• Title/Summary/Keyword: RFID Performance

Search Result 520, Processing Time 0.024 seconds

Anti-collision Algorithm with Early Cancellation of Query Round in RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.292-296
    • /
    • 2009
  • The performance of anti-collision algorithm in RFID systems, which are based on FSA algorithm, may be affected by the frame size a query round. In this paper, an anti-collision algorithm with early cancellation of query round is proposed to enhance the performance of EPCglobal Class-1 Gen-2. The Q-algorithm calculates a Q value to determine the next frame size during a query round. In the proposed algorithm, if the new Q value is different from the previous one, the reader transmits a QueryAdjust command to cancel the current query round. The simulation results show that the proposed algorithm can have a stable performance irrespective of the C value of Q-algorithm and the number of tags.

An Adaptive I/Q Diversity Combining Method for UHF RFID Reader Systems (UHF 대역 RFID 리더 시스템을 위한 적응형 I/Q 다이버시티 결합 알고리즘)

  • Yoon, Chang-Seok;Nam, Sung-Sik;Cho, Sung-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.176-182
    • /
    • 2010
  • In this paper, we propose an adaptive I/Q diversity combining scheme which reduces unnecessary computations while maintaining the required performance level. The system with the proposed scheme adaptively applies a proper combining scheme among the conventional selective scheme and combining scheme based on the comparison result between the estimated instantaneous SNR and the pre-determined threshold. As a result, the system with our proposed scheme can reduce the computational load while maintaining the required performance level. Some selected simulation results show that the system with the proposed scheme can decrease the unnecessary computations compared with the system with the conventional schemes while maintaining the required performance level.

A Specialized Reader for High Speed UHF RFID Tag Inlay Inspection Equipment (고속 UHF RFID 태그 검사 장비를 위한 전용 리더)

  • Bae, Sung Woo;Park, Jun-Seok;Seong, Yeong Rak;Oh, Ha-Ryoung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.1
    • /
    • pp.63-69
    • /
    • 2014
  • RFIDs have not become widespread as expected partly due to the cost, size, read range, and reliability problems of tags. The success rate of reading must be improved in order for RFIDs to be widely adopted. Quality control of tags is crucial to meet this requirement. In this study, we designed and implemented a high-performance reader used in inspection equipment that conducts prior inspection of tags. To improve performance of the developed reader, the baseband modem and command processor (CP) were designed using H/W logic and implemented with FPGA. The inspection of small pitch inlays was made possible through the antenna shielding device and H/W command processor function. This equipment enables accurate evaluation of performance and identification of tags satisfying a given read range. By contributing to sort out defective tags, the results can ultimately lead to more stable RFID services.

An Implementation of a Virtual RFID Emulator System using a Commercial CAD tool (상용 CAD 툴을 이용한 RFID 에뮬레이터 시스템 구현)

  • Lim, Hyung-Mu;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1049-1054
    • /
    • 2005
  • With the growth of RFID market in logistics industry, such as post office, airline, shipping etc., development of RFID readers and tags becomes crucial. Especially, $860{\sim}960MHz$ RFID is worth noticing because of its long identification range and low production cost. Therefore, performance tests and verification of reader and/or tag under development are very important. In this paper, a RFID emulator system is designed and implemented using a commercial CAD tool, a signal generator and a data acquisition device. With the RFID emulator system, many parameters such as spectrum masks, transmit power levels, data waveform and other RF characteristics can be analyzed. Furthermore it can be applied to the verification of real RFID Readers or Tags.

  • PDF

An analysis of effectiveness and safety about matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석)

  • Shin, Hyo-Young;Hwang, Chi-Gon;Jung, Kye-Dong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.249-255
    • /
    • 2014
  • RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.

