• Title/Summary/Keyword: RFID networks

Search Result 118, Processing Time 0.028 seconds

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

Design and Implementation of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.74-80
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

A Low Power Consumption 2.4 GHz Transceiver MMIC (저전력소모2.4 GHz 송수신 MMIC)

  • 황인덕
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.5
    • /
    • pp.1-10
    • /
    • 1999
  • A low power concumption 2.4 GHz one-chip transceiver MMIC was designed and fabricated using $1.0\mu\textrm{m}$ ion-implantation MESFET process and packaged on a 24 lead SSOP. In the transmitter mode, it revealed conversion gain of 7.5 dB, output IP3 of -3.5 dBm, and noise figure of 3.9 dB at 2.44 GHz with 3.9 mA current consumption. In the receiver mode, it revealed voltage sensitivity of 6.5 mV/$\mu\$W with 2 .0 mA current consumption. Comparing the fabricated MMIC with the results of MMICs reported elsewhere, it was shown that the fabricated MMIC had good performance. The low power consumption 2.4 GHz transceiver MMIC is expected to be used for various applications such as wireless local area networks, wireless local loops and RFID tags in ISM-band.

  • PDF

Scientific Technical Development of Traffic Accident Investigation (교통사고 조사의 과학화 기술개발)

  • Hong, YouSik;Lee, ChaeWoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.35-42
    • /
    • 2008
  • In order to reduce a recent traffic accident, the traffic accident research has been studied using IT technique. But, when running away traffic accident it occurs, it is difficult to find the assault vehicle. In this paper, to solve these problems, if traffic accident will happen, The RFID reader will be able to recognize a license plate number automatically. Moreover, when the traffic accident occurs from the Internet base which uses the PDA the driver traffic accident site data and driver human fact it will be able to transmit in the police station or the insurance company. From the simulation result, it confirms that when passage vehicle speed is low speed above 70% it will be able to recognize the license plate number.

  • PDF

A Study on the Development of KPI for Measuring Performance of B2B e-Commerce Guarantee Intermediary Service based on RFID (RFID기반 B2B 전자상거래 보증 중계 서비스의 성과관리를 위한 KPI 개발에 관한 연구)

  • Han, Chang-Hee;Kim, Min-Kwan;Kim, Jung-Min;Shin, Yun-Ho
    • Information Systems Review
    • /
    • v.11 no.3
    • /
    • pp.63-82
    • /
    • 2009
  • In B2B e-Commerce(Business to Business Electronic Commerce) market, many companies use B2B e-Commerce Guarantee Service. Guarantee service raised the stability of collect debts for seller, and made purchase fund for buyer. The purpose of this study is development of KPI (Key Performance Index) for measuring performance and improving service quality. Through analysis for 'B2B e-Commerce Guarantee Intermediary Service based on RFID', the study developed KPI and made the case. The study suggests KPI of B2B e-Commerce Guarantee Intermediary Service based on RFID by IT BSC(Balanced Scorecard) model. The process of developing KPI is 4 phase. First phase is connection between service goal and KPI, second phase is make a KPI pool, third phase is development of standard for valuating and selecting index, the last phase is defining and applying of index. This study suggests the standard of measuring performance in B2B e-commerce Guarantee Service and guidelines on revitalization of service in B2B e-commerce industry and the other industry.

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

Optimal Time Structure for Tag Cognizance Scheme based on Framed and Slotted ALOHA in RFID Networks (RFID 망에서 프레임화 및 슬롯화된 ALOHA에 기반한 Tag 인식 방식을 위한 최적 시간 구조)

  • Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.9
    • /
    • pp.29-36
    • /
    • 2010
  • Consider an RFID network configured as a star such that a single reader is surrounded by a crowd of tags. In the RFID network, prior to attaining the information stored at a tag, the reader must cognize the tags while arbitrating a collision among tags' responses. For this purpose, we present a tag cognizance scheme based on framed and slotted ALOHA, which statically provides a number of slots in each frame for the tags to respond. For the evaluation of the cognizance performance, we choose the cognizance completion probability and the expected cognizance completion time as key performance measures. Then, we present a method to numerically calculate the performance measures. Especially, for small numbers of tags, we derive them in a closed form. Next, we formulate a problem to find an optimal time structure which either maximizes the cognizance completion probability under a constraint on the cognizance time or minimizes the expected cognizance completion time. By solving the problem, we finally obtain an optimal number of slots per frame for the tags to respond. From numerical results, we confirm that there exist a finite optimal number of slots for the tags to respond. Also, we observe that the optimal number of slots maximizing the cognizance completion probability tends to approach to the optimal number of slots minimizing the expected cognizance completion time as the constraint on the cognizance time becomes loose.

Ubiquitous Sensor Network based Localization System for Public Guide Robot (서비스 로봇을 위한 유비쿼터스 센서 네트워크 기반 위치 인식 시스템)

  • Choi, Hyoung-Youn;Park, Jin-Joo;Moon, Young-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1920-1926
    • /
    • 2006
  • With social interest, there hie been a lot of research on the Service Robot but now we are faced with the limitation of single platform. The alternative plan is the Ubiquitous-based Service Robot connected with a Ubiquitous network to overcome this limitation. Systems using RFID(Radio frequency Identification) and supersonic waves appeared for functions such as recognition of surroundings through Ubiquitous Sensor Networks. This was applied to the real robot and we have got good results. However, this has several limitations to applying to low power-based Sensor Network For example, if RFID uses a passive Sensor, the rate of recognition with the distance is limited. In case of supersonic waves, high power is required to drive them. Therefore, we intend to develop RSSI position recognition system on the basis of embodying a Sensor Network Module in this thesis. This RSSI position recognition system only measures RSSI of signals from each sensor nod. then converts them into distances and calculates the position. As a result, we can still use low power-based Sensor Network and overcome the limitation according to distance as planning Ad-Hoc Network.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.