• Title/Summary/Keyword: RFID Systems

Search Result 758, Processing Time 0.021 seconds

Distributed REID Information Service Architecture for Ubiquitous Logistics (유비쿼터스 물류를 위한 분산형 RFID 정보서비스 구조)

  • Lee, Jae-Won;Lee, Young-Koo
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.105-121
    • /
    • 2005
  • To realize a ubiquitous logistics management system using the smart object of Electronic Product Code(EPC) enabled RFID tag, the design and management of RFID Information Service is very important. RFID Information Service searches, transfers and responds to the other's PML request, but Physical Markup Language (PML) data management between trading system elements has issues of standardization of PML data description and processing, and problems of data traffic and communication time overload because of the innate distributed characteristics. As a complementary study, this research analyzes the usage patterns and data types of PML. On that analysis we provide a design of the distributed RFID Information Service architecture of PML data management that is using DB middleware. Standalone and Integrated type of RFID IS were proposed.

  • PDF

KKR code conversion for ALE middleware (ALE 미들웨어를 위한 KKR 코드 변환)

  • Byun, Ji-Woong;Byun, Yung-Cheol;Lee, Dong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1759-1766
    • /
    • 2008
  • RFID middleware is the system software that converts EPC data collected from RFID reader devices into meaningful data, that users want, and transfers the result to the users with a variety of protocols. ALE specification, the RFID middleware specification proposed by EPCglobal that is a leading group of do facto international standards with respect to RFID, can handle only EPC code. Meanwhile, a new code system which is called KKR was proposed by NIDA in order to represent RFID tag data in a specific manner and cultivate the domestic RFID industry. In this case, the existing RFID middleware can not process KKR code system because of inherent attributes of the system. In this paper, we proposed a method of KKR code conversion to properly process KKR code in ALE middieware, implemented our method in real, and adopted it into existing ALE middleware. Also, we proposed a new URN format for RFID tag data to manipulate KKR code in ALE middleware. By using the proposed method, the existing ALE middleware conforming to international specification can handle KKR code effectively, and the integration among RFID middleware and legacy systems can be easily supported also.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID (해쉬된 태그ID와 대칭키 기반의 RFID 인증프로토콜)

  • Park, Yong-Soo;Shin, Ju-Seok;Choi, Myung-Sil;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.669-680
    • /
    • 2009
  • By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number (시프트 연산과 난수를 이용한 가변적 대칭키 기반의 RFID 상호인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Chung, Kyung-Ho;Lee, Chang-Hee;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.377-384
    • /
    • 2012
  • RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.

Dynamic Frame Size Allocation Scheme based on Estimated Number of Tags (태그수추정에 기반한 동적 프레임 크기 할당 기법)

  • Lim, In-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.469-474
    • /
    • 2009
  • An RFID system consists of radio frequency tags attached to objects that need to be identified and one or more electromagnetic readers. Unlike the traditional bar code system, the great benefit of RFID technology is that it allows information to be read without requiring contact between the tag and the reader. For this contact-less feature, RFID technology in the near future will become an attractive alternative to bar code in many application fields. In almost all the 13.56MHz RFID systems, FSA algorithm is used for identifying multiple tags in the reader's identification range. In FSA algorithm, the tag identification time and system efficiency depend mainly on the number of tags and frame size. In this paper, we propose a tag number estimation scheme and a dynamic frame size allocation scheme based on the estimated number of tags.

Integration of RFID into Wireless Sensor Networks: Architecture and Meta-Model Applied for Supply Chain Management Systems (WSN과 RFID의 통합: SCM을 위한 아키텍처와 메타모델)

  • Nguyen, Xuan Quy;Vishnu, Kumar;Kyung, Min-Gi;Min, Dug-Ki
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.431-436
    • /
    • 2008
  • 지난 몇 년 동안 컴퓨터 네트워크에는 다음과 같은 중요한 일이 발생하였다. 장치 대 장치, 기계 대 기계의 통신이 컴퓨터 네트워크에서 주요한 이슈로 떠오른 것이다. 그 중에 가장 눈에 띄는 주제 중 하나인 WSN에 속한 RFID이다. 이 RFID와 WSN의 통합에 대한 아이디어는 퍼베이시브 컴퓨팅에서 나오게 되었다. RFID와 WSN은 퍼베이시브 컴퓨팅의 주요 요소이고, 이 두 가지 기술은 현실 세계와 가상 세계를 묶어주는 역할을 한다. 하지만 RFID와 WSN은 각각 병렬적으로 개발되고 있으며, 비즈니스 애플리케이션의 통합을 위해서는 자세한 규칙과 방법들이 연구되어야 한다. 본 논문에서는 RFID와 WSN가 통합된 비즈니스 도메인을 위한 시스템 아키텍처 프레임워크 모델링을 제안한다. RFID와 WSN을 동시에 이용해서 SCM을 관리하는 것이다. 이를 위해서 RFID와 WSN, 각각의 기술에 대한 요소를 제안한다. 본 논문에서는 그래픽 모델링 환경(GME)을 이용해서 비즈니스 도메인을 위한 시스템 아키텍처 프레임워크 모델을 만든다.

  • PDF

A Design and Implementation of Facility Management System Using Portable RFID (이동형 RFID를 이용한 시설물 관리 시스템의 설계 및 구현)

  • Kang, Pil-Gu;Kim, Jae-Hwan;Chae, Jin-Seok;Choi, Won-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.492-505
    • /
    • 2007
  • Currently, most procedures in domestic facility management systems are performed by hand. However, these manually operated facility management systems involve critical limitations, such as a waste of manpower to store collected data into a database, intentional or accidental loss of data consistency (mainly due to a lack of the ability to recognize and deal with frequent changes of facility status in realtime), and so on. To overcome the limitations of such manually operated facility management systems, the following capabilities must be supported. First, the changes in facility status must be recognized in realtime. Second, the data collection process must be secure and reliable to prevent fabrication of collected data and preserve data integrity. Third, the data collection devices must be portable to help the manager collect data about their facilities. To address these problems, we design and implement a novel facility management system using portable RFID, which is designed to support these functionalities and thus help reduce administrative costs. Through extensive experiments, we observed that our system improved the accuracy and reliability of facility check process and helped cut administrative costs by significantly reducing failure frequency.

  • PDF

Design and Implementation of RFID Based u-SCM System for Fiber and Apparel Industry (섬유 및 의류산업의 RFID 기반 u-SCM 시스템의 설계 및 구현)

  • Moon, Il-Whan;Ahn, Jae-Geun;Kim, Sam-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.986-995
    • /
    • 2011
  • Recently, the market of fiber and apparel industry is rapidly changing from producer to consumer oriented. This trend emphasizes the necessity of SCM systems being able to do flexible correspondences to the market changing through synthetically reflecting consumers' various needs and a variety of patterns. However, because traditional SCMs manage their supply chains being based on bar code systems from the production to the distribution, they are suffering from the needs of real time information sharing and have their essential restrictions in the response to the environmental changes of the market and consumers' needs. This paper suggests a new RFID based u-SCM system optimized into the fiber and apparel industry. The proposed system has the benefits that through basing on RPID can collect information of the production and the distribution real time and make better use of it and connect to the legacy systems organically via Web services and rapidly respond to the market changing and consumers' needs. Through implementation, it is demonstrated that the proposed system can effectively facilitate them.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.