• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.026 seconds

Method of RFID Network System Application for Improving of Construction Productivity in Construction Site (건설생산성 향상을 위한 건설현장 내 RFID 네트워크 시스템 적용 방안)

  • Kim, Shin-Gu;Lee, Choong-Hee;Lee, Sung-Hyung;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1224-1231
    • /
    • 2010
  • We study the RFID network system in a construction site, and study the connection method between the RFID network system and the integrated information system of construction material. Moreover, we developed a prototype of the construction site RFID server for the management of construction materials and performed the pilot application in a construction site. Through the pilot application, it was known that the proposed RFID network system can be more usefully applied in the construction sites. The results of the pilot application show that the RFID network system is faster, more accurate, and more reliable than the existing system of information management and achieves improvement in construction productivity.

Design and Implementation of the Device Independent RFID Middleware Component for the Next Generation Port-Logistics (차세대 항만물류를 위한 장치 독립형 RFID 미들웨어 구성요소의 설계 및 구현)

  • Jang, Su-Wan;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.124-130
    • /
    • 2007
  • RFID technology is considered as a promising solution to increase efficiency of port logistics. Especially active RFID technology, such as e-Seal for container security, is receiving attention nowadays. If active RFID system is combined with passive RFID and legacy bar-code system overall efficiency of port logistics can be improved However, due to the device dependent control interface of RFID readers, there are many difficulties in making active-passive combined RFID system environment. In this paper, we introduce Smart Reader Interface (SRI) system, which provides a device independent RFID reader interrace to control different kinds of RFID readers by hiding device dependent control interface through adapter architecture which is similar to device driver of conventional operating systems. The key design objectives of SRI are the followings; conformance to the related standard. efficiency in processing, easy addition of an adapter for a new RFID reader. Actually, the implemented SRI system can support various kinds of commercial RFID readers, and through the test carried out not only in laboratory but also in the container terminal in the GwangYang Port, its practicality is verified.

A Study on the Relationship between Enterprise RFID Capability and Strategic Supply Chain Capability and Firm Performance: Focusing on Logistics, Distribution and Supply Chain Enterprises in China (기업의 RFID 역량과 전략적 공급사슬역량 및 기업성과 간 관계에 관한 연구: 중국 내 물류, 유통, 공급망 기업을 중심으로)

  • Shang Meng;Yong Ho Shin;Chul Woo Lee
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.87-110
    • /
    • 2018
  • This study reviews previous studies about the effects of RFID capabilities on strategic supply chain competence and business performance in the Chinese context. This study introduces a new perspective that measures the degree to which RFID capability levels contribute to business performance. Such an assumption is based on the fact that companies build their own capabilities through RFID capabilities and that these capabilities provide a competitive advantage for enterprises. Data on all sorts of logistics, distribution, and manufacturing companies that introduced RFID system in China were collected for data analysis. This study analyzes the structural equation modeling using Smart-PLS 2.0 program. This study confirms that internal reliability, convergent validity, and discriminant validity are satisfied. The hypothesis test result on the relationship between RFID capacity and strategic supply chain competence and strategic supply chain competence and company results is partially adopted. This study aids in establishing a RFID system construction strategy to enhance supply chain competence by suggesting guidelines for the successful introduction of RFID system through identifying the causal relationship between RFID capacity and strategic supply chain competence. This study also suggests the influence of RFID competency on visibility, agility, flexibility, and collaborations.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

An Enhanced Forward Security on JK-RFID Authentication Protocol (JK-RFID 인증 프로토콜에 대한 개선된 전방향 안전성)

  • Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.161-168
    • /
    • 2011
  • In 2009, Jeon et al proposed the lightweight strong authentication and strong privacy protocol, where the tag requrires only simple bitwise operations and random number generator. JK-RFID authentication protocol provides strong security: eavesdropping, replay, spoofing, Location tracking, DoS attack and forward security. Nevertheless, this paper points out the vulnerability of the forward security and improve the process of key updating. As a result, proposes an enhanced JK-RFID authentication protocol providing forward security and verify its satisfaction. In addition, a security and an efficiency of the proposed scheme analyze. Since partial adjustments of the key updating operation in JK-RFID authentication protocol, our protocol improve the forward security.

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

Efficient RFID Secure Protocol with Forward Secrecy (전 방향 안전성을 제공하는 효율적인 RFID 보안 프로토콜)

  • Kim, Seong-Yun;Kim, Ho-Won
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.139-147
    • /
    • 2011
  • We proposed the secure and efficient passive RFID protocol which is based on one-way hash based low-cost authentication protocol (OHLCAP). The paper introduces OHLCAP and the vulnerabilities of OHLCAP and suggests security solutions by analyzing them. Afterwards, The paper presents the proposed protocol and demonstrates computational performance and security of the protocol. This protocol not only has the resistances against eavesdropping attack, impersonation attack, desynchronization attack, and replay attack but also provides untraceability and forward secrecy.

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

RFID시스템환경에서의 안전성평가 필요성

  • Park, Ji-Yeong;Lee, Jong-Tae;Jo, Am
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2008.11a
    • /
    • pp.259-265
    • /
    • 2008
  • 최근 전자태그(RFID : Radio Frequency Identification)를 부착하여 비접촉식으로 다 양한 물품의 정보를 받아 물품의 추적 및 정보확인이 가능한 RFID 시스템을 작업현장에 도입/확산시키고자하는 연구들이 진행되어지고 있다. RFID 시스템은 무선인터페이스 환경에서 태그는 안테나에 정보를 담은 주파수를 보내고 있으며, 이 환경에서의 작업자는 주파수에 노출되어있다. 따라서 작업자 주파수에 노출되는 RFID 시스템 환경 에서 주파수가 작업자에게 미치는 영향에 대한 안전성평가가 필요하다.

  • PDF

A RFID Authentication Protocol with a Strong Forward Security (전방위 안전성이 향상된 RFID 인증 프로토콜 제안)

  • Kim Hun-Wook;Jo Jong-Kuen;Lee Jang-Chun;Lee Ern-Yu;Lim Shu-Yun;Lee Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.897-900
    • /
    • 2006
  • RFID(Radio Frequency Identification) 기술의 발전은 편의성과 경제성으로 전 세계에 확산되어 사용되고 있다. 비록 세계적인 보안 표준안이 정해 지지 않았지만 RFID 보안 분야는 각 나라에 맞게 표준을 선정하여 적용되고 있다. 한편, RFID 기술의 발전으로 RFID의 칩이 소형화되고, 장거리 통신이 가능해짐에 따라 RFID 시스템에 내장된 정보를 다른 누군가가 활용하여 개인 또는 기업 등의 프라이버시를 불법으로 수집하는 피해가 발생할 수 있다. 본 논문은 RFID 시스템에서 정보의 누출을 막기 위해 해쉬 알고리즘과 초경량 스트림 암호알고리즘을 사용하여 전방위 안전성이 향상된 RFID시스템을 제안, 분석하였다.

  • PDF