• Title/Summary/Keyword: RFID tags

Search Result 571, Processing Time 0.026 seconds

A Dual-Path Full Wave Voltage Multiplier for passive RFID Tags (수동형 RFID 태그를 위한 전파 이중 경로 전압 체배기)

  • Cho, Jung-Hyun;Kim, Hak-Su;Kim, Shi-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.1
    • /
    • pp.16-21
    • /
    • 2007
  • A Dual-Path Voltage Multiplier for passive RFID Tags was proposed and fabricated by using a 0.25um CMOS process with additional steps for schottky diodes. The proposed circuit needs only 4 additional diodes, and the area increment compared to conventional one is negligible in multi-stage voltage multipliers. The simulation and measurement results show that the output power capability of proposed multiplier are about two times larger than the conventional half-wave multiplier.

Performance of Multiple Coordinators-based RFID Reader Protocol (다중 코디네이터를 이용한 RFID 리더 프로토콜 성능 분석)

  • Lee, Se-Hee;Yang, Hoon-Gee;Yang, Sung-Hyun;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2247-2256
    • /
    • 2011
  • In this paper, we propose a coordinator-based reader protocol that can avoid reader collisions in a passive RFID system. In a proposed protocol, unlike conventional protocols that a reader itself selects its own slot randomly to communicate with tags such as DCS, Colorwave, a coordinator reader allocates an unused slot to a reader to participate in the network and sends a current slot number. A reader allocated a slot can communicate with tags. The proposed protocol can adaptively modified to apply for multiple coordinator readers environment in a wide area. This causes reader collision problem, but can be alleviated partly by applying the frequency planning. In this way, we verifies that a RFID system using the proposed protocol is three to five times better than existing systems through the simulation.

A Centralized Arbitration Scheme to Avoid Collisions of UHF Band RFID Readers (UHF 대역 RFID 리더들의 충돌을 제거하기 위한 중앙 중재 방법)

  • Bae, Sung-Woo;Ryu, Won-Sang;Ahn, Si-Young;Yang, Jung-Kyu;Kim, Yun-Ho;Kim, Jun-Hyung;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.99-112
    • /
    • 2008
  • In the passive UHF (860-960MHz) RFID communications, which consists of a set of readers and tags, the readers normally interrogate the tag by using the backscatter mechanism. (i.e., tag response). In practical RFID environment, where multiple readers or tags exist; the interference causes collisions. This paper proposes a centralized arbitration scheme for avoiding the collision problems among multiple readers. The proposed centralized arbitration scheme is modeled in software environments, and is verified with simulation results. Simulated performance is focused on completion time, utilization and response time, and the simulation results show that our proposed scheme provides satisfactory performance grade.

  • PDF

A DFS-ALOHA Algorithm with Slot Congestion Rates in a RFID System (RFID시스템에서 슬롯의 혼잡도를 이용한 DFS-ALOHA 알고리즘)

  • Lee, Jae-Ku;Choi, Seung-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.267-274
    • /
    • 2009
  • For the implementation of a RFID system, an anti-collision algorithm is required to identify multiple tags within the range of a RFID Reader. There are two methods of anti-collision algorithms for the identification of multiple tags, conclusive algorithms based on tree and stochastic algorithms based on slotted ALOHA. In this paper, we propose a Dynamic Framed Slotted ALOHA-Slot Congestion(DFSA-SC) Algorithm. The proposed algorithm improves the efficiency of collision resolution. The performance of the proposed DFSA-SC algorithm is showed by simulation. The identification time of the proposed algorithm is shorter than that of the existing DFSA algorithm. Furthermore, when the bit duplication of the tagID is higher, the proposed algorithm is more efficient than Query Tree algorithm.

Design of Tag in-Tag out for ATP/ATO in the Light Rail and Monorail (경전철/모노레일의 ATP/ATO를 위한 Tag in-Tag out 설계)

  • Ryu, Deung-Ryeol;Lee, Key-Seo;Oh, Sang-Min
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1264-1269
    • /
    • 2008
  • We designed a track circuit of Tag in-tag out type that can be used for light rails and monorails. This method is called RFID-Tag and it literally uses RFID-Tag and replaces a fixed track circuit and implements a moving block. The distance between RFID-Tags is set to the length of a train and thus a train is always in contact with one of the tags. A train runs in RFID-Tag in -RFID-Tag out type at all times and the distance between trains can be precisely controlled through the application of a moving block combined with the basic principle of a fixed block, which enables the continuous speed control and enhances the satisfaction of passengers. When constructing a track circuit using RFID-Tag the Tag in-tag out brings us the cost reduction and is more economical than the existing fixed track circuit in that sense and easy for installation and maintenance. The wireless communication between onboard and wayside makes the continuous control possible and can improve the control capacity of ATP/ATO by the implementation of a moving block on top of a fixed one.

