• Title/Summary/Keyword: RFID Systems

Search Result 758, Processing Time 0.025 seconds

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

RFID Access Control Using Extended Usage Control Model (확장된 사용 제어 모델을 이용한 RFID 접근 제어)

  • Shin, Woo-Chul;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.127-144
    • /
    • 2007
  • This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.

  • PDF

RFID Tag Detection on a Water Content Using a Back-propagation Learning Machine

  • Jo, Min-Ho;Lim, Chang-Gyoon;Zimmers, Emory W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.19-31
    • /
    • 2007
  • RFID tag is detected by an RFID antenna and information is read from the tag detected, by an RFID reader. RFID tag detection by an RFID reader is very important at the deployment stage. Tag detection is influenced by factors such as tag direction on a target object, speed of a conveyer moving the object, and the contents of an object. The water content of the object absorbs radio waves at high frequencies, typically approximately 900 MHz, resulting in unstable tag signal power. Currently, finding the best conditions for factors influencing the tag detection requires very time consuming work at deployment. Thus, a quick and simple RFID tag detection scheme is needed to improve the current time consuming trial-and-error experimental method. This paper proposes a back-propagation learning-based RFID tag detection prediction scheme, which is intelligent and has the advantages of ease of use and time/cost savings. The results of simulation with the proposed scheme demonstrate a high prediction accuracy for tag detection on a water content, which is comparable with the current method in terms of time/cost savings.

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates (타원곡선 좌표계를 이용한 RFID 다중객체 간 인증 암호기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.43-50
    • /
    • 2008
  • Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.

  • PDF

Improvement of Tag Collection Performance for Active RFID Systems (능동형 RFID 시스템을 위한 태그 수집 성능 개선)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Moon, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.518-527
    • /
    • 2008
  • Tag collection is one of the major functions in Radio Frequency Identification (RFID) systems. IS0/IEC 18000-7 defines the tag collection algorithm using the anti-collision algorithm, based on the framed slotted ALOHA for active RFID systems. However, it has inefficiency problems that reduce tag collection performance by deciding non-optimum slot size or using point-to-point commands to put collected tags to sleep. In this paper, we propose two mechanisms to overcome the inefficiency problems and improve tag collection performance: 1) a new slot size decision mechanism to allow the reader to choose the optimum slot size flexibly and 2) a broadcast-based sleep mechanism to put collected tags to sleep effectively. We also implemented an active RFID system, composed of an active RFID reader and multiple tags, and the reader is designed to maximize tag collection performance when the proposed mechanisms are applied. In experiments, we evaluated the tag collection performance using one reader and 50 tags in the real-world environment. The experimental results show that when two mechanisms are applied and the initial number of slots is chosen appropriately, the performance of the proposed tag collection algorithm is greatly enhanced, compared with that of the standard.

Modeling the Value of RFID System using Value-Focused Thinking (가치 중심 사고를 적용한 RFID 시스템의 가치 모형 개발)

  • Son, Kyung-Won;Cho, Sung-Ku;Yeom, Se-Kyoung;Chung, Seung-Hyun
    • IE interfaces
    • /
    • v.25 no.2
    • /
    • pp.204-215
    • /
    • 2012
  • Recently, more and more firms are considering the adoption of RFID technology because it is expected to make process automation easier and has many different application areas. A review of existing studies about RFID adoption methodology shows that the most of the proposed methodologies are mainly based on economic evaluations. However, in the near future when the adoption and diffusion of RFID become major forces among business firms, it would surely have some limits to decide its adoption solely on the basis of economic considerations. In order for all the important strategic objectives to be considered during the major decision processes, it is necessary to make explicit what the decision makers really want to achieve from the RFID system. In this paper, we propose a general value model of RFID system which can provide an overall vision of all values RFID adoption may offer and a way to search and evaluate alternatives on the basis of these values. Especially, this model contains not only opportunities but also risks of RFID adoption so that a balanced consideration can be made. The model building process was essentially based on the 'value-focused thinking' approach proposed by R. Keeney. The proposed model is expected to provide insights about what to do in the process of introduction in order to maximize the potential benefits and minimize the negative risks. Referring to this value model, the important decisions would have greater chance to be based on a balanced consideration of opportunities and risks.

Object Recognition Using 3D RFID System (3D REID 시스템을 이용한 사물 인식)

  • Roh Se-gon;Lee Young Hoon;Choi Hyouk Ryeol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1027-1038
    • /
    • 2005
  • Object recognition in the field of robotics generally has depended on a computer vision system. Recently, RFID(Radio Frequency IDentification) has been suggested as technology that supports object recognition. This paper, introduces the advanced RFID-based recognition using a novel tag which is named a 3D tag. The 3D tag was designed to facilitate object recognition. The proposed RFID system not only detects the existence of an object, but also estimates the orientation and position of the object. These characteristics allow the robot to reduce considerably its dependence on other sensors for object recognition. In this paper, we analyze the characteristics of the 3D tag-based RFID system. In addition, the estimation methods of position and orientation using the system are discussed.

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos

  • An, Kyu-Hee;Lee, Ki-Yeal;Chung, Mok-Dong
    • Journal of Information Processing Systems
    • /
    • v.2 no.3 s.4
    • /
    • pp.170-177
    • /
    • 2006
  • Recently, RFID technology has attracted considerable attention in many industry fields. The RFID environment requires a standard architecture for the smooth exchange of data between heterogeneous networks. The architecture should offer an efficient standard environment, such as a communication environment based on Web Services, PKI or Kerberos-based security, and abstract business processes which could be used in the diverse domains. Therefore, in this paper, we propose an Enterprise Application Framework (EAF) which includes a standard communication protocol, security functions, and abstract level business processes. The suggested architecture is expected to provide a more secure and flexible security management in the dynamic RFID application environments, and is expected to provide an abstract business event for the development of business processes which could apply RFID technology to the existing systems.

A Scheme for Estimating Number of Tags in FSA-based RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.164-169
    • /
    • 2009
  • An RFID system consists of radio frequency tags attached to objects that need to be identified and one or more electromagnetic readers. Unlike the traditional bar code system, the great benefit of RFID technology is that it allows information to be read without requiring contact between the tag and the reader. For this contact-less feature, RFID technology in the near future will become an attractive alternative to bar code in many application fields. In almost all the 13.56MHz RFID systems, FSA (Framed Slot ALOHA) algorithm is used for identifying multiple tags in the reader's identification range. In FSA algorithm, the tag identification time and system efficiency depend mainly on the number of tags and frame size. In this paper, we propose a tag number estimation scheme and a dynamic frame size allocation scheme based on the estimated number of tags.

The Construction of 365 Public Service System: Focus on the Case of Gwangju Seo-Gu (365민원서비스 시스템 구축에 관한 연구: 광주서구청 사례를 중심으로)

  • Kim, Oh-Sung;Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.83-90
    • /
    • 2007
  • Recently, RFID has emerged as the main technology in the logistic services. When the existing recognition technology based on bar codes brings about lots of problem due to its own limits. RFID becomes the center of attention to solve them. However, RFID is not without any obstacles: companies have their own operating systems, while RFID is developed regardless of each company's special features. RFID middleware system based on web service is expected to remove these obstacles. This paper shows how to operate the middleware based on web service and to lay in the DB the tag informations taken from reader system. Middle assures that companies adopting RFID system for their logistic service are given adaptability to any systems whatsoever, available by way of defining logistic information, tag information and reader information. For this purpose, we implement as the basic web service a middleware system that turns all data into XML(eXtensible Markup Language) of SOAP (Simple Object Access Protocol), the standard data.

  • PDF