• Title/Summary/Keyword: RFID Systems

Search Result 758, Processing Time 0.023 seconds

Access Control Policy for Middleware in RFID Systems (RFID 시스템의 미들웨어를 위한 접근제어)

  • Kim, Tae-Sung;Kim, Ho-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.201-204
    • /
    • 2008
  • RFID의 무선을 통해 자동 인식 기술은 산업, 상업 그리고 의료 분야에 혁신적인 개선을 가져다 줄 것으로 기대되고 있다. RFID 기술의 핵심은 물리적인 물체에 관련한 정보를 쉽게 수집할 수 있다는 것이다. 미들웨어는 RFID 리더와 응용 사이에 위치하면서 RFID 정보를 실시간으로 수집하고 기업응용에 전달해주는 중요한 역할을 담당한다. 따라서 네트워크로부터의 공격이나 잘못된 명령으로부터 미들웨어를 보호하기 위해 적절한 접근제어가 필요하다. 본 논문은 RFID 미들웨어에 적용가능한 접근제어 정책을 제안한다. 이 정책은 제공가능한 태그 범위, 접근가능한 리더, 명령, 보고가 배달되어질 주소등을 제한할 수 있도록 고안되었다. 또한, 접근제어 정책을 수행하는 프로세스의 구현 알고리즘을 제시한다.

  • PDF

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Security Audit Checking Items for the RFID-Based Information Systems (RFID 기반 정보시스템을 위한 보안감리 점검항목)

  • Lim, Ji-Young;Kim, Dong-Oh;Han, Ki-Joon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.419-422
    • /
    • 2008
  • 유비쿼터스 시대의 핵심 기반기술인 RFID와 관련하여 공공기관을 중심으로 시범 사업 및 본 사업이 활발하게 추진되고 있다. 또한 RFID 기반 정보시스템에 대한 감리 수요도 계속 증가하고 있으며, 특히 개인정보보호에 대한 관심이 확산되면서 보안감리의 비중도 높아지고 있다. 이와 관련하여 RFID 기반 정보시스템의 사업특성을 적절히 반영한 보안감리 점검항목이 요구되고 있다. 따라서 본 논문에서는 현행 RFID 기반 정보시스템에 대한 감리를 보다 체계적이고 효율적으로 수행하는데 활용될 수 있는 RFID 사업특성기반의 보안감리 점검항목을 제안한다.

  • PDF

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Design of Embedded Based Distributed RFID Gateway Using Open Source Hardware (오픈 소스 하드웨어를 이용한 임베디드 기반의 분산형 RFID 게이트웨이의 설계)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.581-586
    • /
    • 2015
  • In this paper, we configure a Radio Frequency IDentification (RFID) gateway using an arduino and raspberry pi which are recent issues with a representative open source hardware. RFID technology is emerging as a key technology in a variety of environments as a technique to automatically identify objects using a radio frequency signal. In this paper, we propose a distributed RFID gateway for providing various communication methods and processing a large amount of RFID tag information efficiently, and to increase the scalability and middleware communication efficiency of the RFID reader. Existing RFID middleware systems have the problems that they should adhere the web service for interworking with a reader and the communication standard. Therefore, in this paper, we comprise our RFID gate to satisfy not only the serial communication configuration but also various digital signal processing standard so that it increases the communication efficiency of the middleware system.

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF

IS Audit Framework Development through e-Gov's RFID/USN Project in South Korea (정보시스템 감리 프레임워크 개발:한국 전자정부의 RFID/USN 프로젝트 개발을 통해서)

  • Kim, Sojung;Koo, Chulmo;Koh, Chang E.
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.219-234
    • /
    • 2013
  • We introduced a framework of information systems audit methodology and applied to IS projects based on RFID/USN in six public organizations in South Korea. An analysis of five IS implementation projects shows the iterative technical specific risks are disclosed. The key 14 risk factors categorized into 4 classifications (Project Management, application, database, system architecture) which are based on the established IT audit framework in order to extend to the technology (RFID/USN) specific framework and apply to the other case as well. The implications of these findings for audit research and practice are discussed.

TDOA-Based Localization Algorithms for RFID Systems Using Benchmark Tags (벤치마크 태그를 이용한 도착시간 차 기반의 RFID 측위 알고리즘)

  • Joo, Un Gi
    • Korean Management Science Review
    • /
    • v.29 no.3
    • /
    • pp.1-11
    • /
    • 2012
  • This paper considers a localization problem in time difference of arrival (TDOA)-based radio frequency identification (RFID) systems. To estimate the position of a target tag, this paper suggests three localization algorithms that use benchmark tags. The benchmark tags are the same type as the target tag, but either the locations or distance of the benchmark tags are known. Two algorithms use the benchmarks for auxiliary information to improve the estimation accuracy of the other localization algorithms such as least squared estimator (LSE). The other one utilizes the benchmarks as essential tags to estimate the location. Numerical tests show that the localization accuracy can be improved by using benchmark tags especially when an algorithm using the LSE is applied to the localization problem. Furthermore, this paper shows that our benchmark algorithm is valuable when the measurement noise is large.

A Study on Technical Regulation for Radio Frequency Identification Systems (무선식별(Radio Frequency IDentification)시스템 기술기준 연구)

  • 장동원
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.61-65
    • /
    • 2003
  • In this paper, we analysed the standardized techniques for radio frequency identification systems. RFID system is to carry data in suitable transponders, generally known as tags, and to retrieve data, by machinable means, at a suitable time and place to satisfy particular application needs. The paper has discussed on international standardization trends and its techniques and provided with understanding the technical regulations for activating and harmonizing internationally domestic RFID industries.

  • PDF

Design of a Tag Antenna for UHF RFID Food Systems

  • Shin, Dong-Beom;Lee, Jung Nam;Lee, Heyung-Sub;Lee, Sang-Yeoun;Kim, Byeong-Sam
    • Journal of electromagnetic engineering and science
    • /
    • v.13 no.4
    • /
    • pp.208-213
    • /
    • 2013
  • This paper proposes a tag antenna for radio frequency identification (RFID) food system. The RFID tag antenna is designed and fabricated based on the rectangular loop concept used in the UHF band (Korean and Japanese standards, 916.7-923.5MHz). The proposed tag antenna is composed of a radiation patch, sensor tag chip, temperature sensor, oscillator, and battery. We conjugated matching between the tag antenna and the sensor tag using a U-shaped stub. Details of the proposed tag antenna design and the simulated and measured results are presented and discussed.