• Title/Summary/Keyword: RFID Systems

Search Result 758, Processing Time 0.021 seconds

A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification

  • Jia, Xiaolin;Feng, Yuhao;Gu, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1460-1478
    • /
    • 2020
  • This paper proposes a novel anti-collision protocol for large-scale RFID tags identification, named Bi-response Collision Tree Protocol (BCT). In BCT, two group of tags answer the reader's same query in two response-cycles respectively and independently according to the bi-response pattern. BCT improves the RFID tag identification performance significantly by decreasing the query cycles and the bits transmitted by the reader and tags during the identification. Computation and simulation results indicate that BCT improves the RFID tag identification performance effectively, e.g. the tag identification speed is improved more than 13.0%, 16.9%, and 22.9% compared to that of Collision Tree Protocol (CT), M-ary Collision Tree Protocol (MCT), and Dual Prefix Probe Scheme (DPPS) respectively when tags IDs are distributed uniformly.

RFID 적용 PL법 대응 시스템 구축 방안 연구 - 전기.전자 산업을 중심으로 -

  • Kim, Jin-Su;Kim, Dae-Jin;Lee, Hak-Su;Han, Jeong-Hun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.1096-1103
    • /
    • 2008
  • 2002년 소비자 보호 및 기업의 제품 역량 강화를 위해 대두된 제조물 책임법으로 제품에 대한 소비자의 관심이 증대되고 제품 결함에 대한 기업의 책임이 강화되고 있다. 본 연구에서는 전기 전자 산업에서 제조물 결함에 의해 나타나는 기업 및 소비자의 손해 배상에 대한 분석과 제품 흐름별 PL법 사례를 제시한다. 또한, 신속한 기업 PL 예방과 대응을 위한 RFID 적용 전, 후 PL법 대응 프로세스 분석을 통해 RFID 적용 PL법 대응 방향을 제시한다. 더불어, PL법 대응 시스템 설계 시 접근 방향과 제품 라이프 사이클에서 제시되는 데이터 흐름 및 상세적용 정보를 제시하여 효과적인 PL법 대응 프로세스 구축 방향을 제시하고, 전기 전자 산업 사례 적용을 통하여 전기 전자 산업의 PL법 대응 프로세스 및 핵심 정보를 제시하고자 한다.

  • PDF

Mobile Robot System Design for RFID-based Inventory Checking (RFID 기반 재고조사용 이동로봇 시스템의 설계)

  • Son, Min-Hyuk;Do, Yong-Tae
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.1
    • /
    • pp.49-57
    • /
    • 2011
  • In many industries, the accurate and quick checking of goods in storage is of great importance. Most today's inventory checking is based on bar code scanning, but the relative position between a bar code and an optical scanner should be maintained in close distance and proper angle for the successful scanning. This requirement makes it difficult to fully automate the inventory information/control systems. The use of RFID technology can be a solution for overcoming this problem. The mobile robot presented in this paper is equipped with an RFID tag scanning system, that automates the otherwise manual or semi-automatic inventory checking process. We designed the robot system in a quite practical approach, and the developed system is close to the commercialization stage. In our experiments, the robot could collect information of goods stacked on shelves autonomously without any failure and maintain corresponding database while it navigated predefined paths between the shelves using vision.

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol (RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

Data Reduction Method in Massive Data Sets

  • Namo, Gecynth Torre;Yun, Hong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.35-40
    • /
    • 2009
  • Many researchers strive to research on ways on how to improve the performance of RFID system and many papers were written to solve one of the major drawbacks of potent technology related with data management. As RFID system captures billions of data, problems arising from dirty data and large volume of data causes uproar in the RFID community those researchers are finding ways on how to address this issue. Especially, effective data management is important to manage large volume of data. Data reduction techniques in attempts to address the issues on data are also presented in this paper. This paper introduces readers to a new data reduction algorithm that might be an alternative to reduce data in RFID Systems. A process on how to extract data from the reduced database is also presented. Performance study is conducted to analyze the new data reduction algorithm. Our performance analysis shows the utility and feasibility of our categorization reduction algorithms.

Technology Trend of Active RFID-Based Real-Time Locating Systems (능동형 RFID 기반 실시간 위치추적 기술 동향)

  • Cha, J.S.;Myong, S.I.;Lee, H.S.;Chae, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.5
    • /
    • pp.87-97
    • /
    • 2009
  • 위치정보 제공 서비스는 이동통신 기술의 급속한 발전과 함께 무선통신 기술을 활용한 다양한 측위 기술들을 통해 그 서비스가 이루어져 왔다. 이들 중에서 특히 능동형 RFID에 기반한 실시간 위치추적 시스템(RTLS)은 자산이나 사람들의 위치를 실시간으로 추적할 수 있는 자동화된 시스템이란 것이 입증되면서, 최근 들어 괄목할 만한 주목을 받고 있을 뿐만 아니라 의료, 군수, 항만, 물류 및 제조 등과 같은 다양한 분야로 그 도입이 활성화되고 있는 추세이다. 따라서 본 고에서는 능동형 RFID에 기반한 실시간 위치추적 시스템에 대한 기술 개발 및 관련 표준화 동향을 살펴보도록 한다. 아울러 이를 기반으로, 향후 RTLS의 발전 방향을 전망해 보도록 한다.

An Efficient Hybrid Anti-collision Method in RFID systems (RFID 시스템에서 Hybrid 방식을 이용한 효율적인 충돌 회피 기법)

  • Shin, Song-Yong;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1619-1624
    • /
    • 2012
  • If multiple Tags in the RFID System transmit their IDs to the Reader at the same time, tag identification time is delayed due to collisions. Therefore, to reduce the reader's identification time, an efficient anti-collision technology is needed. In this paper, we propose a hybrid anti-collision method based on the QT and DFSA. Then, the performances of proposed method are compared with the existing method through extensive simulations.

Interference Issuses of Radio Frequency Identification Devices in Magnetic Resonance Imaging Systems and Computed Tomography Scan

  • Periyasamy, M.;Dhanasekaran, R.
    • Journal of Magnetics
    • /
    • v.20 no.3
    • /
    • pp.295-301
    • /
    • 2015
  • We evaluated certain issues related to magnetic resonance imaging (MRI) coupled with the use of active 2.5 GHz radio frequency identification (RFID) tags for patient identification using low field (0.3 T) MRI and computed tomography (CT) scans. We also investigated the performance of the RFID reader located outside the MRI room by considering several factors. A total of ten active RFID tags were exposed to several MRI sequences and X-rays of CT scan. We found that only card type active RFID tags are suitable for patient identification purpose in MRI environment and both wristbands as well as card tags were suitable for the same in CT environment. Severe artifacts were found in the captured MRI and CT images when the area of the imaging was in proximity to the tags. No external factors affected the performance of active RFID reader stationed outside the MRI scan room.

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF

A Analysis on system performance by initial number of Tag in RFID Systems (RFID 시스템에서 초기 태그 수가 시스템 성능에 미치는 영향 분석)

  • Yang, Seong-Ryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.17-20
    • /
    • 2012
  • In the RFID system, A collision occurs when the multiple tags transmit at the concurrent in slot. Reduce conflicts, in order to maximize the efficiency of the system, the number of tags with the same number of slots are allocated. the number of slots to the next frame determined by the number of contention tags. In this paper, it estimate the number of tags based on the DFSA. Analyzed the performance of the system by the initial set number of tags through simulation.

  • PDF