• Title/Summary/Keyword: RFID tags

Search Result 570, Processing Time 0.025 seconds

Randomized Scheme for Cognizing Tags in RFID Networks and Its Optimization

  • Choi, Cheon Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1674-1692
    • /
    • 2018
  • An RFID network is a network in which a reader inquire about the identities of tags and tags respond with their identities to a reader. The diversity of RFID networks has brought about many applications including an inexpensive system where a single reader supports a small number of tags. Such a system needs a tag cognizance scheme that is able to arbitrate among contending tags as well as is simple enough. In this paper, confining our attention to a clan of simple schemes, we propose a randomized scheme with aiming at enhancing the tag cognizance rate than a conventional scheme. Then, we derive an exact expression for the cognizance rate attained by the randomized scheme. Unfortunately, the exact expression is not so tractable as to optimize the randomized scheme. As an alternative way, we develop an upper bound on the tag cognizance rate. In a closed form, we then obtain a nearly optimal value for a key design parameter, which maximizes the upper bound. Numerical examples confirm that the randomized scheme is able to dominate the conventional scheme in cognizance rate by employing a nearly optimal value. Furthermore, they reveal that the randomized scheme is robust to the fallacy that the reader believes or guesses a wrong number of neighboring tags.

MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect

  • Choi, Sunwoong;Choi, Jaehyuk;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1624-1637
    • /
    • 2013
  • In RFID systems, one important issue is how to effectively address tag collision, which occurs when multiple tags reply simultaneously to a reader, so that all the tags are correctly identified. However, most existing anti-collision protocols assume isotropic collisions where a reader cannot detect any of the tags from the collided signals. In practice, this assumption turns out to be too pessimistic since the capture effect may take place, in which the reader considers the strongest signal as a successful transmission and the others as interference. In this case, the reader disregards the other collided tags, and in turn, fails to read the tag(s) with weaker signal(s). In this paper, we propose a capture effect-aware anti-collision protocol, called Multi-Round Collision Tree (MRCT) protocol, which efficiently identifies the tags in real RFID environments. MRCT deals with the capture effect as well as channel error by employing a multi-round based identification algorithm. We also analyze the performance of MRCT in terms of the number of slots required for identifying all tags. The simulation results show that MRCT significantly outperforms the existing protocol especially in a practical environment where the capture effect occurs.

A Specialized Reader for High Speed UHF RFID Tag Inlay Inspection Equipment (고속 UHF RFID 태그 검사 장비를 위한 전용 리더)

  • Bae, Sung Woo;Park, Jun-Seok;Seong, Yeong Rak;Oh, Ha-Ryoung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.1
    • /
    • pp.63-69
    • /
    • 2014
  • RFIDs have not become widespread as expected partly due to the cost, size, read range, and reliability problems of tags. The success rate of reading must be improved in order for RFIDs to be widely adopted. Quality control of tags is crucial to meet this requirement. In this study, we designed and implemented a high-performance reader used in inspection equipment that conducts prior inspection of tags. To improve performance of the developed reader, the baseband modem and command processor (CP) were designed using H/W logic and implemented with FPGA. The inspection of small pitch inlays was made possible through the antenna shielding device and H/W command processor function. This equipment enables accurate evaluation of performance and identification of tags satisfying a given read range. By contributing to sort out defective tags, the results can ultimately lead to more stable RFID services.

Fair Identification Scheme for STAC Protocol in 13.56MHz RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.260-265
    • /
    • 2011
  • In RFID System, when multiple tags respond simultaneously, a collision can occur. A method that solves this collision is referred to anti-collision algorithm. In 13.56MHz RFID system, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. In STAC protocol, there is no differentiation between the collided tags and others in the identification process. Therefore, tags may never be successfully identified because its responses may always collide with others. This situation may cause the tag starvation problem. This paper proposes a fair identification scheme for STAC protocol. In the proposed scheme, if the number of collided slots is large during a query round, the reader broadcasts a CollisionRound command to begin a collision round. During the collision round, the reader identifies only tags that are experienced collision during the previous query round.

