• Title/Summary/Keyword: RFID Protocol

Search Result 449, Processing Time 0.022 seconds

A Study on the Development of Medical Service Robot (의료용 서비스 로봇 개발에 관한 연구)

  • Kang, Sung-In;Park, Yoon-A;Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1245-1250
    • /
    • 2011
  • In this paper, we designed efficient reception system using service robot based on the RFID(Radio Frequency Identification) and HL7(Health Level 7) Protocol. The proposed system offer a paramedic the medical information of the patient, and the patients can receive on a much simpler scale than previously through stable and quick information exchange by RFID and HL7. In addition, We considered environment of medical treatment and designed and implemented standard HL7 message structure. This system was implemented service robots to reception of medical treatment. Furthermore, we have plan to develop bio-sensor which can measure blood pressure, body temperature, etc and interface with robot system by HL7.

The Design and Implementation of Automotive Smart-key System Using general-purpose RFID (교통카드와 같은 범용 RFID를 활용한 자동차용 스마트키 시스템 설계 및 구현)

  • Lee, Yun-Sub;Kim, Kyeong-Seob;Yun, Jeong-Hee;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.42-50
    • /
    • 2009
  • Ubiquitous computing technology is widely used in not only our everyday lives but also in education, medical care, military, environment and administration. RFID system, the basis of ubiquitous, is in the spotlight which can be an alternative solution of a bar code recognition system and magnetic system as they basically have practicality and security issues. An electronic authentication named smart-key system is recently concerned by an alternative solution of the security unit for an automobile. RFID system which has a general purpose is also in the limelight by an application technology. In this paper we designed vehicle smart key system with general-propose RFID system that is already in use. First, we designed control unit and RFID card reader for vehicle smart key system. Then we propose an algorithm and prove that the vehicle key system is controllable by showing the result of implementing and testing, after installing. Also security level is enlarged by proposing a authentication protocol between RFID reader and control unit.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

Standardization Trends and Prospect of Next Generation Internet Protocol (차세대 인터넷프로토콜 표준화 동향 및 전망)

  • Gang, Hui-Jo
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.281-288
    • /
    • 2005
  • 차세대 인터넷 주소체계인 IPv6는 BcN, 디지털홈, 유비쿼터스 컴퓨팅 등 21세기 국가경쟁력을 좌우하는 핵심 인프라로 자리 잡고 있다. 본 논문에서는 차세대 인터넷 프로토콜(IPv6) 개념, 기술현황, 표준화 통향, IPv6의 적용 분야 등에 대하여 검토하기로 한다.

  • PDF

A Lighting Control System of Underground Parking Lot Based on Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 기반 지하주차장 조명제어시스템)

  • Son, Byung-Rak;Kim, Jung-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.125-135
    • /
    • 2010
  • Recently, the problem of global warming has issued seriously, so Green IT(Information Technology) using RFID/USN is concerned in order to solve environmental problems. In this paper, we implemented that public area like an underground parking lot could reduce unnecessary energy consumption used by lighting control system based on Ubiquitous Sensor Networks. The lighting control system for underground parking lot is comprised of intersection nodes for watching cars enter and leave, and light node for controlling light. It applies the routing protocol based on hierarchical cluster, hierarchical addressing method, and probability filtering method for the specific place like an underground parking lot. The result after experiments shows that the lighting control system could decrease electrical energy consumption to around 61.7%.

Implementation of UHF RFID Tag Emulator (UHF 대역의 RFID 태그 에뮬레이터 구현)

  • Park, Kyung-Chang;Kim, Hanbyeori;Lee, Sang-Jin;Kim, Seung-Youl;Park, Rae-Hyeon;Kim, Yong-Dae;You, Young-Gap
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.12-17
    • /
    • 2009
  • This paper presents a tag emulator for a UHF band RFID system. The tag emulator supports the 1800-6C and EPC global class 1 generation 2 standards. The transmitted signal from a reader is generated using the PIE coding and ASK modulation methods. Signals of a tag are from the FM0 coding and ASK modulation methods. The ARM7 processor carries out the overall control of the system and signal analysis of incoming data. The verification of the tag emulator employs the application platform implemented in C++. Users can define parameter values for protocol during the application run. The tag emulator presented in this paper allows evaluating various design alternatives of the target RFID system in real applications.

