• Title/Summary/Keyword: RFID networks

Search Result 118, Processing Time 0.028 seconds

Analyses of Security Issues and Requirements for RFID System and Its Application

  • Kim, Jung-Te
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.335-339
    • /
    • 2009
  • RFID security and privacy issues have been intensively studied in the research field, the authentication between RFID reader and tag is the fundamental them. Most of the existing authentication protocols draw assumptions on classic primitives. Since tags have small capacities, the security mechanisms which are in use in computer networks and communication are not suitable. In this paper, we compare and analyze recent technical research on the problems of privacy and security. It consists of security mechanism, threats and performance evaluation, etc.

A Study on Reader and Tag Sensing Rate of Location Detection Using RFID (RFID를 이용한 이동체의 위치 결정에서 리더 태그간 인식율 연구)

  • Jeon, Sung-Hee
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.33-34
    • /
    • 2007
  • LBS has many issues of wireless sensor networks and mobile communication parts. Location tracking or location sensing will be the opening of ubiquitous society's a big challenge and the beginning of infinite ubiquitous society's a chance. The purpose of this paper is study of sensing rate per reader antenna's placement and tag location and placement using RFID as location reference point with many advantages for location detection.

  • PDF

Design of Mobile Telemedicine System using RFID based on Embedded Linux (임베디드 리눅스 환경에서 RFID 기반의 Mobile Telemedicine System 구현)

  • Yun, Chan-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.479-482
    • /
    • 2006
  • Mobile Telemedicine uses common technologies that provide a conduit for information exchange between physicians nurses and patients. In addition to patient records, medical professionals will obtain vital signs and other reference data through Ubiquitous Sensor networks(USN). In this paper about a design and implementation of RFID reader platform that received RFID tag information from patients tags, transmit the data to SBC(Single board computer) based on Intel PXA255 ARM CPU and SBC transmit the data to MySQL server in hospital using by Wireless Internet. his system that based on Embedded Linux is composed of RFID module, ARM processor, RS-232 interface, and Wireless LAN. This paper also provides a brief overview and concept of RFID reader, and proposes the design and implementations of the RFID reader platform used QT and MySQL based on Embedded Linux.

  • PDF

ISO/IEC 18000-7 433MHz Active RFID System-based on Multi-hop Relay System for Coverage Extension (ISO/IEC 18000-7 433MHz 능동형 RFID 시스템 기반의 인식거리 향상을 위한 멀티홉 릴레이 시스템)

  • Hong, Sung-Hyun;Song, In-Chan;Zhang, Hong;Chang, Kyung-Hi;Shin, Dong-Beom;Lee, Heyung-Sub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5A
    • /
    • pp.372-380
    • /
    • 2009
  • In this paper, we analyze the active RFID systems ISO/IEC 18000-7 and ISO/IEC 18000-4. In order to improve the coverage in sensor networks, which consist active RFID tag, we propose RFID multi-hop relay system using active RFID relay tag. To compare the performance between the existing ISO/IEC 18000-7 system and the proposed RFID multi-hop relay system, we introduce new system efficiency measure and sensitivity-based measure of achieved coverage. Also, we analyze the performance of the proposed system and compare it with that of the existing system through MCL (Minimum Coupling Loss) analysis and SLS (System Level Simulation) analysis.

An Service Execution Model based on Service Session for Mobile RFID Networks (모바일 RFID 네트워크에서 세션기반 서비스 실행 모델)

  • Han, Min-Kyu;Hong, Jin-Pyo;Sohn, Sang-Mok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.196-201
    • /
    • 2008
  • 국내에서 추진하고 있는 모바일 RFID 네트워크 서비스는 국외에서 진행하는 단순 물품의 정보에 한정되는 RFID 서비스보다 진보된 서비스이다. 이는 단순히 사물에 대한 정보 서비스가 아니라 핸드폰을 가지고 있는 사람은 모두 대상이 되는 확장성 있는 서비스를 요구한다. 이에 따라 단순 물품에 한정되는 서비스 모델은 모바일 RFID 네트워크 서비스 모델로써 사용될 수 없으며, 개인화된 정보제공을 위한 서비스 모델이 필요하다. 이에 본 논문에서는 모바일 RFID 네트워크에서 핸드폰에 RFID 태그와 리더가 장착된 환경을 가정하여 개인화된 정보제공을 위한 서비스 모델에 따라 서비스에 대한 구성과 그 실행 모델을 제시한다.

  • PDF

A Study of ID resolution technologies in REID System (RFID 시스뎀에서 ID 변환 기술 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1224-1230
    • /
    • 2006
  • ID registered in RFID tag is written as a binary or code form and interpreted by RF reader. It must be changed to FQDN structure for the internet service. FQDN(Fully Qualified Domain Name) form also must be resolved during the several steps in the application service networks. In this paper, we studied the technical issues and proposed the resolution mechanism fur the sample ID system. As a sample ID, we applied ISBN to RFID system.

  • PDF

A MONITORING METHOD OF PROJECT PROGRESS WITH RFID TECHNOLOGY

  • Soungho Chae ; Naruo Kano
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.491-496
    • /
    • 2005
  • In this paper, the authors explained the overview of a method for detecting location of worker for development of a monitoring system for project progress management using RFID technology. Data is the RSSI (Receive Signal Strength Indication) from RFID tag attached to the worker installing a rolling shutter, and was obtained from antennas and RFID readers set around the construction site. Neural network was done using RSSI collected and the area where worker is performing a task, and an estimation model of the working area was prepared. The network had a range of the percentage of correctly classified from 62% to 92%. The authors suggested the method to make estimate by using integrated networks prepared in respect of RFID readers, and showed the percentage of correctly classified of 84.3%. According to the result, the authors confirmed the possibility of the monitoring system with RFID technology, and mentioned the factors necessary to develop for further practical use.

  • PDF

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

RFID Applications from 2005 to 2010 (2005년부터 2010년 사이의 RFID 기술 적용 현황)

  • Sheen, Dong-Mok;Choi, Sung-Hee;Lee, Gong-Seop
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.4
    • /
    • pp.86-93
    • /
    • 2010
  • RFID has been used as an identification tool that substitutes for bar codes. Its areas of application are increasing due to its suitability in ubiquitous environment. In this paper, first, we review various aspects of RFID, including standards, characteristics, and relationships with wireless sensor networks. Then, we review the technical aspects of RFID and its areas of application, e.g., supply chain management (SCM) and manufacturing since 2005. SCM, in which RFIDs can shorten lead time and ensure the quality of products, is one of the most active application areas. Manufacturing is a relatively new area for RFID applications, but it is believed that it can enhance the productivity and the reliability of the products. Also, the authors suggest research issues and limitations of RFID, as well as possible application areas related to marine engineering.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.