• Title/Summary/Keyword: RFID tags

Search Result 571, Processing Time 0.034 seconds

An Anti-Collision Algorithm with 4-Slot in RFID Systems (RFID 시스템에서 4 슬롯을 이용한 충돌방지 알고리즘)

  • Kim, Yong-Hwan;Kim, Sung-Soo;Ryoo, Myung-Chun;Park, Joon-Ho;Chung, Kyung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.111-121
    • /
    • 2014
  • In this paper, we propose tree-based hybrid query tree architecture utilizing time slot. 4-Bit Pattern Slot Allocation(4-SL) has a 8-ary tree structure and when tag ID responses according to query of the reader, it applies a digital coding method, the Manchester code, in order to extract the location and the number of collided bits. Also, this algorithm can recognize multiple Tags by single query using 4 fixed time slots. The architecture allows the reader to identify 8 tags at the same time by responding 4 time slots utilizing the first bit($[prefix+1]^{th}$, F ${\in}$ {'0' or '1'}) and bit pattern from second ~ third bits($[prefix+2]^{th}{\sim}[prefix+3]^{th}$, $B_2{\in}$ {"00" or "11"}, $B_1{\in}$ {"01" or "10"}) in tag ID. we analyze worst case of the number of query nodes(prefix) in algorithm to extract delay time for recognizing multiple tags. The identification delay time of the proposed algorithm was based on the number of query-responses and query bits, and was calculated by each algorithm.

Implementation & Verification of RFID Gen2 Protocol on FPGA Prototyping board (FPGA를 이용한 RFID Gen2 protocol의 구현 및 검증)

  • Je, Young-Dai;Kim, Jae-Lim;Jang, Il-Su;Yang, Hoon-Gee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.869-872
    • /
    • 2008
  • This paper presents the VHDL implementation procedure of the passive RFID tag in Ultra High Frequency RFID system. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation on prototyping board. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of the interrogation rate. Also with UART communication, verify a inventory Round in Gen2 Protocol. The verification results with the fastest data rate, 640kbps, and multi tags environment scenario show that the implemented tag spend 1.4ms transmitting the 96bits EPC to reader.

  • PDF

An Interval Data Model for Tracing RFID Tag Objects (RFID 태그 객체의 위치 추적을 위한 구간 데이터 모델)

  • Ban, Chae-Hoon;Hong, Bong-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.578-581
    • /
    • 2007
  • For tracing tag locations, a trajectories should be modeled and indexed in radio frequency identification (RFID) systems. The trajectory of a tag can be represented as a line that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. If a tag enters but does not leave a reader, its trajectory is represented only as a point captured at entry. Because the information that the tag stays in the reader is missing from the trajectory represented only as a point, we should extend the region of a query to find the tag that remains in a reader. In this paper, we propose an interval data model of tag's trajectory in order to solve the problem. Trajectories of tags are represented as two kinds of intervals; dynamic intervals which are time-dependent lines and static intervals which are fixed lines. We also show that the interval data model has better performance than others with a cost model

  • PDF

Development Portable Pipe Spool Location-Confirm System Based UHF RFID (UHF RFID기반 이동형 파이프 스풀 위치 인식 시스템 개발)

  • Kim, Jinsuk;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.329-336
    • /
    • 2014
  • Pipe spool is the most important element of plant equipment in plant construction site. Currently, the plant construction site manage the pipe spool location and usage history by handwriting. Frequently, the pipe spool is moved to unpredictable places by field workers in many construction sites and in cases like this, the pipe stool is replaced with another similar pipe spool. Since it's hard to determine the exact location of some of the pipe spools, it takes unnecessary time and labour to find the missing pipe spools, which proves that stock management is not under control. The purpose of our system is to make the identification of real-time location of the field pipes possible by attaching UHF RFID tags to the pipe spool, which will be used to connect with UHF RFID reader and antenna on vehicles. A field test conducted by the proposed system resulted in the success rate of 98% and the missing 2% was recuperated by hands-on correction, which proved that stock management through the proposed method can be 100% effective. The proposed system is expected to reduce labour costs and make stock control of assets possible, as well as applicable to similar stock management environments.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

A Web-based System for Real-time Monitoring of Dangerous Objects using RFID (RFID를 이용한 웹 기반의 실시간 위험물 모니터링 시스템 구축 사례)

