• Title/Summary/Keyword: RFID tag and network

Search Result 140, Processing Time 0.027 seconds

Development of Livestock Traceability System Based on Implantable RFID Sensor Tag with MFAN (MFAN/RFID 생체 삽입형 센서 태그 기반 가축 이력 관리 시스템 개발)

  • Won, Yun-Jae;Kim, Young-Han;Lim, Yongseok;Moon, Yeon-Kug;Lim, Seung-Ok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1318-1327
    • /
    • 2012
  • With the recent increased risk of livestock disease spread and human infection, livestock disease control has become very important. Consequently, there has been an increased attention on an implantable real-time monitoring and traceability system for individual cattle. Therefore, we have developed a robust monitoring and traceability system based on an implantable MFAN/RFID sensor tag. Our design combines the MFAN technology that is capable of robust wireless communication within cattle sheds and the 900MHz RFID technology that is capable of wireless communication without battery. In MFAN/RFID implantable sensor tag monitoring system, UHF sensor tag is implanted under the skin and accurately monitors the body temperature and biological changes without being affected by external environment. In order to acquire power needed by the tag, we install a MFAN/RFID tranceiver on the neck of cattle. The MFAN coordinator passes through the MFAN node and the RFID-reader-combined MFAN/RFID transceiver and transmits/receives the data and power for the sensor tag. The data stored in the MFAN coordinator is transmitted via the internet to the livestock history monitoring system, where it is stored and managed. By developing this system, we hope to alleviate the problems related to livestock disease control.

Development of Daily Life Monitori ng System using RFID (RFID를 이용한 일상생활 모니터링 시스템 개발)

  • Jung, Kyung-Kwon;Park, Hyun-Sik;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.49-56
    • /
    • 2009
  • In this paper, we present a daily activity monitoring system by using a wireless sensor network. The proposed system is installed in glove for activity monitoring. The RFID reader, to send data by using sensor network platform and RFID tag are small size, the shape of quadrangle, and operate in the frequency of 13.56 MHz. The sensor node can read RFID tags on the various objects used in daily living such as furniture, medicines, and kitchenwares. The sensor node reads the data of RFID tags, it transmits wireless packets to the sink node. The sink node sends the received packet immediately to a server system. The data from each RFID system is collected into a database, and then the data are processed to visualize the measurement of daily living activities of users. We provide a web-based monitoring system, and can see the number of RFID tag readings per day as bar charts. The result of experiments demonstrates that the way we propose can help to check the situation of life for people who live alone.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Wireless Sensor Network Development using RFID for Agricultural Water Management (농업용수관리를 위한 RFID 기반 무선 센서 네트워크 개발)

  • Nam, Won-Ho;Kim, Tae-Gon;Choi, Jin-Yong;Kim, Jin-Taek;La, Min-Chul
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.53 no.5
    • /
    • pp.43-51
    • /
    • 2011
  • Irrigation facilities are spread over demand area in a low density and exposed in the field requiring efficient operation and maintenance. Thus, it could be more efficient to manage an irrigation system when it is with wireless sensor network (WSN) using RFID (Radio Frequency Identification) application. A WSN, a kind of ubiquitous sensor network composed of wireless network, RFID and database management system was developed for agricultural water management in terms of operational status and maintenance requirements. Identification code for RFID tag was designed and an application for RFID reader was developed for field data collection, and a database management system was constructed for managing irrigation facility attributes. The system was installed in I-dong irrigation districts in Gyounggi-province, Korea and the operated results showed the applicability of the WSN for agricultural water management.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.

Characteristics of Elliptic Fresnel Zone Plate Antenna (메쉬 네트워크를 이용한 RFID 데이터 전송 시스템 구현에 대한 연구)

  • Jo, Heung-Kuk;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.51-53
    • /
    • 2011
  • Data collection and classification of products for factory automation is one of important processes. If conveyor systems corresponding to factory automation have crossroads, a lot of difficulties arise. These issues can be solved by using Zig-Bee technology capable of network configuration. Network with Zig-Bee is configured to coordinators, routers, and end-device. And Zig-Bee for up to 65,536 network formation is possible. In this paper, system to transmit the data of RFID tag to the host PC has been implemented, after connecting multiple EM4095 RFID system to Zig-Bee transmitter/receiver system.

  • PDF

A Location Correction Scheme based on the RFID Tag for Ubiquitous Warehouse Managements (u-창고관리를 위한 RFID 테그 기반의 위치 보정 기법)

  • Roh, Kwi-Yong;Song, Jin-Kook;Jung, Chang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.149-155
    • /
    • 2009
  • The frequency is widely used to measure the distance. In the warehouse, however, the frequency is apt to be interrupted by various unmade stuffs and cannot be easily applied to that kind of environment. This study will suggest the method to localize a worker in the warehouse exactly with calculating the time difference of arrival from the base position to a node or between each node and with 3-points pin pointer. This study will propose the localizing method using RFID tag and analyze the result using the suggested method. Also, the efficiency of suggested method will be increased with the simulation based on the information from the RFID tag.

Error Revision of the Unknown Tag Location in Smart Space (스마트 스페이스에서 미지의 태그 위치 오차 보정)

  • Tak, Myung-Hwan;Jee, Suk-Kun;Joo, Young-Hoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.158-163
    • /
    • 2010
  • In this paper, we propose the location measurement algorithm of unknown tag based on RFID (Radio-Frequency IDentification) by using RSSI (Received Signal Strength Indication) and TDOA (Time Difference of Arrival) and extended Kalman filter in smart space. To do this, first, we recognize the location of unknown tag by using the RSSI and TDOA recognition methods. Second, we set the coordinate of the tag location measured by using trilateration and SX algorithm. But the tag location data measured by this method are included complex environmental error. So, we use the extended Kalman filter in order to revise error data of the tag location. Finally, we validate the applicability of the proposed method though the simulation in a complex environment.

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

A MONITORING METHOD OF PROJECT PROGRESS WITH RFID TECHNOLOGY

  • Soungho Chae ; Naruo Kano
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.491-496
    • /
    • 2005
  • In this paper, the authors explained the overview of a method for detecting location of worker for development of a monitoring system for project progress management using RFID technology. Data is the RSSI (Receive Signal Strength Indication) from RFID tag attached to the worker installing a rolling shutter, and was obtained from antennas and RFID readers set around the construction site. Neural network was done using RSSI collected and the area where worker is performing a task, and an estimation model of the working area was prepared. The network had a range of the percentage of correctly classified from 62% to 92%. The authors suggested the method to make estimate by using integrated networks prepared in respect of RFID readers, and showed the percentage of correctly classified of 84.3%. According to the result, the authors confirmed the possibility of the monitoring system with RFID technology, and mentioned the factors necessary to develop for further practical use.

  • PDF