• Title/Summary/Keyword: RFID Systems

Search Result 758, Processing Time 0.024 seconds

A Methodological Model for Effective RFID System Development (효과적인 RIFD시스템 구축을 위한 방법론적 모형 개발)

  • Youm, Se-Kyoung;Lee, Yong-Han;Kim, Hoon-Tae;Rhee, Jong-Tae;Cho, Sung-Ku
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.34 no.4
    • /
    • pp.433-444
    • /
    • 2008
  • With development of RFID technology, medicine and national defense as well as logistics and distribution industries have tried to adopt RFID system. Small projects as well as large national projects have planned to adopt the new technology. However, a lot of companies that have promoted a RFID-based project have confronted many problems due to a lack of information about demonstration projects and absence of systematic guideline. Therefore, it's urgent to develop a practical and useful guideline for companies that have considered to adopt the RFID system. In this paper, a practical framework to adopt RFID system is suggested by five phases : establishment of project plan, analysis of objectives, selection of equipments, development/installation, and operation/post management phases. Besides, a detail method by each stages is also given. A systematic RFID system adoption procedure has been defined through an analysis on demonstrated projects and interview with an expert and the adoption method by stage has been suggested. The purpose of this paper is to minimize the entry barriers by suggesting a practical RFID adoption procedure.

A Empirical Study on the Adoption of RFID Systems in the Food Industry's E2E Process - Focusing on the Methodology on the Tag Attachment via BMT - (식품산업의 E2E 프로세스상에서 RFID 시스템 적용방안에 관한 실증 연구 - BMT(Bench Mark Test)를 통한 태그 부착 방안을 중심으로-)

  • Shin, Hwa-Sung;Min, Cheon-Hong
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.149-158
    • /
    • 2009
  • Although current RFID technologies can provide wide advantages in food industry area, most food companies do not consider willingly adopting this technology yet. This paper will present how the effective implementation of RFID systems in food industry could be realized. To Measure the importance of RFID systems, this study utilized the BMT(Bench Mark Test) methodology using RFID systems that were composed of tag and reader. After conducting this study, it suggests the effective tag attachment methods on the objects. The results are shown that the excellent tag product is a RFCamp and a fixed reader of Thingmagic Mercury 4 is the best product. Also, a portable reader of Motorola MC9090-RFID is recommend to the highest product. Therefore, this test is useful for selecting the best RFID systems to the food industry area. In addition, this study displays the effective tag attachment method to each bottle that was used to the experiments in food industry. Therefore, this study is contributed to the not only importance in the government IT areas as a growth engine but also the importance for consumer as a right for the knowledge about the food quality.

  • PDF

A Design and Implementation of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 설계 및 구현)

  • Hong, Yeon-Mi;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.648-655
    • /
    • 2007
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification sensor network, home network, telematics and so on. Especially, RFID middleware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middleware systems that process RFID tag data efficiently.

A Survey of RFID Deployment and Security Issues

  • Grover, Amit;Berghel, Hal
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.561-580
    • /
    • 2011
  • This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.

Development of RFID systems with integrated location data for efficient logistics information systems (효율적인 물류정보관리를 위한 위치정보 통합형 RFID 시스템의 개발)

  • Oh Won-Geun;Park Sang-Hyun;Lim Dong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1295-1300
    • /
    • 2006
  • In this paper, we have developed RFID systems with integrated tag location data for efficient logistics information systems. These are consist of RFID readers with GPS module and RFID networks to service tag location data. The developed RFID readers can get location informations Of the tags, transfer them high speed by TCP/IP protocols, and operate as web servers. And we presented a simple service network system based on EPC network to service both location and tag data. The proposed system can be applicable to tracebility or finding locations of the products.

An Empirical Study of Relationships among IT Capability, Trust, and Attitude on RFID Adoption in Korea

  • Lim, Se-Hun;Kim, Soh-Young;Kim, Jin-Soo
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.99-109
    • /
    • 2009
  • Recently, many enterprises are interest in implementing Radio Frequency IDentification (RFID). However, they have some difficulty in implementing RFID because of incompleteness of RFID technology and uncertainty of Return on Investment (ROI). Even though usefulness of RFID are recognized, many enterprises are just interested in planning of RFID rather than implementation of RFID. Among successful factors of RFID implementation, Information Technology (IT) capability is the most important one. If enterprises have systematic IT capability, it would make positive attitude to implement RFID. In addition, it will provide trust about RFID and promote adoption of RFID implementation. This study, therefore, empirically analyzed the relationships of trust, attitude, IT capability, and intention to RFID adoption using Partial Least Squares (PLS) approach. The result show useful guidelines and practical implication in implementing RFID.

  • PDF

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

SwiftQ: A Time-Efficient RFID Collision Arbitration Algorithm for Gen2-Based RFID Systems

  • Donghwan Lee;Wonjun Lee
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.307-316
    • /
    • 2024
  • In the realm of large-scale identification deployments, the EPCglobal Class-1 Generation-2 (Gen2) standard serves as a cornerstone, facilitating rapid processing of numerous passive RFID tags. The Q-Algorithm has garnered considerable attention for its potential to markedly enhance the efficiency of Gen2-based RFID systems with minimal adjustments. This paper introduces a groundbreaking iteration of the Q-Algorithm, termed Time-Efficient Q-Algorithm (SwiftQ), specifically designed to push the boundaries of time efficiency within Gen2-based RFID systems. Through exhaustive simulations, our study substantiates that SwiftQ outperforms existing algorithms by a significant margin, demonstrating exceptional expediency that positions it as a formidable contender in the landscape of large-scale identification environments. By prioritizing time efficiency, SwiftQ offers a promising solution to meet the escalating demands of contemporary Internet of Things applications, underscoring its potential to catalyze advancements in RFID technology for diverse industrial and logistical contexts.

ID management technology on RFID system (RFID에서 ID 관리 기술)

  • Lee, Chang-Yeol
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.409-412
    • /
    • 2005
  • RFID 시스템은 태그, 리더, 그리고 RFID를 관리하는 S/W 시스템으로 구성되고 있다. RFID태그에 기록하는 정보는 RFID 태그를 분류하는 클라스에 따라 다르지만, 모든 RFID태그는 국제적 표준에 따른 ID 체계를 갖추고, 운영을 하여야 한다. 여기서는 국제적 RFID용 ID표준을 살펴보고, ISO15459에 따른 ID 관리 시스템이 갖추어야 할 구조적 특징에 대하여 연구하기로 한다.

  • PDF

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF