• Title/Summary/Keyword: RFID 성과

Search Result 1,053, Processing Time 0.029 seconds

전시공간에서 모바일 RFID를 활용한 시나리오와 비즈니스 모델 제안

  • Lee, Gyeong-Jeon;Jeon, Jeong-Ho
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.423-428
    • /
    • 2007
  • 본 연구는 미술관이나 박물관과 같은 전시공간에서 모바일 RFID를 활용한 비즈니스 모델을 설계한다. 기존의 전시공간에서 관람객이 겪을 수 밖에 없었던 정보 취득 및 정보 저장의 제약성 등과 같은 한계점이 모바일 RFID를 통한 'Seamlessness'(연결완전성)에 의해 극복될 것으로 판단하고, 이를 바탕으로 전시공간에서 모바일 RFID를 활용하여 수행될 수 있는 비즈니스 모델 시나리오를 제시한다. 또한 본 비즈니스 모델 수행 시(時), 발생할 수 있는 이슈에 대하여 검토하고 그에 대한 대안을 제시하며, 수익 시뮬레이션을 통한 전시공간 사업자의 Working Condition에 대하여 검토한다.

  • PDF

Security of RFID in Public Key Cryptosystem (공개키 암호시스템에서 RFID 보안)

  • Seon, Dong-Kyu
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.205-208
    • /
    • 2009
  • 이 논문에서는 RFID(Radio Frequency IDentification)에 대한 여러 가지 보안위협에 대하여 간단히 알아보고 그에 대응하는 안전한 암호학적 도구(Primitive)에 대하여 알아보겠다. 공개키 암호시스템(PKC, Public Key Cryptosystem)에 사용되는 타원곡선(EC, Elliptic Curve) 암호, NTRU(N-th degree TRUncated polynomial ring) 암호, Rabin 암호 등은 초경량 하드웨어 구현에 적합한 차세대 암호시스템으로서 안전한 RFID 인증서비스 제공과 프라이버시보호를 가능케 한다. 특히, 본고에서는 초경량 키의 길이, 저전력 소모성, 고속구현 속도를 갖는 타원곡선암호의 안전성에 대한 가이드라인을 제공하겠다.

  • PDF

Design of Embedded Based Distributed RFID Gateway Using Open Source Hardware (오픈 소스 하드웨어를 이용한 임베디드 기반의 분산형 RFID 게이트웨이의 설계)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.581-586
    • /
    • 2015
  • In this paper, we configure a Radio Frequency IDentification (RFID) gateway using an arduino and raspberry pi which are recent issues with a representative open source hardware. RFID technology is emerging as a key technology in a variety of environments as a technique to automatically identify objects using a radio frequency signal. In this paper, we propose a distributed RFID gateway for providing various communication methods and processing a large amount of RFID tag information efficiently, and to increase the scalability and middleware communication efficiency of the RFID reader. Existing RFID middleware systems have the problems that they should adhere the web service for interworking with a reader and the communication standard. Therefore, in this paper, we comprise our RFID gate to satisfy not only the serial communication configuration but also various digital signal processing standard so that it increases the communication efficiency of the middleware system.

An RFID Tag Anti-Collision Protocol for Port Logistics Systems (항만 물류 시스템을 위한 RFID 태그 충돌 방지 프로토콜)

  • Lee, Seong Ro;Lee, Yeonwoo;Joo, Yang-Ick
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.202-207
    • /
    • 2013
  • RFID technology is applied to port logistics applications since it monitors objects wirelessly without line of sight and constructs ubiquitous system with low cost. Changes of stock status in the warehouse environment make the technology more important for managing such frequent storing and un-storing. Although the RFID has beneficial characteristics of low cost and low complexity, simultaneous responses of RFID tags cause tag identification collision due to absence of elaborate medium access control scheme. Several algorithms have been proposed to overcome the tag collision problem. However, it is difficult to adopt the methods to the logistics systems that has varying loads since there was no consideration on RFID tag's mobility. Therefore, we propose an efficient RFID tag anti-collision protocol, and simulation results demonstrate performance improvement by using the proposed scheme.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

RFID Mutual Authentication Protocol Against Reflection Attack (반사공격에 안전한 RFID 인증 프로토콜)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.348-354
    • /
    • 2007
  • RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems while the technology offers incredible rich opportunities for applications in the filed of logistics, distribution, and medical services, etc. Many researches have been conducted in order to solve this problem, but the current RFID authentication protocols are still insufficient for settling the privacy problem in the point of view of privacy intrusion and system efficiency. The purpose of this paper is to present a RFID mutual authentication protocol which improves safety level, compared with current authentication protocols. The proposed authentication protocol can provide mutual authentication services, and is secure against location tracing, spoofing, reflection attack.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

Bar-Code Shape UHF RFID Tag Antenna (바코드 모양의 UHF RFID 태그 안테나 설계)

  • Jeon, Byung-Don;Chung, You-Chung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.131-134
    • /
    • 2012
  • A bar-code shape UHF RFID tag antenna is designed and fabricated with silver conductive ink. It can be recognize by both bar-code scanner and RFID reader. The bar-code shape is taken from a general box of a product, and the product code of the bar-code is used for the antenna design. The tag antenna is fabricated with silver conductive ink using a T-matching structure. The designed tag antenna is satisfied with bar-code system and RFID system simultaneously. The input reflection coefficient characteristics and the reading range pattern are measured. The peak reading range is about 111 cm, which is long enough.

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.