• Title/Summary/Keyword: RFID tags

Search Result 570, Processing Time 0.023 seconds

EPCglobal Class-1 Gen-2 Anti-collision Algorithm with Tag Number Estimation Scheme (태그 수 추정 기법을 적용한 EPCglobal Class-1 Gen-2 충돌방지 알고리즘)

  • Lim, In-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1133-1138
    • /
    • 2010
  • In the anti-collision scheme proposed by EPCglobal Class-1 Gen-2 standard, the frame size for a query round is determined by Q-algorithm. In the Q-algorithm, the reader calculates a frame size without estimating the number of tags in it's identification range. It uses only the slot status. Therefore, Q-algorithm has advantage that the reader's algorithm is simpler than other algorithms. However, it cannot allocate an optimized frame size because it does not consider the number of tags. Also, the conventional Q-algorithm does not define an optimized parameter value C for adjusting the frame size. In this paper, we propose a modified Q-algorithm and evaluate the performance with computer simulations. The proposed Q-algorithm estimates the number of tags at every query round, and determines the parameter value C based on the estimated number of tags.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF

Design and Implementation of the Security System using RFID and Biometric Information (RFID 및 생체정보를 이용한 보안시스템의 설계 및 구현)

  • Choi, Jae-Kwan;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.251-256
    • /
    • 2010
  • In times past, simple numeric password was the commonly used method in security system. For complement this method, the security system using biometric information is appeared. But it usually uses the scheme to utilize portion of biometric information, and has limited application fields. This biometric security system has low reliability because of some problems such as steal, robbery, and so on. Furthermore, it is associated secondary crime as leaking personal information. For this reason new security system using the unique individual biometric is required. In this paper, we propose the security scheme which used face image and iris analysis. While face image processing for specific person identification, it calculate some feature points of face image and iris's features in our proposed scheme. After person identification applying RFID tags in doorway, several feature information is extracted from camera image, and these compare with registered information of our system for final identification.

A Study on the Establishment of a Aquaculture Farm Facility Management System Using IP-RFID (IP-RFID를 이용한 양식장 시설물 관리시스템 구축방안에 관한 연구)

  • Choi, Hyung-Rim;Park, Byoung-Kwon;Park, Yong-Sung;Lee, Chang-Sup;Choi, Ki-Nam
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.26-27
    • /
    • 2010
  • Illegal aquaculture farms that cause marine pollution and ship accidents are managed and controlled by local organizations, but they experience many difficulties due to the vast waters and insufficient human resources. This study aims to utilize new IP-RFID technology to propose an efficient aquaculture farm facility management system This system attaches Ip-Tags to aquaculture farms that can provide facility information and location in real-time through IP communications. This allows for efficient management of facilities and the restriction of illegal farms. This system can also provide locations of farm facilities that sink to the ocean floor, reducing marine pollution caused by lost farms.

  • PDF

A Time Interval Index for Tracking Trajectories of RFID Tags : SLR-Tree (RFID 태그의 이력 추적을 위한 시간 간격 색인 : SLR-트리)

  • Ryu, Woo-Seok;Ahn, Sung-Woo;Hong, Bong-Hee;Ban, Chae-Hoon;Lee, Se-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.59-69
    • /
    • 2007
  • The trajectory of a tag in RFID system is represented as a interval that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. Whole trajectories of a tag are represented as a set of unconnected interval because the location of the tag which left the vicinity of a reader is unknown until it enters the vicinity of another reader. The problems are that trajectories of a tag are not connected. It takes a long time to find trajectories of a tag because it leads to searching the whole index. To solve this problem, we propose a technique that links two intervals of the tag and an index scheme called SLR-tree. We also propose a sharing technique of link information between two intervals which enhances space utilization of nodes, and propose a split policy that preserves shared-link information. And finally, we evaluate the performance of the proposed index and prove that the index processes history queries efficiently.

Development of tangible language content system based on voice recording (음성녹음 기반의 실감형 어학시스템 콘텐츠 개발)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.234-239
    • /
    • 2013
  • Learning a lesson about poor concentration and problems of the existing content, the system of language which could not be determined, Many teachers' assessment decision was made. As a result, voice recording based on the combination of ubiquitous technology and virtual reality technology, and install the projector in a classroom Through the learning content corresponding grade English student ID card attached RFID reader in each classroom, and students of RFID tags attached. In reality of the virtual three-dimensional image content foreigners and question-and-answer using the voice recording technology at the same time check the pronunciation and intonation level passes or level failure judged. Student education data to a central server system is configured to do so after saving to the DB through a feedback process, which provides information. Analysis of the issues that can have a common language content in the present study and Problem for voice recording technology to solve the problem and did not solve the existing language in the content level based classes.

A Study on the Optimal Train Recognition Ratio Instrumentation based on RFID (RFID기반 철도차량 최적 인식율 측정에 관한 연구)

  • Kang, Min-Soo;Jung, Eu-Bong;Lee, Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.6
    • /
    • pp.633-639
    • /
    • 2007
  • This study proposes an optimal condition to recognize a train using RFID. In order to recognize a moving train, bandwidth, an angle of antenna and the location of a tag should be considered. In this study, a field test was conducted using two different bandwidths (900MHz and 2.45GHz), four angles of antenna(0, 30, 45, and $60^{\circ}$), different velocities (10, 30 and 50km), and three different locations of tags. The field test verified the optimal condition for recognition of a train, The present study convinced that location detection and tracking of rail freight can be monitored in real time. The present technology can be applied to railway signals including detecting and tracking such as EURO Balis.

Performance Improvement of Anti-collision Algorithm for RFID Protocol and Algorithm Comparison (RFID 프로토콜의 충돌방지 알고리즘의 성능 개선과 알고리즘 비교)

  • Lim, Jung-Hyun;Kim, Ji-Yoon;Jwa, Jeong-Woo;Yang, Doo-Yeong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.51-61
    • /
    • 2007
  • In this paper, Air-interface protocols of ISO 18000-6 Types and EPCglobal Classes applied to RFID system in UHF band are analyzed, and those anticollision algorithms are realized. Also, the each algorithm which improves the performance of standard protocol is proposed, and the performance is compared when clock period of link timing is a identical condition on $12.5{\mu}s$. As the result, when 500 tags exist simultaneously inside reader interrogation zone, the tag recognition performance of a standard protocol is better in preceding order of Class-1 Generation-1, Type B, Type A, Class-0 and Class-1 Generation-2. And also the performance of improved protocol is better in ascending order of Type B, Type A, Class-1 Generation-1, Class-0 and Class-1 Generation-2. Therefore, performance of tag recognition remarkably depends on the regulated clock period in the protocol and link timing between a reader and a tag.