• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.024 seconds

A Study on Prevention of Collision and Data Loss of the RFID System Using a Full-Length Instruction Code Method (무선인식 시스템의 완전 명령 코드 기법을 이용한 데이터 충돌 및 손실 방지에 관한 연구)

  • 강민수;신석균;이재호;박면규;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.756-765
    • /
    • 2004
  • Using single carrier frequency RFID system in one-to-multiple wireless communications, might be generated data loss because of data collisions. Conventional Anti-collision method prevent data loss from data collisions which are binary tree method and ALOHA. However, those two preventive measures also have week points which are strongly dependent on the time and space when passing through the recognition area. This paper suggests the full-length instruction code method which fits in to half-duplex method, prevents data collision effectively by calculating the non-transmitting time of multiple tags considering approaching time to the recognition area. After full-length instruction code method test using 13.56MHz bandwidth RFID system shows that full-length instruction code method could make better result than any other methods. Moreover, the record shows O(n) result after analyzing O-notation of conventional time-domain procedure.

Design and Analysis of Social Network Service Model Using a Ubiquitous Business Card (RFID가 내재된 비즈니스 카드를 활용한 유비쿼터스 사회 연결망 서비스 모델 설계 및 분석)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.75-95
    • /
    • 2009
  • The aim of this research is to design and analyze a social network service model using mobile RFID based business card. This paper suggests how the behavior of exchanging business cards will be changed in ubiquitous environment and designs a social networking service model using a ubiquitous business card, which embeds a RFID tag. We describe the scenarios and analyze a role, value and potential benefits of participants of the u-SNS service model. For the proof of the superiority and the feasibility of our model, we compare it with its related researches and products based on the calculation of the benefits and costs of the alternatives.

  • PDF

Development of Integrated Service System based RFID for train passenger (RFID 기반의 열차 승객용 통합 서비스 시스템 구현)

  • Kim, Hae-sung;Seo, Ji-hwan;Lee, Su-won;Shim, Dong-eun;Kim, Bum-jun;Lee, Jae-Hyun;Shin, Dong-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.347-350
    • /
    • 2009
  • The opening of High-speed Rail provides convenience to move a long distance quickly, and the passengers of high-speed railway have been steadily increasing each year. Since the high-speed rail is far more expensive than other transportation, providing high quality service over just the high speed is required. Accordingly, much effort is made to improve service quality. However these services have been focused on general passengers so we should introduce a new service system to meet personal preferences of passengers. Therefore, in this paper, we introduce integrated railway service systems to provide service which follows the individual needs of passengers and is based on RFIDs (Radio Frequency Identification).

  • PDF

Practical and Secure Yoking-Proof Protocol for RFID (실용적이고 안전한 RFID 요킹증명 프로토콜)

  • Ham, Hyoung-Min;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.83-94
    • /
    • 2011
  • Yoking proof is a concept proposed by A. Juels in 2004. It proves that a pair of tags are scanned simultaneously by one reader. After the first yoking proof protocol is proposed by A. Juels, replay attack vulnerabilities of yoking proof are considered and many other yoking proof schemes are proposed to improve it. However, compared with the first yoking proof scheme which emphasizes protocol efficiency due to the limited performance of tags, other yoking proof protocols need more computing power and storage of the tags. We propose two security protocols that consider both the general condition and limited performance of tags. The proposed scheme can protect the tags from replay attack and Brute-force attack as well. Moreover, many pairs of tags or several tag groups can be proved at the same time by executing the protocol only once.

Efficient heuristic of vehicle routing problem for container shuttle service (컨테이너 터미널 반출입 프로세스 운영효율 향상에 관한 연구)

  • Kim, Jung-Woo;Shin, Jae-Young;Chung, Chang-Yun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.131-132
    • /
    • 2009
  • The container terminal can be divided into berth-side, yard area and gate. Until now, many studies related to the improvement of the terminal operation efficiency have been focused on berth and yard productivity. With regard to gate operation, existing studies were examined from hardware perspectives such as non-stop system using RFID(Radio Frequency Identification) or OCR(Optical Character Reader). Relatively little research has been curried out on the improvement of the gate in/out process. In this regard, this paper proposes the method to improve the terminal operation efficiency.