A Study on the Potential and Requirements in Shipping Companies with RFID Technology

  • Lee Seok-Yong;Kim Yu-Ill;Seo Chang-Gab;Park Nam-Kyu
    • Journal of Navigation and Port Research
    • /
    • v.30 no.2
    • /
    • pp.151-159
    • /
    • 2006
  • This study intends to surveyrequirements for port and logistics supply chain management with RFID {Radio Frequency IDentification)technology. Port and logistics supply chain management has become a critical issue due to the necessity of efficiency, visibility, trace-ability, etc. Since the introduction of RFID technology, its performance, reliability, validity, and safety have been a concern in most industries. Particularly, in port and logistics supply chain management, RFID has the potential to track the movement of containers and to provide in-transit visibility toward customers. In thispaper we consider some critical issues related to port and logistics supply chain management, which previously adopted RFID technology. In order to successfully design and adopt RFID technology and utilize it as optimally as is possible in the port and logistics industry, it is necessary to understand the potential of shipping companies and their requirements in adopting RFID technology in port and logistics.

A Study on the Efficient MES Using Automation in Automotive Module Assembly Line (자동차 모듈조립공정에서의 효율적 MES 인터페이스 모형)

  • Kong, Myung-Dal
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4618-4625
    • /
    • 2011
  • This paper suggests a specific model that could efficiently improve the interaction and the interface between MES(Manufacturing Execution System) server and POP(Point Of Production) Terminal through RFID(Radio Frequency Identification) system in Automative Module Assembly Line. The proposed model shows that the new method by RFID can more efficiently perform to receive work order informations and transmit work performances, compared with the current approach by proximity sensor. As a result of the certain test among the MES server, RFID system, PLC(Programmable Logic controller) and POP terminal, it is noted in case of the automatic control by RFID that the effects of proposed model are as follows; (a) While the processing time per truck for carrying by the current method was 10 minutes, the processing time by the new method was 1 minutes. (b) While the error rate by the current method was 20 %, the error rate by the new method was 1 %.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

Collision Tree Based Anti-collision Algorithm in RFID System (RFID시스템에서 충돌 트리 기반 충돌방지 알고리즘)

  • Seo, Hyun-Gon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.316-327
    • /
    • 2007
  • RFID (Radio Frequency Identification) is one of the most promising air interface technologies in the future for object identification using radio wave. If there are multiple tags within the range of the RFID tag reader, all tags send their tag identifications to the reader at the same time in response to the reader's query. This causes collisions on the reader and no tag is identified. A multi-tag identification problem is a core issue in the RFID. It can be solved by anti-collision algorithm such as slot based ALHOA algorithms and tree based algorithms. This paper, proposes a collision tree based anti-collision algorithm using collision tree in RFID system. It is a memory-less algorithm and is an efficient RFID anti-collision mechanism. The collision tree is a mechanism that can solve multi-tag identification problem. It is created in the process of querying and responding between the reader and tags. If the reader broadcasts K bits of prefix to multiple tags, all tags with the identifications matching the prefix transmit the reader the identifications consisted of k+1 bit to last. According to the simulation result, a proposed collision tree based anti-collision algorithm shows a better performance compared to tree working algorithm and query tree algorithm.

Design of a compact quasi-Yagi antenna for portable RFID reader (휴대형 RFID 리더용 소형 준-야기 안테나 설계)

  • Lee, Jong-Ig;Yeo, Junho;Baek, Woon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.15-21
    • /
    • 2016
  • In this paper, we considered a design method of a compact quasi-Yagi antenna for portable UHF RFID readers. The antenna consists of a dipole driver and a reflector printed on a dielectric substrate, and it is fed by a microstrip line. In order to reduce the antenna size, the dipole and reflector are bent and the balun between the feeding microstrip line and coplanar strip (CPS) line is integrated within the CPS line. The effects of the geometrical parameters of the proposed antenna on the antenna performance are examined, and the parameters are adjusted to be suitable for the operation in UHF RFID band (902-928 MHz). The size of the fabricated antenna is $70mm{\times}75mm$, and the experiment results reveal a frequency band of 892-942 MHz for a voltage standing wave ratio < 2, a gain > 3.5 dBi, and a front-to-back ratio > 6.6 dB over the frequency band for UHF RFID.