  • Kim, Ju-Il;Lee, Woo-Jin;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.101-115
    • /
    • 2008
  • Recently in the human society, the crime using small arms has increased. Also, many accidents happen because of incomplete management of chemicals and radiation. Accordingly, it is necessary to manage dangerous objects by tracing the position of dangerous objects and rapidly providing the correct information for them. This paper presents a web-based system for real-time monitoring of dangerous objects using RFID in order to overcome the limitations and problems of current dangerous objects management techniques. In this paper, we define the architecture for web-based dangerous objects monitoring system and the scheme for storing information of a dangerous object in the RFID tag. We also implement the web-based monitoring system and present the execution result of the system. The proposed real-time monitoring system is composed of the dangerous objects monitoring server which manages information of dangerous objects and controls them, the dangerous objects monitoring middleware which is mediator between dangerous objects and the server, the RFID reader which reads information of dangerous objects from RFID tags attached to the objects and the database which stores information, status and position of dangerous object. The proposed system manages diverse dangerous objects such as small arms, radiation and harmful chemicals based on the position of them using RFID, so the user can check dangerous objects when they are checked in and checked out and the user can acquire the real-time position information of them through the system. Furthermore, the user can visually monitor dangerous objects through web browser from any where and at any time because the system is web-based system and it provides graphical user interface.

  • PDF

A Wireless Identification System Using an Efficient Antenna Based on Passive Surface Acoustic Wave(SAW) Devices

  • Chang, Ki-Hun;Lee, Woo-Sung;Yoon, Young-Joong;Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.1
    • /
    • pp.12-16
    • /
    • 2007
  • A UHF band wireless identification system based on passive surface acoustic wave(SAW) devices is presented in this paper. SAW ID tags were fabricated on Y-Z $LiNbO_3$ piezoelectric substrate with a good electro-mechanical coupling property. To reduce degradation of the antenna performance associated with the piezoelectric materials, an efficient design of the SAW RFID antenna is introduced. By measuring the parameters of the SAW ID tag, the performance of the antenna was tested by experimentation.

An Improvement of Bin-slotted Anti-collision Algorithm for Ubiquitous ID System

  • Kim Ji-Yoon;Kang Bong-Soo;Yang Doo-Yeong
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.34-38
    • /
    • 2006
  • In this paper, an overview of anti-collision algorithm for RFID system of a standard EPC Class1 protocol is presented, and the binslotted dynamic search algorithm (BDS) based upon the slotted ALOHA and binary tree procedure is proposed and analyzed. Also, the performance is evaluated as comparing the BDS algorithm with the standard bin-slotted algorithm (BSA) through the simulation program. The performance of the proposed BDS algorithm is improved by dynamically identifying the collided-bit position and the collided bins stored in the stack of the reader. As the results, the number of request command that a reader send to tags in the reader s interrogation zone and the total recognition time are decreased to 59% as compared with BSA algorithm. Therefore, the tag identification performance is fairly improved by resolving a collision problem using the proposed BDS algorithm.

  • PDF

The SAFE Management System Model Based on Context Automatic Awareness

  • Han, Kook-Hee;Liu, Yiwen;Kwon, Young-Jik;Kang, Byeong-Do
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.4
    • /
    • pp.55-64
    • /
    • 2007
  • Aiming at solving the problems associated with existing wireless paging systems, this paper proposed a 4W1H+L+PI concept to context-aware information structure, based on which, a new wireless paging system named 119 system is developed under ubiquitous environment. Bemuse of the adoption of RFID tags in the wireless paging system, hazard and malfunction rates are reduced, thus accuracy is guaranteed. Besides, response time is shortened comparing with existing systems. In the future, if emergency aid information system can be implemented under the ubiquitous computing environment combined with sensor network, then aid service of good quality will be provided.

  • PDF

Accelerating RFID Tag Identification Processes with Frame Size Constraint Relaxation

  • Park, Young-Jae;Kim, Young-Beom
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.242-247
    • /
    • 2012
  • In the determination of suitable frame sizes associated with dynamic framed slotted Aloha used in radio frequency identification tag identification processes, the widely imposed constraint $L=2^Q$ often yields inappropriate values deviating far from the optimal values, while a straightforward use of the estimated optimal frame sizes causes frequent restarts of read procedures, both resulting in long identification delays. Taking a trade-off, in this paper, we propose a new method for determining effective frame sizes where the effective frame size changes in a multiple of a predetermined step size, namely ${\Delta}$. Through computer simulations, we show that the proposed scheme works fairly well in terms of identification delay.