• Title/Summary/Keyword: RFID infrastructure

Search Result 73, Processing Time 0.037 seconds

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

Definition of Minimum Performance Requirements for RFID Tags Embedded Inside a Pair of Shoes (신발에 삽입되는 RFID 태그의 최소 성능 요구사항 정의)

  • Kwon, Jongwon;Song, Taeseung;Cho, Wonseo;Kim, Jaeuk
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Radio Frequency Identification(RFID) can provide visibility and efficiency throughout the entire supply chain in fashion apparel and footwear. The technical analysis of RFID performance is necessarily required to create a sealess omni-channel service using customer experience. Especially, several tagged-item performance specifications, for example read range and multi-read rate, strongly depend on the attached material and real-operating environment. This paper suggests minimum performance requirements for RFID tags embedded inside a pair of shoes to negotiate tagged-item performance between retailers and suppliers.

A Study on Construction of Infrastructure for Handicapped Parking Areas Using RFID (RFID를 이용한 장애인전용 주차구역 서브시스템을 위한 기반시설 구축에 관한 연구)

  • Choi, Y.S.;Seong, H.K.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.1
    • /
    • pp.67-72
    • /
    • 2014
  • In this paper, we proposed A Study on Construction of Infrastructure for Handicapped Parking Areas Using RFID. This paper is Construction of the Handicapped Parking Areas infrastructure Using RFID with 900MHz band, and researched the optimal position of the tag attached on the vehicle and the location of RFID reader in order to raise the efficiency of RFID reader and the recognition rate by the handicapped vehicle. The result of research is shown the optimal position of RFID reader establishment when the height of RFID reader is 170cm in height and the angle of $80^{\circ}$ with the ground when the vehicle traveling direction of the antenna and the RFID reader when the surface and the angle of $90^{\circ}$ showed the best position RFID readers installed. Parking spaces for the disabled in accordance with these results the RFID readers installed and it works in conjunction with enforcement camera car tagged crackdown on vehicles and other general management, the system is built to allow handicapped parking spaces that meet the intent of the original purpose being used as expected to contribute significantly.

  • PDF

An RFID Multi-Reader System Development for TCP/IP Based Security Control (TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1587-1592
    • /
    • 2009
  • RFID is Playing a central role in ubiquitous technology according with the advent of the ubiquitous era, and the development of an RFID reader is also emerging as an important technical development field. In this paper, we developed a hardware system which is able to make use of the 13.56MHz RFID infrastructure being used as a transportation card, a credit card, and so on as well as the 125KHz RFID infrastructure being used in security company, and which is applicable to a location identification, an entrance and exit control, and security control over the TCP/IP communication. The existing local RFID methods have some problems which bottlenecks such as administrative problems, technical problems, and so force frequently occur because a casual server is placed and operated in a company. Hence, in this paper we developed an RFID multi reader which is connected to a central administrable server over the TCP/IP in order to solve these problems, and we make it be possible to keep an security control and be easy to install, transfer and administrate RFID infrastructures.

An Integrated RFID Service Management Policy Infromation Model (통합 RFID 서비스 관리 정책 모델)

  • Ahn, Hyung-Jin;Bang, Hyo-Chan;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.177-187
    • /
    • 2009
  • Typical RFID-device applications have provided users to each vendor-specific interface for supporting control and management of RF-tags and readers within their managed domain. Also, typical RFID-business applications have been implemented by using each event-data structure of RF-readers or RFID middlewares. RFID infrastructure managers, thus, are difficult to handle individual control and management specifications for managed RF-tags, devices and systems. Most RFID application services, also, are attached to providing visibility and traceability of an RF-tag item. To solve these problems, this paper proposes an RFID service management policy information model which supports to define unified control and management for heterogeneous RFID devices, middlewares and applications. This paper describes an example procedure that an RFID service management policy definition based on the proposed model is adaptively transformed and executed on a specific RFID sub-infrastructure.

  • PDF

The Design and Implementation of the Directory Service for the utilization of USN (USN 활용을 위한 계층형 서비스 설계 및 구현)

  • Roh, Changbae;Na, Wonshik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2014
  • Connotation and unlimited growth potential as the core infrastructure to implement the u-Korea RFID/USN is emerging to lead to a future Internet that can bring a huge transformation in the industry sector. On RFID/USN increase overall social interest of our country, if the world who want to dominate the market by securing the u-Korea vision and global RFID/USN technologies IT839 depending on the policy, has been active research on the USN and USN infrastructure in the future building is completed as quickly to take advantage of the USN. USN applications will increase. Of USN middleware and necessitate USN infrastructure-based application development in order to more easily USN middleware configuration directory service is one of the core services. USN infrastructure suitable for the directory service when considering the characteristics of WSN, such as the USN components, update existing directory services and search focused on the problem and receive, this paper can overcome this directory service design and implementation discussed.

  • PDF

Improvement of RFID localization performance using transmission power control in RFID tag infrastructure (RFID 태그 인프라에서의 RFID 리더의 송출전력 제어를 통한 위치 추정 성능 향상)

  • Park, Young-Su;Park, Jee-Hoon;Lee, Je-Won;Kim, Sang-Woo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1815-1816
    • /
    • 2008
  • 본 논문에서는 RFID 태그 인프라 혹은 RFID 태그 플로어 상에서 RFID 리더를 이용한 위치추정 시에 RFID리더의 송출전력을 제어하여 위치추정 성능을 향상시키는 방법을 제시한다. 또한 RFID 위치 추정 문제에 대하여 정의하고 이들의 성능을 비교하는 성능 기준 (Performance measure)을 이용하여 송출전력을 제어할 경우와 그렇지 않은 경우의 위치추정 성능을 시뮬레이션과 실험을 통해서 비교한다.

  • PDF

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

A Study on the Industrial SWOT Analysis and Benefits for the Successful RFID Implementation (성공적인 RFID 구현을 위한 산업별 SWOT 분석과 성과에 관한 연구)

  • Chang, Yun-Hee
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.93-122
    • /
    • 2007
  • RFID has fundamental influences on today's business management. This research seeks to formulate the opportunities and challenges, the strengths and weaknesses and the perceived benefits of RFID implementation in three industries: manufacturing, medical-service, and distribution. Ten companies of successful RFID deployment in Korea are presented. Field interview and panel discussion were used to explore the research purpose. The core challenges include RFID readability issues, lack of best practices, increasing prime cost, visible ROI, implementation cost, and employee's resistance. The strengths include IT infrastructure, system integration competency, RFID business model creation ability, executive's support. There is little weakness in Korea companies, there are many perceived benefits in three industries. The most distinctive finding is that the visible ROI was found out in the manufacturing industry, not in the distribution industry. The opportunities and challenges, the strengths and weaknesses and the perceived benefits are some different in three industries, which provide valuable guidance for Korean companies in seeking the RFID opportunities. This case study represents a pioneer research of RFID adoption in Korea.

  • PDF

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.