• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.025 seconds

A Study on the Application of RFID to Teaching-Learning in u-Learning Environment (u-러닝 환경에서 RFID의 교수-학습 적용에 관한 연구)

  • Baek, Jang-Hyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.185-194
    • /
    • 2007
  • With the advent of ubiquitous society, the paradigm of education is also changing. In u-learning in ubiquitous environment, mobile devices such as cellular phone, PDA, PMP, UMPC and TPC will become important learning tools. Particularly if RFID, a key technology in ubiquitous society, is utilized in teaching-learning along with mobile devices, we can expect much more meaningful learning. The present study proposed four types of application of RFID to teaching.learning, which were RFID-card, RFID-book, RFID-label and RFID-test, and examined their possibility and effectiveness. According to the results of this study, technology was insufficient to support the application of RFID-label to teaching-learning and continuous research was required for modeling the application of RFID to teaching-learning.

  • PDF

A Study on the Factors Affecting the Application of RFID System to the Library (RFID 시스템의 도서관 적용에 대한 영향 요인 연구)

  • Kim, Yeon-Rye;Lee, Chun-Woo;Choi, Sang-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.237-260
    • /
    • 2008
  • This study is designed to find out what kinds of factors influence the application of RFID system to the library. This study is followed by theoretically reviewing the RFID and the application RFID system to the library. Theoretical study models are developed by expanding the social influence, perceived risk, job relevance, support, and self-efficacy after Based on Technology Acceptance Model that provides useful theoretical foundations for setting the perceived usefulness, perceived ease of use, and intention of application to the library of RFID system as the core of a study model. The affecting factors of application of the RFID system to the library are presented by empirically studying this study model.

  • PDF

Design and Economic Evaluation on a POP Inventory Control System in SCM Using RFID (SCM 환경에서의 RFID를 이용한 생산시점 재고관리 시스템 설계 및 경제성 평가)

  • Cho, Jae Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.1-14
    • /
    • 2014
  • This paper presents the development of a stock control system of POP system design based on RFID in SCM and its economic efficiency. A stock control system is proposed for 900MHz passive type RFID system. The RFID system is composed of a RFID reader and four antennas to read the tag IDs. A cost estimation model is adapted based on the total product profit by various tag prices. The result of the economic efficiency analysis can indicate any invested model for the automation system which have initial investment should be used. This solution indicates the limit of the break even point according to the input. And it can be concluded that the stock control can be developed by RFID readers and passive tags with directional arrangement of several antennas. Also, the economical evaluation model can be a decision method for company to adapt the new developed system.

A Study on Economic Impacts Analysis of RFID System to Business (비즈니스별 RFID 시스템 도입사례 성과분석 연구)

  • Jeon, Seong-Hee;Na, Young-Sub;Kim, Yang-Hoon;Chang, Hang-Bae
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.15-26
    • /
    • 2011
  • RFID has substituted for a Bar Code to conduct real time data collection and data process in various fields including logistics, electronic, medical treatment, car, textile, steel industry at the business level. Although implementation and use of RFID has been facilitated constantly, the majority of businesses hesitate to implement RFID system. Hence in this study, we conducted a performance evaluation through quantitative/qualitative analysis on case studies in various industries. This study results could be utilized as basic data for RFID system diffusion, and it will primarily contribute to spread of RFID system implementation.

Security threats and alternative of Mobile RFID system (모바일 RFID 시스템에서의 보안 위협과 대안)

  • Jung, Yun-Seon;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.93-96
    • /
    • 2007
  • RFID 시스템은 무선통신기술을 사용하여 직접 접촉하지 않고 RFID 태그 정보를 식별하는 자동식별기술을 말한다. RFID 시스템의 장점 때문에 바코드 대체 기술로서 주목을 받고 있다. 최근에, RFID시스템은 모바일 단말기 안에 내장된 리더를 사용하여 사용자에게 유용한 정보를 제공하는 모바일 시스템으로 확대대고 있다. 모바일 RFID 시스템은 모바일 리더를 사용하여 물품의 정보를 얻는다. 그 다음 얻은 정보를 사용하여 무선이동통신 네트워크에서 사용자에게 다양한 부가 서비스를 제공한다. 모바일 RFID 시스템은 RFID 리더에 이동성을 결합했을 뿐만 아니라, 언제 어디에서나 실생활에 밀접한 물품에 대한 정보를 활용할 수 있다는 점에서 많은 주목을 받고 있다. 그러나 모바일 RFID 시스템은 정보누출, 추적성, 위조 등과 같은 RFID 시스템의 위협에 취약할 뿐만 아니라 모바일 리더의 이동성에 의해 사용자의 프라이버시가 쉽게 침해된다. 본 논문에서는 기존에 제안된 모바일 RFID 시스템에 관하여 살펴보고 모바일 RFID 시스템에서의 발생하는 추가적인 문제점을 지적한 후에 이에 대한 해결 방안을 제시한다.

