점이라는 중요한 의미를 가지고 있다. 따라서 컨테이너 정보의 정확한 습득을 위해 다양한 컨테이너 변호 인식방법이 사용되고 있으며, 이러한 적용방법에 따라 Gate의 생산성에도 많은 차이가 발생하고 있다. 최근, 정부의 u-IT사업추진에 따라 적용되기 시작한 RFID를 이용한 Gate자동화 방식은 기존시스템에 대한 새로운 접근을 요구하게 되었다. RFID를 이용함에 따라 각 시스템의 단점을 보완하는 정성적 이점과 더불어 정량적 생산성 향상이라는 기대치도 높아지게 되었다. 따라서 본 연구에서는 RFID를 이용한 Gate 자동화 시스템과 기존의 Gate시스템과의 생산성 차이를 시뮬레이션을 통해 검증함으로써 RFID 방식의 Gate를 고려하고 있는 컨테이너터미널에 관련된 정보를 제공하고자 하였다.

  • PDF

차세대 RFID/USN 기술 발전 전망

  • Pyo, Cheol-Sik;Chae, Jong-Seok
    • Information and Communications Magazine
    • /
    • v.24 no.8
    • /
    • pp.7-13
    • /
    • 2007
  • 유비쿼터스 사회 실현의 핵심 기술인 RFID/USN 기술은 우리 정부의 USN구축 기본계획과u-IT839기술개발 정책에 따라 국산화, 기술 고도화 및 핵심 원천기술 개발을 전략적으로 추진하여 그 성과가 나타나고 있다. RFID/USN 기술은 가장 기본적인 사물의 식별 단계로부터, 이력 추적, 상태정보의 모니터링, 실시간 감시 및 제어, 자율형 서비스로 진화함에 따라 전통적인 RFID 및 무선센서네트워크에서 출발하여 궁극적으로 다양한 응용서비스를 지원하는 USN기술로 발전될 것이다. 향후 RFID 기술 분야는 상태정보처리 및 위치 추적 등 복합 기능과 성능 고도화로 발전되고 Item단위까지 적용하기 위한 새로운 리더, 초저가의 Printed 태그 및 불법 복제 방지 등의 새로운 기술이 개발될 전망이다. 센서네트워크 분야에서는 기존의 IEEE802.15.4와 ZigBee를 뛰어넘어 저전력, 고신뢰성, 확장성, 이동성 등을 지원하기 위해 효율적인 무선전송, 초경량의 노드, 네트워킹, Cross-layer최적화, 데이터 융합 등의 핵심기술 이 요구되고 USN 미들웨어 기술은 다양한 USN응용 서비스를 위해 공통 S/W 플랫폼을 제공하고 다양한 센서네트워크로부터 수집한 정보를 가공하여 서비스간 연계 통합하는 플랫폼으로 발전될 전망이다.

RFID Authentication Protocol of Improved Secure Weakness in Hash-chain Based Scheme (해시 체인 보안 취약성을 개선한 RFID 인증 프로토콜)

  • Seungbin Kim;Taek Lee;Myoungrak Lee;Hoh In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1024-1027
    • /
    • 2008
  • RFID는 자동 객체 식별 기술로써 유비쿼터스 환경과의 연결을 통해서 적용 범위가 더욱 확대되고 있다. 그러나 RFID 시스템은 전파를 이용하는 통신 구조와 낮은 태그 가격 제약으로 인해서 사용자의 프라이버시 문제와 악의적인 공격노출 등의 위험이 발생하고 있다. 이런 문제점들을 해결하기 위해 물리적인 방법과 암호학적인 접근 방법 등 많은 방법들이 제안되었다. 그 중에서 해시 체인 기법은 다른 방법과 비교하여 강력한 보안 수준을 제공하면서도 간단한 인증 과정이 장점이다. 그러나 재전송 공격과 스푸핑 공격에 취약한 문제점을 가지고 있다. 따라서 본 논문은 기존 해시 체인의 장점을 유지하면서 보안 취약성을 개선한 RFID 인증 프로토콜을 제안한다. 계산 효율성을 고려하여 최소한의 난수와 비트 연산(XOR)을 이용하여 보안 취약성을 개선한다.

Development of RFID for Automatic Radiopharmaceuticals Preparation System (방사성 의약품 자동합성 장치용 RFID 시스템의 개발)

  • Kim, Myung-Sik;Kim, Kwang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.429-436
    • /
    • 2012
  • In this paper, an RFID system for the automatic preparation system of positron emission tomography (PET) radiopharmaceuticals is developed. Since the preparation system uses radioactive isotope, the preparation system is generally placed in lead-shielded hot-cell. Disposable cassettes including tubes and valves are used in the preparation system, since they are easily contaminated by radioactivity during preparation of radiopharmaceuticals. Currently, a system for preventing re-use of the cassette and managing the information about the preparation precess and result independently from the PC which control the preparation system is highly required for preventing danger from the radiation accident. Since RFID can store and re-write relatively large amount of information, it is suitable for the purpose. However, it is hard to read multiple cassettes' information using antennas installed on the metallic surfaces with current RFID systems. For the problem, we improve RFID system in two directions. First, the interface of the RFID reader is changed then it is possible that multiple readers can be daisy-chained. Also, antenna is tuned while inserting in a metallic coated antenna case, then the effect from the metallic surface of the preparation system is minimized. The test result using the developed system shows that the developed RFID system can read multiple tags using the antennas which are attached on the metallic surface.

Improved An RFID Mutual Authentication Protocol Based on Hash Function (개선된 해시기반의 RFID 상호인증 프로토콜)

  • Shin, Ju-Seok;Oh, Se-Jin;Jeong, Cheol-Ho;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.241-250
    • /
    • 2012
  • In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.

A New RFID Tag Anti-Collision Algorithm Using Collision-Bit Positioning (충돌 비트 위치를 활용한 RFID 다중 태그 인식 알고리즘)

  • Lee Hyun-Ji;Kim Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.431-439
    • /
    • 2006
  • RFID Anti-Collision technique is needed to avoid collision problem caused by Radio interference between tags in the same RFID Reader area. It affects the performance and reliability of the RFID System. This paper propose the QT-CBP(Query Tree with Collision-Bit Positioning) Algorithm based on the QT(Query Tree) algorithm. QT-CBP Algorithm use precise collision bit position to improve the performance. We demonstrated the proposed algorithm by simulation. Our algorithm outperformed when each tag bit streams are the more duplicate and the number of tags is increased, compared with QT.

The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader (안전한 모바일 RFID 리더를 위한 개방형 임베디드 소프트웨어 플랫폼 구현 방안)

  • Park, Nam-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.785-793
    • /
    • 2010
  • The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The technology for information and privacy protection should be developed in terms of general interconnection among elements and their characteristics of mobile RFID in order to such technology that meets the RFID circumstances. In this paper, transplanting and extending security library for protecting mobile RFID information in secure mobile RFID terminal S/W platform system to support security application on the path of all data from RFID reader to application server.