  • PDF

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

The Development of RFID Smart Tag Reader using AVR (AVR을 이용한 RFID 스마트 태그 리더 개발)

  • Eum, Sang-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1319-1324
    • /
    • 2020
  • A smart tag complements various problems caused by the expansion of the use of existing magnet cards. This emerged as a result of the need for alternative means to perform safer and more diverse functions. RFID tags are becoming increasingly ubiquitous sensor networks and Internet of Things technologies as they give everything an ID, enabling automatic recognition of objects and forming a communication network between them. In this paper, a contactless RFID smart tag reader composed of RFID tags and readers using AVR processor was developed. The system has a low frequency band of 13.56MHz and is designed by PWM method of communication velocity 26.48kbps. The developed RFID smart tag board showed a faster response rate than the typical RFID system as a result of the simulation, and the actual experiment also showed an improvement in response rate.

STAC/EPS Algorithm for Fast Tag Identification in RFID System (RFID 시스템에서 고속 태그 식별을 위한 STAC/EPS 알고리즘)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.931-936
    • /
    • 2016
  • The PS algorithm divides the number of tags within the identification range of reader into smaller groups by increasing the transmission power incrementally and identifies them. It limits the number of responding tags by grouping the tags within the identification range of the reader, and thus can reduce the probability of tag collision. Also, in the PS algorithm, the reader takes advantages of the difference of identification ranges. This algorithm uses the fixed frame size at every scan. Therefore, it has problems that the performance can be shown variously according to the number of tags and frame size. In this paper, we propose an EPS algorithm that allocates the optimal frame size by estimating the number of tags at each scan, and apply it into the STAC protocol. The simulation results showed that STAC/EPS algorithm can improve the identification delay about 45% compared with STAC protocol. Also, it provides a stable identification delay regardless of power level increase.

Improving RFID Anti-Collision Algorithms with Multi-Packet Reception (다중 패킷 수신을 이용한 RFID 충돌방지 알고리즘의 성능 향상)

  • Lee, Jeong-Keun;Kwon, Taek-Young;Choi, Yang-Hee;Kim, Kyung-Ah
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1130-1137
    • /
    • 2006
  • One of the important performance issues in large-scale RFID systems is to resolve collisions among responses from RFID tags. Considering two do facto anti-collision solutions, namely the binary-tree splitting algorithm and the Slotted-Aloha algorithm, we propose to use multi-packet reception (MPR) capability to enhance the RFID tag reading rate (i.e., throughput). MPR allows an RFID reader to receive multiple reponses transmitted by tags at the same time. We analyze the effect of MPR capability in the above anti-collision algorithms, which is also validated by simulation. The analysis and simulation results show that RFID reader antenna design and signal separation techniques play an important role in improving RFID system performance with MPR capability.

Secure and Efficient DB Security and Authentication Scheme for RFID System (RFID 시스템을 위한 안전하고 효율적인 DB 보안 및 인증기법)

  • Ahn, Rae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4C
    • /
    • pp.197-206
    • /
    • 2011
  • In the RFID system, bulk tag information is stored into the back-end database as plaintext format not ciphertext. In this case, the tags's private informations can be easily compromised by an external hacker or an insider attacker. If the private informations of tags disclosed by the attackers, it can occur serious privacy invasion problem. Recently the database(DB) security is an important issue to prevent the above DB compromised attack. However, DB security for RFID systeme has not been considered yet. If we use the DB security technique into the RFID system, the above described privacy invasion' problem can be easily prevented. Based on this motivation, this paper proposes a secure and efficient back-end database security and authentication(S-DB) scheme with XOR-based encryption/decryption algorithm. In the proposed scheme, all tag's private information is encrypted and stored by using the DB secret key to protect the DB compromised attack. As a result, the proposed S-DB scheme 'can provide stronger security and more efficiency for the secure RFID system environment.