• Title/Summary/Keyword: RFID Reader

Search Result 743, Processing Time 0.025 seconds

VHDL Implementation of GEN2 Protocol for UHF RFID Tag (RFID GEN2 태그 표준의 VHDL 설계)

  • Jang, Il-Su;Yang, Hoon-Gee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1311-1319
    • /
    • 2007
  • This paper presents the VHDL implementation procedure of the passive RFID tag operating in Ultra High Frequency. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of an interrogation rate. In order to satisfy linking time, the pipe-line structure is used, which can minimize latency to serial input data stream. We also propose the sampling strategy to decode the Preamble, the Frame-sync and PIE symbols in reader commands. The simulation results with the fastest data rate and multi tags environment scenario show that the VHDL implemented tag performs faster operation than GEN2 proposed.

An Efficient Tag Sleep Method for Improving Tag Collection Performance in Active RFID Systems (능동형 RFID 시스템에서 태그 수집 성능 향상을 위한 효율적인 태그 슬립 기법)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Park, Shin-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.686-693
    • /
    • 2009
  • In this paper, we propose an efficient tag sleep method utilizing empty time slots for improving the tag collection performance in active RFID systems. In the proposed tag sleep method, the reader detects the occurrence of empty time slots by carrier sensing and utilizes the wasted empty time slots to transmit sleep commands to the collected tags throughout the framed slotted aloha-based tag collection process, resulting in reducing the time required for tag collection. Via the simulation experiments, we evaluated the performance of the tag collection applied with the proposed tag sleep method, compared with that of the basic tag collection. The simulation results showed that the tag collection applied with the proposed tag sleep method could reduce the average tag collection time by 12.28%, 12.30%, and 13.31 %, for the framed slotted aloha with the fixed 128 time slots and 256 time slots, and the dynamic framed slotted aloha anticollision protocols, respectively.

Electrical Properties of RFID Tag Antenna Fabricated by Si CMOS Process (Si CMOS 공정을 적용한 RFID 태그 안테나 제작 및 전기적 특성)

  • Lee, Seok-Jin;Park, Seung-Beom;Jung, Tae-Hwan;Lim, Dong-Gun;Park, Jae-Hwan;Kim, Yong-Ho;Mun, Nam-Su
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.16 no.1
    • /
    • pp.21-25
    • /
    • 2009
  • By using Si CMOS process, small RFID tag antenna were fabricated on Si substrate and their electrical properties were evaluated. Firstly, tag antenna pattern and the electromagnetic properties were simulated with HFSS. The frequency was 13.56 MHz, the line-width and line-gap were modeled in the range of $50{\sim}200{\mu}m$. S parameters, SRF, and Q value were calculated from geometry. When the line-width and line-gap were $100{\mu}m$ and $100 {\mu}m$, respectively and the loop-turn was 10, the SRF was 80 MHZ and the Q value was ca. 9. When the microstrip antenna pattern of aluminum $2{\mu}m$ was fabricated by using DC sputtering, Vpp of ca. 4.3 V was obtained when the reader and tag were closely contacted.

  • PDF

A Study on Encryption using Polynomial Hash Function for e-Seal (e-Seal을 위한 다항식 해시 함수를 이용한 암호화기법 연구)

  • Yon, Yong-Ho;Shin, Moon-Sun;Lee, Jong-Yon;Hwange, Ik-Soo;Seok, Changk-Boo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1977-1985
    • /
    • 2009
  • An e-Seal is an active RFID device that was set on the door of a container. e-Seal provides both the state of the seal and the remote control of the device automatically. But it has vulnerabilities like eavesdrop and impersonate because of using RFID system. A secure e-Seal authentication protocol must use PRF for encryption/decryption of reader and e-Seal. The existing PRF uses simple hash function such as MD5 or SHA which is not available for e-Seal. It is required to use strong hash functions. The hash function is a essential technique used for data integrity, message authentication and encryption in the mechanism of information security. Therefore, in this paper, we propose more secure and effective hash function based on polynomial for e-Seal authentication protocol.

RFID Indoor Location Recognition with Obstacle Using Neural Network (신경망을 이용한 장애물이 있는 RFID 실내 위치 인식)

  • Lee, Jong-Hyun;Lee, Kang-bin;Hong, Yeon-chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1442-1447
    • /
    • 2018
  • Since the indoor location recognition system using RFID is a method for predicting the indoor position, an error occurs due to the surrounding environment such as an obstacle. In this paper, we plan to reduce errors using back propagation neural networks. The neural network adjusts and trains the connection values between the layers to reduce the error between the actual position of the object with the reader and the expected position of the object through the experiment. In this paper, we propose a method that uses the median method and the radiation method as input to the neural network. Among the two methods, we want to find out which method is more effective in recognizing the actual position in an environment with obstacles and reduce the error. Consequently, the method using the median has less error, and we confirmed that the more the number of data, the smaller the error.