Study on Characteristics of the Forward Link Signal for the UHF RFID Reader (UHF 대역 RFID 리더의 순방향 링크 신호 특성에 관한 연구)

  • Kim, Do-Yun;Jang, Byung-Jun;Yoon, Hyun-Goo;Park, Jun-Seok;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.6 s.121
    • /
    • pp.602-611
    • /
    • 2007
  • In this paper, the forward link of UHF RFID system is modeled in accordance with the EPCglobal class 1 generation 2(EPCglobal C1G2) UHF Radio-Frequency Identity protocol specification at $860{\sim}960MHz$. Based on the constructed model, characteristics on the forward link signal for the EPCglobal C1G2 RFID reader are simulated with the help of a MATLAB softwarein order to extract the design parameters of a transmit digital filter which meets the Korean RFID regulations. Herein, the forward link model is consisted of PIE source coding, transmit digital filter, modulation, local oscillator, and antenna. From the simulation results, the ranges of three design parameters(roll-off factor, cutoff frequency, the number of tabs) for transmit digital filter are obtained with different modulation techniques and the Tari(type a reference interval) values. Finally, DSB/SSB-ASK modulation technique can not satisfy the EPCglobal C1G2 specification when Tari equals to $6.25{\mu}sec$ in a multiple-reader environment. Consequently this paper can provide a guideline for design parameters of a RFID reader as well as the basic scheme of analyzing frequency interference problems in RFID environments, including multiple-reader and dense-reader environments.

A Study on initial value Q of Anti-collision Algorithm in Gen2 Protocol Based RFID Systems (GEN2 기반 RFID 시스템에서의 충돌방지 알고리즘의 초기 값 Q에 대한 연구)

  • Im, Song-Bin;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.5
    • /
    • pp.33-39
    • /
    • 2010
  • In this paper, we propose an improved anti-collision algorithm. We have designed an anti-collision unit using this algorithm for the 18000-6 Type C Class 1 Generation 2 standard (Gen2). The Gen2 standard uses a Q-algorithm for incremental method on the Dynamic Slot-Aloha algorithm. It has basically enhanced performance over the Slot-Aloha algorithm. Unfortunately, there are several non-clarified parts: initial value. If an incorrect value is selected, it causes degradation in performance. To increase throughput and system efficiency, and to decrease tag identification time, we propose an improved anti-collision algorithm. prorosed Q algorithm has an increment of 5% of system efficiency and a decrement of 9% of tag identification time.

Pulse Protocol-based Hybrid Reader Anti-collision Algorithm using Slot-occupied Probability under Dense Reader Environment (밀집 리더 환경 하에서 슬롯 점유확률을 이용한 Pulse Protocol 기반의 Hybrid 리더 충돌방지 알고리즘)

  • Song, In-Chan;Fan, Xiao;Yoon, Hee-Seok;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10A
    • /
    • pp.987-996
    • /
    • 2008
  • In this paper, the conventional anti-collision algorithms, such as Channel Monitoring algorithm and Pulse Protocol algorithm are analyzed. To decrease tag identification time, and increase system throughput and efficiency, we propose a new reader anti-collision algorithm, Pulse Protocol-based Hybrid Reader Anti-collision Algorithm, using Slot-occupied Probability under dense reader environment. The proposed algorithm uses Slot-occupied Probability to improve the performance of Pulse Protocol Algorithm. That is, A reader checks Slot-occupied Probability after generating random backoff time. If Slot-occupied Probability is greater than 0, it uses another new random backoff time to avoid reader collision. We also compare the performance of the proposed algorithm with those of Channel Monitoring and Pulse Protocol algorithms in respect of identification time system throughput, and system efficiency. Simulation results show that the proposed algorithm has an increment of 5% of identification time and system throughput as increasing the number of readers.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF