• Title/Summary/Keyword: RFID tags

Search Result 570, Processing Time 0.02 seconds

An Implementation of a Virtual RFID Emulator System using a Commercial CAD tool (상용 CAD 툴을 이용한 RFID 에뮬레이터 시스템 구현)

  • Lim, Hyung-Mu;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1049-1054
    • /
    • 2005
  • With the growth of RFID market in logistics industry, such as post office, airline, shipping etc., development of RFID readers and tags becomes crucial. Especially, $860{\sim}960MHz$ RFID is worth noticing because of its long identification range and low production cost. Therefore, performance tests and verification of reader and/or tag under development are very important. In this paper, a RFID emulator system is designed and implemented using a commercial CAD tool, a signal generator and a data acquisition device. With the RFID emulator system, many parameters such as spectrum masks, transmit power levels, data waveform and other RF characteristics can be analyzed. Furthermore it can be applied to the verification of real RFID Readers or Tags.

  • PDF

Impedance Evaluation Method of UHF RFID Tag Chip for Maximum Read Range (UHF RFID 태그의 최대 인식 거리를 얻기 위한 태그 칩의 임피던스 산출 방법)

  • Sim, Yong-Seog;Yang, Jeen-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.12
    • /
    • pp.1148-1157
    • /
    • 2013
  • In a passive UHF RFID system, the impedance matching between tag antenna and chip as well as the protocol parameter settings in a reader plays important role in determination of the maximum read-range. Almost no paper, however, has dealt with the above issues in relation with the maximum read range. In this paper, two known methods (of using the value from data sheets and proprietary RFID tester) and our proposing method in chip impedance evaluation are compared in terms of maximum read range. The read range of tags whose antenna impedance is conjugate matched with the chip impedance obtained from the proposed method is improved maximum 73 % more than that of tags from the other methods.

A study on economical introduction of RFID system in the small and medium 3rd Party Logistics (3자 물류 중소기업에 경제적인 RFID 시스템 도입을 위한 연구)

  • Kim, Ki-Hong;Shin, Seung-Jun;Choi, See-Yeong;Yeo, Jun-Ho;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.117-126
    • /
    • 2008
  • RFID system the key technology of ubiquitous era, has been emphasized in logistics. Logistic enterprises are required to apply RFID systems considering their investment costs, actual effectiveness, operational satisfaction and so on. For such a purpose, many applicable methods of RFID system have been developed A method that RFID tags are directly attached to products or pallets is utilized in most cases. However, this method requires expensive investment cost, frequent replacement of damaged tags for the small and medium (SM) third party logistics. In this paper, we analyze statistically the current status and requirements of SM third party logistics. Based on their requirements, we propose the realtime warehousing-delivery management by the method to attach a RFID tag to each warehouse rack, together with the economy analysis index in order to evaluate economical efficiency. Consequently, this method is expected to reduce Investment cost and to improve operational effectiveness and satisfaction.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

An Efficient Tag Identification Algorithm Using Improved Time Slot Method (개선된 타임 슬롯 방법을 이용한 효과적인 태그 인식 알고리즘)

  • Kim, Tae-Hee;Kim, Sun-Kyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.1-9
    • /
    • 2010
  • In recent year, the cores of ubiquitous environment are sensor networks and RFID systems. RFID system transmits the electronic information of the tag to the reader by using RF signal. Collision happens in RFID system when there are many matched tags, and it degrades the tag identification performance. Such a system needs algorithm which is able to arbitrate tag collision. This paper suggests a hybrid method which reduces collision between the tags, and can quickly identify the tag. The proposed method operates based on certainty, which takes an advantage of tree based algorithm, and to reduce collision it selects transmission time slot by using tag ID. The simulation results show the suggested method has higher performance in the number of queries and collision compared to other tree based and hybrid algorithms.

An Enhanced Colorwave Reader Anti-collision Algorithm in RFID System (RFID 시스템에서의 Enhanced Colorwave 리더 충돌 방지 알고리즘)

  • Lee Su-Ryun;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.27-38
    • /
    • 2006
  • When an RFID reader attempts to read tags, interference might occur if the neighboring readers also attempt to communicate with the same tag at the same time or the neighboring readers use the same frequency at the same time. These interferences cause the RFID reader collision. When the RFID reader collision occirs, either the command from the reader can not be transmitted to the tags or the response from the tags can not be received by the reader correctly. RFID reader anti-collision algorithms have been developed to reduce it. One of the best blown reader anti-collision algorithms is the Colorwave algorithm proposed by MIT. The Colorwave algorithm reduces the reader collisions by having the readers operate at different times. In Colorwave the time is divided into frames and a frame is divided into a number of slots. Each reader can access the tags using the slot time assigned to it. Depending on the probability of the interference, the colorwave adjusts the frame size to improve the efficiency. In this paper, we analyze the operations and the performance of the Colorwave algorithm and identify the problems of the algorithm. We also show that by adding some modifications to the algorithm the performance can be improved significantly.

Implementation of Virtual Reader and Tag Emulator System Using DSP Board (DSP 보드를 이용한 가상의 리더와 태그 에뮬레이터 시스템 구현)

  • Kim, Young-Choon;Joo, Hae-Jong;Choi, Hae-Gill;Cho, Moon-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3859-3865
    • /
    • 2010
  • Modeling a virtual reader and tags, the emulator system is realized by using a commercial signal generation device to make signal, a data collection equipment, and DSP board. By using a Virtual UHF RFID (860 ~ 960 [MHz]) reader/tags module, a developed RFID reader, protocol of tag, and properties of RF support to provide the way how to verify the suitability to international standards (ISO 18000-6 Type C, EPCglobal C1G2). In this paper, to implement a proposed model reader and tag model, Visual DSP is applied by using DSP board, composing the system's signal generators, signal analyzers and performance verification, the target readers or tags, RFID emulator control computesr and control programs.

Improved RFID Authentication Protocol using Hash Lock (해쉬락을 이용한 개선된 RFID 인증 프로토콜)

  • Bae Woo-Sik;Jang Gun-Oh;Han Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.635-641
    • /
    • 2006
  • On the wireless-communication between Electronic Tag of RFID system and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash-lock related algorithm. This paper has presented the comparison and analysis of the established hash-lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real-time and every session. The algorithm suggested is able to make RFID wireless authentication system offer a several of usefulness and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses just the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' action with time based.

  • PDF

The Optimized Detection Range of RFID-based Positioning System using k-Nearest Neighbor Algorithm

  • Kim, Jung-Hwan;Heo, Joon;Han, Soo-Hee;Kim, Sang-Min
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.297-302
    • /
    • 2008
  • The positioning technology for a moving object is an important and essential component of ubiquitous computing environment and applications, for which Radio Frequency Identification(RFID) has been considered as a core technology. RFID-based positioning system calculates the position of moving object based on k-nearest neighbor(k-nn) algorithm using detected k-tags which have known coordinates and kcan be determined according to the detection range of RFID system. In this paper, RFID-based positioning system determines the position of moving object not using weight factor which depends on received signal strength but assuming that tags within the detection range always operate and have same weight value. Because the latter system is much more economical than the former one. The geometries of tags were determined with considerations in huge buildings like office buildings, shopping malls and warehouses, so they were determined as the line in I-Dimensional space, the square in 2-Dimensional space. In 1-Dimensional space, the optimal detection range is determined as 125% of the tag spacing distance through the analytical and numerical approach. Here, the analytical approach means a mathematical proof and the numerical approach means a simulation using matlab. But the analytical approach is very difficult in 2-Dimensional space, so through the numerical approach, the optimal detection range is determined as 134% of the tag spacing distance in 2-Dimensional space. This result can be used as a fundamental study for designing RFID-based positioning system.

  • PDF

Efficient Localization of a Mobile Robot Using Spatial and Temporal Information from Passive RFID Environment (수동 RFID 환경에서의 공간/시간 정보를 이용한 이동로봇의 효율적 위치 추정 기법)

  • Kim, Sung-Bok;Lee, Sang-Hyup
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.2
    • /
    • pp.164-172
    • /
    • 2008
  • This paper presents the efficient localization of a mobile robot traveling on the floor with tags installed, using the spatial and temporal information acquired from passive RFID environment. Compared to previous research, the proposed localization method can reduce the position estimation error and also cut down the initial cost tag installation cost. Basically, it is assumed that a mobile robot is traveling over a series of straight line segments, each at a certain constant velocity, and that the number of tags sensed by a mobile robot at each sampling instant is at most one. First, the velocity and position estimation of a mobile robot starting from a known position, which is valid for all segments except the first one. Second, for the first segment in which the starting position is unknown, the velocity and position estimation is made possible by enforcing a mobile robot to traverse at least two tags at a constant velocity with the steering angle unchanged. Third, through experiments using our passive RFID localization system, the validity and performance of the mobile robot localization proposed in this paper is demonstrated.

  • PDF