A Tag Proximity Information Acquisition Scheme for RFID Yoking Proof (RFID 요킹증명을 위한 인접태그 정보 획득 기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.476-484
    • /
    • 2019
  • RFID yoking proof proves that a pair of tags is scanned at the same time. Since the tags scanned simultaneously by a single reader are adjacent to each other, the yoking proof is used in applications that need to check the physical proximity of tagged objects. Most of the yoking proof schemes require pre-knowledge on adjacent tags. If an error occurs in the process of collecting information about adjacent tags, all subsequent proofs will fail verification. However, there is no research that suggests specific methods for obtaining information about adjacent tags. In this study, I propose a tag proximity information acquisition scheme for a yoking proof. The proposed method consists of two steps: scanning area determination and scanning area verification. In the first step, the size and position of the area to scan tags is determined in consideration of position and transmission range of the tags. In the next step, whether tag scanning is performed within the scanning area or not is verified through reference tags of the fixed position. In analysis, I show that the determined scanning area assures acquisition of adjacent tag information and the scanning area verification detects deformation and deviation of the scanning area.

Performance Improvement of STAC Protocol by Early Release of Reply Round and Transmission Probability Control (응답 라운드 조기종료와 전송확률 제어를 통한 STAC 프로토콜의 성능 개선)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2569-2574
    • /
    • 2013
  • In 13.56MHz RFID system of Auto-ID center, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. In STAC protocol, the reader uses the tag number estimation scheme to determine the number of slots for the next reply round. If errors occur in the estimated number of tags, the identification performances will be degraded due to a lot of collision or idle slots. Therefore, in this paper, we propose an ERPB algorithm that the reader cancels the reply round when it experiences a series of collision or idle slots during the current round. The transmission probability control for the tag is also applied to the proposed algorithm. Through simulations, it is demonstrated that the collision rate for the proposed scheme is about 39% lower than STAC protocol. Therefore, the proposed scheme can achieve faster tag identification time compared with STAC protocol due to the low collision rate.

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

Dynamic Round size Decision Algorithm for Identification of REID Tag (RFID 태그 인식을 위한 동적 Round Size 결정 알고리즘)

  • Lee Seung-Hyuk;Park Il-Yong;Cho Tae-Kyung;Yoo Hyun-Joong;Park Byoung-Soo;Baek Hyun-Ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.3
    • /
    • pp.373-378
    • /
    • 2006
  • One of the biggest problems that should be solved in present RFID systems is a reduction of identification efficiency by the collision of singals between different tags. As the number of tags, which should be identified, increases over the size of allocated round, more slots experiences the collision between them. It can causes generation of tag collision assigning the fixed round size and so, allocated round size should be regulated properly. This paper proposes the algorithm which can reduce collision between tags, and allocate specific round size dynamically for efficient tag identification. After each round is finished, the reader allocates the round size dynamically using the collision information of the slot. All collision informations of the slot consists of the number of slots which came into conflict, tags which were realized properly without any conflictions and empty slots. We used slotted aloha algorithm as the collision detection algorithm and finally, checked that this could be used very usefully when this algorithm which was proposed effectively could not know how many number of tags were exisisted through the simulation in advance.

  • PDF

A Study on Self-Localization of Home Wellness Robot Using Collaboration of Trilateration and Triangulation (삼변·삼각 측량 협업을 이용한 홈 웰니스 로봇의 자기위치인식에 관한 연구)

  • Lee, Byoungsu;Kim, Seungwoo
    • Journal of IKEEE
    • /
    • v.18 no.1
    • /
    • pp.57-63
    • /
    • 2014
  • This paper is to technically implement the sensing platform for Home-Wellness Robot. The self-Localization of indoor mobile robot is very important for the sophisticated trajectory control. In this paper, the robot's self-localization algorithm is designed by RF sensor network and fuzzy inference. The robot realizes its self-localization, using RFID sensors, through the collaboration algorithm which uses fuzzy inference for combining the strengths of triangulation and triangulation. For the triangulation self-Localization, RSSI is implemented. TOA method is used for realizing the triangulation self-localization. The final improved position is, through fuzzy inference, made by the fusion algorithm of the resultant coordinates from trilateration and triangulation in real time. In this paper, good performance of the proposed self-localization algorithm is confirmed through the results of a variety of experiments in the base of RFID sensor network and reader system.