Military Entrance Control System Using Military Insignia UHF RFID Tags (군 계급장 UHF RFID 태그를 이용한 군 보안출입관리 시스템)

  • Nam, Seahyeon;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.966-971
    • /
    • 2013
  • This paper introduces development of a Military Entrance Control System using the developed military insignia UHF RFID tags. Generally, in the military entrance control system, the security identification (ID) card with HF RFID tag can be used, to increase the security level, the developed insignia UHF RFID tags are used in the enforced military entrance control system. The general metal insignias, have been worn on a hat or on the shoulder pads of a military uniforms, are simulated and developed as UHF RFID insignia tags. The military entrance control system can manage the name, rank, address (information of military personnel), time and date of entrance and the history of entrance of the security area.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

The Implementation of the Detection System of RFID Defective Tags Using UML and LabVIEW OOP (UML과 LVOOP를 활용한 RFID 불량 검출 시스템의 구현)

  • Jung, Min-Po;Cho, Hyuk-Gyu;Jung, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.382-386
    • /
    • 2011
  • It has been required to develop a defect detection system to perform defect detection capabilities after the bonding process in the production of RFID tags. However, we are difficult to design a system with understanding the characteristics of RFID tags and design concepts. Also we are difficult to modify even minor changes in features. In this paper, we design the defect RFID detection system using UML and object-oriented design techniques. We suggest the method for apply the UML Diagram to LabVIEW OOP and the technique for redesign the effect detection system's changes.

  • PDF

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

A study of plan for traceability of a Korean herb using RFID technology (RFID 기술을 이용한 한약재 이력관리 방안에 관한 연구)

  • Kim, Chul;Song, Mi-Young
    • Korean Journal of Oriental Medicine
    • /
    • v.12 no.3 s.18
    • /
    • pp.31-47
    • /
    • 2006
  • Nowadays Korean governments use Information Technology to improve the quality of life for a people. One of these tries is building the Food Tracing System based on Information Technology. Koreans have big concern about food that is good for health. The Food Tracing System means that the system can follows, traces, and records every steps of production and delivery of food and its ingredient. And this process should be identified and grouped by using tags, marks, and other methods. For example, producer of ingredient, processing steps of food, delivered place could be traced. In addition to food, medical herbs need consumer's trust in production and delivery. To trace and prosecute contaminated medical herbs, medical herbs also need this kind of Tracing System based on Information Technology. This study shows current medical herbs tracing ways and RFID(Radio Frequency IDentification) technology trend. As preceding study for future RFID based medical herbs tracing system, this study suggests the building plan and scenario of the Medical Herbs Tracing System. The determination of the main body for sticking RFID Tags is very important to design for RFID Traceability System. In this study, the starting point of information to medical herbs is an inspection agency. The Medical Herbs to product domestically or import moved to an inspection agency. An inspection agency bond the RFID Tags to packing of the Medical Herbs after examining the a basic its component. At the same time inspector give the information of production or importation to the Tags. This Tags are moved for logistical process to end point, the Korean medicine agency. The customer confirmed the traceability and certification information of the Medical Herbs. For success tracing of medical herbs, institutional support and close cooperation between related organizations is necessary besides good system design.

  • PDF

The development of an EPC Code Auto-Writing and Fault Detection Algorithm for Manufacturing Process of a RFID TAG (RFID 태그 생산 공정 자동화를 위한 부적합품의 자동 검출 및 EPC Code Auto-Writing 알고리즘 개발)

  • Jung, Min-Po;Hwang, Gun-Yong;Cho, Hyuk-Gyu;Lee, Won-Youl;Jung, Deok-Gil;Ahn, Gwi-Im;Park, Young-Sik;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.321-325
    • /
    • 2009
  • The detection process of defective tags in most of Korean domestic RFID manufacturing companies is handled or treated by on-hand processing after the job of chip bonding, so it has been requesting to reduce the time and cost for manufacturing of RFID tags. Therefore, in this paper, we design and implement the system to perform the functionality of detection of defective tags after the process of chip bonding, and so provide the basis of a related software to establish the foundation of a automation system for the detection of defected RFID tags which is requested in the related Korean domestic industrial field. The developed system in this paper shows the enhancement of 700% in processing speed and 100% in detection rate of defective tags, comparing to the method of on-hand processing.

  • PDF