• Title/Summary/Keyword: RFID Reader

Search Result 743, Processing Time 0.028 seconds

Collision Tree Based Anti-collision Algorithm in RFID System (RFID시스템에서 충돌 트리 기반 충돌방지 알고리즘)

  • Seo, Hyun-Gon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.316-327
    • /
    • 2007
  • RFID (Radio Frequency Identification) is one of the most promising air interface technologies in the future for object identification using radio wave. If there are multiple tags within the range of the RFID tag reader, all tags send their tag identifications to the reader at the same time in response to the reader's query. This causes collisions on the reader and no tag is identified. A multi-tag identification problem is a core issue in the RFID. It can be solved by anti-collision algorithm such as slot based ALHOA algorithms and tree based algorithms. This paper, proposes a collision tree based anti-collision algorithm using collision tree in RFID system. It is a memory-less algorithm and is an efficient RFID anti-collision mechanism. The collision tree is a mechanism that can solve multi-tag identification problem. It is created in the process of querying and responding between the reader and tags. If the reader broadcasts K bits of prefix to multiple tags, all tags with the identifications matching the prefix transmit the reader the identifications consisted of k+1 bit to last. According to the simulation result, a proposed collision tree based anti-collision algorithm shows a better performance compared to tree working algorithm and query tree algorithm.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

Game Theoretic Analysis for RFID Reader Collision (RFID 리더 주파수 간섭에 대한 게임 이론 관점에서의 해석)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.36-47
    • /
    • 2009
  • There exists RFID reader-to reader frequency which can not recognize tag in dense reader nude because the interference causes low SIR. To solve this frequency, the many algorithms based on TDM have been proposed. But the most of existing algorithms not obtain the optimal time allocation but propose heuristic scheduling algorithm. In this paper, we apply game theory which deals with interest between players of game to RFID reader-to reader interference and analyze the time allocation problem of reader based on TDM in terms of cooperative game which the players bind agreements using Nash Bargaining Solution(NBS) and non-cooperative game which the players do not bind agreements using Nash Equilibrium(NE). The applied results show that in dense reader mode, NBS of cooperative game is superior to NE of non-cooperative game and present optimal time allocation in dense reader mode.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Design of a Circularly Polarized Antenna for UHF Band RFID Reader (UHF RFID 리더기용 원형편파 안테나 설계)

  • Chun, Jong-Hun;Han, Seung-Jo;Pyun, Jae-Young;Lim, Gyeong;Park, Jong-An
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.101-110
    • /
    • 2007
  • This study has designed a circular polarization antenna for UHF bandwidth RFID reader. As a result of performance test of the antenna designed it is found that return loss (S11) is about -45.529dB at 914MHz, which is relatively small, and antenna gain is about 6.09dBi. It has also been confirmed that $50{\Omega}$ impedance matching is about $50.48{$\Omega}$ and it can be applied to every RFID reader. Therefore, the antenna is designed to have higher gain of circular polarization by improving reception, which is one of the most important parameters of RFID reader and is expected to be extensively used to recognize multi-tag in the distance.

  • PDF

A study of RFID System for a Patient Authentication using U2270B Chip (U2270B를 이용한 환자 인증용 RFID 시스템에 관한 연구)

  • Jo, Heung-Kuk;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.47-49
    • /
    • 2011
  • 21세기 새로운 IT 혁명인 유비쿼터스 환경을 목표로 여러 IT 분야들은 모든 사물의 지능화를 위해 여러 기술들을 탐구하고 있다. 그 중의 하나인 RFID 시스템은 비접촉 대상물 인식을 수행하는 무선 통신 기술이다. Tag와 Reader간의 비접촉인식을 이루는 RFID 시스템은 Reader IC인 U2270B 칩이 핵심이다. 효율적으로 U2270B의 사용을 위해서는 RFID reader의 안테나 설계, 안정화된 전력공급, 그리고 작동모드 제어 등의 전반적인 기술적 이해가 필요하다. U2270B의 동작을 위한 구성은 안테나를 통한 전자장 형성과 전자유도 결합으로 동작하는 Tag와의 통신이다. 본 연구에서는 저주파수 대역 RFID Reader에 사용되는 U2270B의 구성에 대한 기본 개념과 H/W 구현에 대하여 설명하고, 실제 구현된 시스템과 각 부분의 실측 파형을 제시함으로써 환자 인증용 RFID 시스템 적용방안을 제시하고자 한다.

  • PDF

Development of the RFID Card Reader for Multi-purpose Application (다목적 무선 식별 카드 리더기 개발)

  • Yu, Jong-Sang;Lee, Sang-Cheol;Yu, Jae-Moon
    • Proceedings of the KIEE Conference
    • /
    • 2003.07e
    • /
    • pp.117-119
    • /
    • 2003
  • Recently, Radio Frequency Identification (RFID) cards have been charming increasing attention. In addition, the RFID card ensures high durability and ease of maintenance because it has no built-in contact. And the benefits of RFID cards over contact cards are primarily due to the increased transaction speed and convenience brought to the cardholder. In this paper, we have developed a RFID card reader for the multi-purpose applications. The vicinity card reader with large-screen to display user ID and card number for a kinds of applications such as entrance and attendance management system is suitable for the use with EM card and TEMIC card, featuring easy to mount and reliable quality. The read range of the proposed RFID card reader is 70cm. This paper also addresses current RFID technology in terms of systems and provides a look forward its future applications in the aviation environment using RFID smart card.

  • PDF

Multi-Protocol RFID Reader SoC Design (Multi-Protocol RFID Reader SoC 설계)

  • Ki, Tae-Hun;Bae, Gyu-Sung;Kim, Jong-Bae;Moon, Jeon-Il
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.667-668
    • /
    • 2006
  • Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. RFID systems is coming into increasing use in industry and logistics. This paper discuses implementation of multi-protocol RFID reader SoC. The SoC contains multi-protocol RFID RFID reader, CPU, UART, memory.

  • PDF

Processing of Various RFID Reader Devices for ALE Middleware (ALE 미들웨어를 위한 다양한 RFID 리더 처리 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol;Lee, Dong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.55-64
    • /
    • 2009
  • For realizing ubiquitous computing, many research activities are geared towards various areas including embedded computing, RFID, USN, home networking, context-awareness, and etc. By using the ability of RFID technology to recognize a number of objects simultaneously, more convenient ubiquitous application services are effectively provided. In this case, RFID middleware playing a role as a bridge between RFID reader devices and application services is required as well. In this paper, we propose a method of handling a number of types of RFID reader devices in ALE middleware of EPCglobal. For this, the information of connection and data protocol for a reader device is stored in a database as ontology meta-data, and used to interpret the data read by a reader device. By adding ontology data into a database, even though an RFID device newly emerges, ALE middleware can not only handle the device, but also be effectively extended through reusing ontology data, without any changes in the middleware.