  • PDF

Design and Implementation of Low-power CSD Considering Beacon Period and Channel Scan Time (비컨 주기와 채널 탐색기간을 고려한 저전력 CSD의 설계 및 구현)

  • Kim, Taek-Hyun;Park, Se-Young;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.50-54
    • /
    • 2010
  • A Container Security Device (CSD) which is different existing RFID Tag strengthens the physical security as mounted inside the container and the information security as encrypts doubly a data. CSD must use the resources efficiently in order to operate with the battery. Therefore, it needs low-power mechanism which repeats the sleep period and channel scan period. However, by adjusting these periods, the trade-off occurs between energy efficiency and network connectivity. In this paper, we implement low-power CSD and resolve this problem by adjusting beacon period and channel scan time. As a result, We guarantee the network connectivity 95% or more and maximum life up to 16 days using common AA batteries.

A Case Study on the RFID-based Ubiquitous Port for IMO Member states to provide an efficient maritime logistics and strengthen security in port (IMO 회원국을 대상으로 한 효율적인 해운 물류 및 보안 강화를 위한 RFID 기반 Ubiquitous Port 적용 사례 연구)

  • Park, Soo-Min;Kim, Min-Sik;Ahn, Kyeong-Rim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1607-1610
    • /
    • 2012
  • 국제 무역의 활성화와, 운송수단의 기술적 발전은 국가 간 교역을 증대시키게 되었다. 특히 해상 무역 물동량의 증가는 국제항을 다양한 재화 및 여객 소통의 중심으로 만들었고, 경제적 관문으로써의 중요성이 높아지고 있으며 점차 국가 주요 기반 시설로 자리 잡고 있다. 즉, 원활한 교역을 위한 물류 효율화 달성과 안전한 항만 운영을 위한 보안 제도 강화의 필요성이 증대됨에 따라, 이를 효과적으로 관리 유지할 필요가 있게 되었다. 이에 본 논문은 자동화 고부가가치 서비스가 가능한 정보 중심의 u-Port(Ubiquitous Port)를 국가 전략적 차원에서 육성한 대한민국 사례를 기반으로 효율적인 항만물류를 위한 기반 시스템으로 활용될 수 있도록 해운물류표준화 기구인 IMO(International Maritime Organization)에 선진 사례로 소개하고 활용할 수 있는 방안을 제시하고자 한다. u-Port는 수출입 화물 관리가 용이하며 항만 보안을 강화하는 등 항만 업무 효율화를 제공할 수 있다는 장점으로 향후 개발도상국 또는 후진국의 항만 업무 생산성 및 투명성을 높일 수 있는 기반을 지원할 수 있을 것이다.

Introduction of Total Management System for Oceanographic Instruments Using RFID(Radio Frequency IDentification) (전자태그를 이용한 해양 연구 기기 및 장비 통합 관리시스템)

  • Lee, Jung-Han;Hwang, Keun-Choon;Kim, Eun-Soo
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.3
    • /
    • pp.192-204
    • /
    • 2011
  • With the international increasing of the important of oceanic researches related to climate changes, resources conservation and development and the advanced application of oceanic researches, advanced countries in ocean have developed the systematic management systems for oceanographic instruments. Despite the increasing realization of need for the establishment of management system, no systematic management system has been built in KOREA. There is an ungently need to construct the efficient and professional maintenance and management system of oceanographic instruments that are extremely expensive for meeting the increasing demands of oceanographic observation and investigation. In this paper, the present possession of oceanographic instruments in KOREA and the need for the establishment of management systems for oceanographic instruments are discussed. In addition, we introduce the total management system for oceanographic instruments using a RFID(Radio Frequency IDentification) at KORDI and discuss the necessity of the introduction and establishment for producing high quality data in oceanic researches.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System (EPCglobal Gen-2 RFID 시스템 태그와 리더간의 무선 전송 방식 성능 분석)

  • Yoon, Hee-Seok;Mohaisen, Manar;Chang, Kyung-Hi;Bae, Ji-Hoon;Choi, Gil-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.9
    • /
    • pp.1047-1056
    • /
    • 2007
  • In this paper, we analyze the performance of the encoding and the modulation processes in the downlink and uplink of the EPCglobal Gen-2 system through the analysis and simulation. Furthermore, the synchronization issues on time and frequency domain and the preamble architecture are evaluated. By incorporating the encoding and the modulation technigue in the downlink and uplink, we assess the performance of the EPCglobal Gen-2 system. We also introduce the encoding and backscatter modulation process as well as the BER performance of FM0 code. In addition, the importance and the role of the frequency and time synchronization, such as the preamble and frame synchronization are explained. Through the simulation in the uplink on the detection probability through preamble, we find that the detection probability approaches 1 for 13 dB $E_b/N_0$.