• Title/Summary/Keyword: RFID Protocol

Search Result 449, Processing Time 0.025 seconds

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF

Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment

  • Song, In-Chan;Fan, Xiao;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.299-311
    • /
    • 2008
  • The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs when there is interference in communication between one reader and the tags, due to the signals from other readers. The reader collision problem is considered as the fundamental problem affecting high density RFID reader installations. In this paper, we analyze the existing reader anti-collision algorithms. We also propose a pulse protocol-based reader anti-collision algorithm using slot occupied probability (SOP). The implementation of this improvement is simple, yet it effectively mitigates most reader collisions in dense reader mode, as shown in our simulation. That is, the proposed algorithm reduces the identification time, and increasesthe system throughput and system efficiency compared with the conventional reader anti-collision algorithms.

An Implementation of Management Function based on RM for Smart Active RFID Reader (스마트 능동형 RFID 리더를 위한 RM 기반 관리 기능 구현)

  • Kwon, Yoon-Geun;Chung, Sang-Hwa;Lee, Yun-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1159-1167
    • /
    • 2011
  • In this paper, we proposed and implemented an EPCglobal Reader Manegement (RM) based management protocol. Using RFID Reader's management function, we could diagnose an active RFID Reader concretely which was impossible with only using Reader protocols and check the problem quickly when the RFID Reader is in failure. When diagnosing RFID Readers using the proposed RM based management protocol, we can check on their failure in stages and specifically, and can estimate range of failure. This helps RFID Reader's fast recovery, reduce loss of failure and improve QoS. We could get reader information with almost same overhead compared with the management message in LLRP. And we could get more information about RFID Reader's operation status.

Relay Cooperative Transmission Scheme for Distributed MAC Protocol-Based Logistic Applications (분산적인 매체접근제어(MAC) 프로토콜 기반 물류 시스템을 위한 릴레이 협력통신 방안)

  • Joo, Yang-Ick;Hur, Kyeong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.423-432
    • /
    • 2011
  • In a warehouse, because there exist frequent changes of stock status and the quality of some contents are influenced by the environment such as temperature, fast and accurate management of the warehouse's environment is very important for Warehouse Management Systems (WMS). However, due to the absence of a unified standard for the communication protocol between RFID nodes, the connection between RFID nodes can be broken in case of movement of a RFID reader to a region with a different protocol. Moreover, centralized MAC schemes for RFID communications in previous studies have severe problems. For an example, if a cluster header disappears from the cluster due to the cluster header's movement or bad channel conditions, the RFID member nodes of the cluster waste lots of time and energy to re-elect a new cluster header. Therefore, in this paper, we propose a WiMedia Distributed MAC (D-MAC) scheme for RFID communications and its cooperative relay transmission scheme for WMS applications Simulation results show performance improvement at the RFID node by using the proposed cooperative relay transmission scheme.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

Implementation & Verification of RFID Gen2 Protocol on FPGA Prototyping board (FPGA를 이용한 RFID Gen2 protocol의 구현 및 검증)

  • Je, Young-Dai;Kim, Jae-Lim;Jang, Il-Su;Yang, Hoon-Gee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.869-872
    • /
    • 2008
  • This paper presents the VHDL implementation procedure of the passive RFID tag in Ultra High Frequency RFID system. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation on prototyping board. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of the interrogation rate. Also with UART communication, verify a inventory Round in Gen2 Protocol. The verification results with the fastest data rate, 640kbps, and multi tags environment scenario show that the implemented tag spend 1.4ms transmitting the 96bits EPC to reader.

  • PDF

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

Improvement of EPC Class-0 Anticollision Algorithm for RFID Air-Interface Protocol (무선인식 프로토콜에서의 EPC Class-0 충돌방지 알고리즘 개선)

  • Lim, Jung-Hyun;Jwa, Jeong-Woo;Yang, Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.18-24
    • /
    • 2008
  • This paper analyzed Air Interface of EPCglobal's Class-0 that is UHF band protocol among radio environment protocol standard that is used to RFID system. And embodied prescribed anticollision algorithm in protocol. Also, the improved anticollision algorithm for the Class-0 protocol is proposed and performances of anticollision algorithm are compared. Result that compare performance of standard algorithm through simulation with improved algorithm, improved Class-0 algorithm when is tag number 100, reduced 8%, and when is tag number 1000, 12.2%. According as tag number increases, total realization time of improved algorithm decreased more gradually better than prescribed algorithm. Therefore, the improved anticollision algorithm proposed in this paper is advanced method improving the performance of tag recognition in the RFID system and Ubiquitous sensor network.

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.