• Title/Summary/Keyword: RFID standard

Search Result 233, Processing Time 0.021 seconds

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF

A Study on Performance Enhancement of RFID Anti-Collision Protocols (RFID 충돌방지 프로토콜의 성능 개선에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.281-285
    • /
    • 2011
  • One of the key issues in implementing RFID systems is to design anti-collision protocols for identifying all the tags in the interrogation zone of a RFID reader with the minimum identification delay. In this paper, Furthermore, in designing such protocols, the limited resources in tags and readers in terms of memory and computing capability should be fully taken into consideration. we first investigate two typical RFID anti-collision algorithms, namely RFID Gen2 Q algorithm (accepted as the worldwide standard in industrial domain) and FAFQ algorithm including their drawbacks and propose a new RFID anti-collision algorithm, which can improve the performance of RFID systems in terms of tag identification time considerably. Further, we compared performance of the proposed algorithm with Q algorithm and FAFQ algorithm through computer simulation.

Improved Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader (개선된 수동형 RFID 보안태그와 리더의 인증 및 데이터 보호 프로토콜)

  • Yang, Yeon-Hyun;Kim, Sun-Young;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.85-94
    • /
    • 2010
  • As an automatic identification technology, in which electronic tags are attached to items and system auto-identifies informations of the items using wireless communication technology, use of RFID system is increasing in various fields. According to that, related security problems are becoming important issue. Up to now, many authentication protocols have been proposed to solve security problem of RFID system. In this paper, We show that the RFID authentication protocols in [9, 10], which are compatible with Type C RFID system in ISO 18000-6 Amd1[8], are vulnerable to a spoofing attack. In addition, we propose improved protocols having small additional cost over the original protocols.

Design and Implementation of UHF RFID Reader System Supporting Sensor Data Processing (센서 데이터 처리를 지원하는 UHF RFID 리더 시스템의 설계 및 구현)

  • Shin, Dong-Beom;Lee, Heyung-Sub;Choi, Gil-Young;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.925-932
    • /
    • 2009
  • Precise temperature monitoring is the major preconditioning to supervise quality losses within the transport chain for fresh products. ISO/IEC18000-6REV1 defines new protocols supporting BAP(Battery Assisted Passive) RFID tag which is completely compatible with EPCglobal Class1 Generation2 specification. In this paper, we designed a modem supporting BAP RFID tag with FPGA(Field Programmable Gate Array) and implemented sensor data processing function defined in ISO/IEC18000-6REV1. The transmit block of the modem supports pulse shaping filter and the output signal of the implemented RFID reader is satisfied with the spectrum mask defined in the standard. The receive block of the modem uses Gardner TED to synchronize timing of symbol. In this paper, we designed a modem supporting ISO/IEC18000-6REV1 standard and developed a RFID reader sndard. The developed RFID reader sndard can recognize sensor tag and passive tag in the wireless environment and supports real-time processing of the sensor data in the embedded linux platform.

Dual-Radio Tag System for RFID Tag Mesh Networking (RFID 태그간 메쉬 네트워킹을 위한 듀얼 라디오 태그 시스템)

  • Kim, Jin-Hwan;Yoo, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1272-1282
    • /
    • 2009
  • This paper consists of two parts: the protocol for tag-to-tag mesh network and the implementation of dual-radio RFID system. Recently, RFID has been adopted in ports or warehouse, being attached to containers and palettes for loading/unloading automation. However, the RFID system has encountered one problem - some tags cannot receive any command from reader intermittently due to signal interference by containers or field equipments (e. g. cranes and yard tractors). This area where reader signal cannot reach is called dead-zone. The proposed method for solving the dead-zone problem is as follows. A zone which can be communicated directly between readers and tags communicates in 433MHz frequency band in compliance with ISO/IEC 18000-7 standard. On the other hand, dead-zone communicates in 2.4GHz frequency band by using tag-to-tag mesh network in compliance with IEEE 802.15.4 standard. The proposed method can not only save much cost to install additional readers but also help resolve the dead-zone problem. Furthermore, it can provide the easier, faster, and more economical network infrastructure.

Low-cost AES Implementation for RFID tags (RFID 태그를 위한 초소형 AES 연산기의 구현)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Yang, Sang-Woon;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.67-77
    • /
    • 2006
  • Radio Frequency IDentification (RFID) will soon become an important technology in various industries. Therefore, security mechanisms for Rm systems are emerging crucial problems in RFID systems. In order to guarantee privacy and security, it is desirable to encrypt the transferred data with a strong crypto algorithm. In this paper, we present the ultra-light weight Advanced Encryption Standard (AES) processor which is suitable for RFID tags. The AES processor requires only 3,992 logic gates and is capable of both 128-bit encryption and decryption. The processor takes 446 clock cycles for encryption of a 128-bit data and 607 clock cycles for decryption. Therefore, it shows 55% improved result in encryption and 40% in decryption from previous cases.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

Simplified Tag Collection Algorithm for Improving Performance of Active RFID System (능동형 RFID 시스템의 성능 개선을 위한 간소화된 태그 수집 알고리즘)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.731-736
    • /
    • 2017
  • In this paper, we propose a simplified tag collection algorithm to improve the performances of ISO/IEC 18000-7, which is a standard for an active RFID system. The proposed algorithm modifies the collection command that enables to start a tag collection round. The modified collection command includes the results of the listen period response for the previous collection round. Tags that receive the collection command check the collision status for their responses. If there is no collision, tags transmit their additional data and go into the sleep mode without the point-to-point read command and sleep command. A collection round for the standard consists of a collection command and response, a read command and response, and sleep command. On the other hand, in the proposed algorithm, a collection round consists of a collection command and response. The simulation results showed that the proposed algorithm can improve the identification delay about 16% compared with the standard when the number of tags are 300.

UHF/HF Dual-Band Integrated Mobile RFID/NFC Linkage Method for Mobile Device-based Business Application (휴대단말 기반의 비즈니스 응용을 위한 UHF/HF 듀얼밴드 통합 모바일 RFID와 NFC의 연동 방안)

  • Park, Namje
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.841-851
    • /
    • 2013
  • Mobile RFID/NFC linkage technology means a provision of integrated 2 existing mobile RFID services by developing the 900MHz mobile RFID reader and the NFC reader/tag into one SoC to be put on a USIM card. In this paper, the mobile RFID related technologies that offer similar services as NFC were also analyzed to understand the potential linkage to NFC and the requirements for the linkage. In addition, the introduction of dual tag and the code system linkage suggested a linking method to maximally use the existing infrastructure and the requirement satisfaction was analyzed. Lastly, based on the analysis, the future direction for the new standard design was suggested.