  • PDF

Vulnerability analysis and Design of RFID Security Protocols (RFID 보안 프로토콜 취약성 분석 및 설계)

  • Oh, Jung-Hyun;Kim, Hyun-Suk;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.497-502
    • /
    • 2006
  • RFID기술은 RF를 이용하여 자동적으로 사물의 정보를 획득할 수 있는 매우 편리한 기술이다. 하지만 RF라는 매체를 사용하는 무선통신 환경에서 데이터를 주고받기 때문에 악의적인 공격자에 의해 사물의 의도적으로 노출이 될 수 있는 취약점을 지니고 있다. 이러한 RFID 시스템의 보안적 취약점을 보안하기 위해 RFID시스템에서 사용할 수 있는 강력한 보안 프로토콜의 요구가 높아졌다. RFID 시스템에서 사용될 보안 프로토콜을 설계하기 위해서는 비밀성, 익명성 등 반드시 고려해야할 요구사항이 있는데, 기존에 제안되었던 RFID 보안 프로토콜들은 이러한 요구사항들을 모두 완벽하게 만족시키지 못하였다. 본 논문에서는 RFID 시스템 프로토콜 모델을 제시하고, 정형기법을 사용하여 보안적 문제점들을 확인한 후, 문제점들을 보완하여 설계한 효율적인 RFID 보안 프로토콜을 제시하고자 한다. 또한 설계된 보안 프로토콜의 보안성을 정형기법을 통해 신뢰할 수 있는 검증을 실시하였다.

  • PDF

Study on RFID Mutual Authentication Protocol Using Finite Field (유한체를 사용한 RFID 상호인증 프로토콜 연구)

  • Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.31-37
    • /
    • 2007
  • There are many investigations about the security on RFID system to protect privacy. It is important to mutual authentication of the security on RFID system. The protocol for mutual authentication use light-weight operation such as XOR operation, hash function and re-encryption. However, the protocol for authentication and privacy is required more complicated cryptography system. In this paper, we propose a mutual authentication protocol using finite field GF($2^n$) for a authentication and are a safety analysis about various attacks.

  • PDF

Development of an Reader Framework for Transparency in RFID Reader (RFID 리더 투명성 지원을 위한 리더 프레임워크 개발)

  • Baek, Sun-Jae;Moon, Mi-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.404-412
    • /
    • 2011
  • More recently, variety RFID (Radio Frequency Identification) readers are produced by RFID equipment manufactures. Although a transmission standard instituted by EPCglobal is proposed for data transmission between the RFID readers and tags, other RFID reader protocols and the communication connection methods are be in use in other RFID companies. To replace or add the RFID readers of an RFID system, the developers should make changes to the core of the application and/or middleware. In this paper, we propose an RFID reader framework which can manage RFID readers without having to make changes the code of the application in environment with the growing number of heterogeneous RFID readers.This framework that sits on the layer between the RFID readers and the applications provides transparency to the RFID readers. Additionally, it can be used for monitoring the state and the property of all connected RFID, and for recording the RFID tag event logs and system logs. By using this framework, heterogeneous readers can be replaced and added without writing additional code in the applications. Consequently the readers can be easily managed and controlled by the RFID system administrator.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

A Study on the Reliability Improvement of RFID System (RFID System의 신뢰성 향상에 관한 연구)

  • Ham Jung-Gi;Kwon Oh-Heung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.542-545
    • /
    • 2006
  • In recent years, RFID is widely used in Industrial applications including factory, material flow, logistics and defense areas. In this paper, we developed a RFID baseband system with ASK modulation and convolutional channel code. A commercial ASK RF module is used and its frequency range in $350\sim351MHz$ and power is 10mW and the convolution code is constraint length k=3 and rate R=1/2. The performance is measured by frame error rate and the convolutional code is very useful in performance improvement and, also we implemented the binary search algorithm as anti-collision method and we show the wave shapes whit collision occurrence. This RFID system is designed by FPGA therefore it produces result of speed-up and improvement of reliability.

  • PDF