• Title/Summary/Keyword: RFID tags

Search Result 570, Processing Time 0.019 seconds

Transmission Probability Control Scheme in FSA-based RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.677-681
    • /
    • 2010
  • This paper proposes a transmission probability control scheme for enhancing the performances of FSA-based RFID system. In order to maximize the system performance, the number of tags attempting to transmit their identifiers in a frame should be kept at a proper level. The reader calculates the transmission probability according to the number of tags within the identification range of reader and then broadcasts it to tags. Tags, in which their slot counter values reach to zero, attempt to transmit their identifiers with the received probability. Simulation results show that the proposed scheme can offer better throughput and delay performance than the conventional one regardless of the number of tags.

Cryptanalysis and Improvement of a New Ultralightweight RFID Authentication Protocol with Permutation (순열을 사용한 새로운 초경량 RFID 인증 프로토콜에 대한 보안 분석 및 개선)

  • Jeon, Il-Soo;Yoon, Eun-Jun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.1-9
    • /
    • 2012
  • Low-cost RFID tags are used in many applications. However, since it has very limited power of computation and storage, it's not easy to make a RFID mutual authentication protocol which can resist from the various security attacks. Quite recently, Tian et al. proposed a new ultralightweight authentication protocol (RAPP) for low-cost RFID tags using the low computation cost operations; XOR, rotation, and permutation operations, which is able to resist from the various security attacks. In this paper, we show that RAPP is vulnerable to the de-synchronization attack and present an improved RAPP which overcomes the vulnerability of RAPP.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

ALOHA-type Anti-collision Algorithms Using Tag Estimation Method in RFID system (RFID 시스템에서의 태그 수를 추정하는 ALOHA 방시 Anti-collision 알고리즘)

  • Cha Jae-Ryong;Kim Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.814-821
    • /
    • 2005
  • When there are many tags using the same frequency around the reader in RFID system, they disturb each other and in the end their response cannot be received by the reader. To solve this disturbance and fast identify the tags, the anti-collision algorithm, which is the core technology in RFID system, is needed. We propose two ALOHA-type Dynamic Framed Slotted ALOHA(DFS-ALOHA) algorithms using Dynamic Slot Allocation(DSA), which dynamically allocates the frame size in accordance with the number of tags and Tag Estimation Method(TEM), which estimates the number of tags around the reader. We also compare the performance of the proposed DFS-ALOHA algorithms with that of the conventional Framed Slotted ALOHA (FS-ALOHA) algorithms and the algorithms proposed by Vogt using OPNET simulation. According to the analysis, the two proposed DFS-ALOHA algorithms(DFS-ALOHA I and DFS-ALOHA II) show better performance than the conventional ALOHA-based algorithms regardless of the number of tags. Although the two proposed DFS-ALOHA algorithms show the similar performance, BFS-ALOHA ll is better because it is easier to be implemented in the system and the complexity is lower.

Strong Yoking Proof Protocols for RFID Tags (RFID tag를 위한 강력한 Yoking Proof Protocols)

  • Cho, Jung-Sik;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.310-318
    • /
    • 2007
  • The RFID system is a non-contact automatic identification system that identifies tags through a reading device by attaching small, inexpensive tags on goods. This system is expected to supplant barcodes, the contactless reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously And he presented a yoking proof protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either. In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for n tags.

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.

Improvement of Tag Collection Performance for Active RFID Systems (능동형 RFID 시스템을 위한 태그 수집 성능 개선)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Moon, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.518-527
    • /
    • 2008
  • Tag collection is one of the major functions in Radio Frequency Identification (RFID) systems. IS0/IEC 18000-7 defines the tag collection algorithm using the anti-collision algorithm, based on the framed slotted ALOHA for active RFID systems. However, it has inefficiency problems that reduce tag collection performance by deciding non-optimum slot size or using point-to-point commands to put collected tags to sleep. In this paper, we propose two mechanisms to overcome the inefficiency problems and improve tag collection performance: 1) a new slot size decision mechanism to allow the reader to choose the optimum slot size flexibly and 2) a broadcast-based sleep mechanism to put collected tags to sleep effectively. We also implemented an active RFID system, composed of an active RFID reader and multiple tags, and the reader is designed to maximize tag collection performance when the proposed mechanisms are applied. In experiments, we evaluated the tag collection performance using one reader and 50 tags in the real-world environment. The experimental results show that when two mechanisms are applied and the initial number of slots is chosen appropriately, the performance of the proposed tag collection algorithm is greatly enhanced, compared with that of the standard.

Monte Carlo Localization for Mobile Robots Under REID Tag Infrastructures (RFID 태그에 기반한 이동 로봇의 몬테카를로 위치추정)

  • Seo Dae-Sung;Lee Ho-Gil;Kim Hong-Suck;Yang Gwang-Woong;Won Dae-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2006
  • Localization is a essential technology for mobile robot to work well. Until now expensive sensors such as laser sensors have been used for mobile robot localization. We suggest RFID tag based localization system. RFID tag devices, antennas and tags are cheap and will be cheaper in the future. The RFID tag system is one of the most important elements in the ubiquitous system and RFID tag will be attached to all sorts of goods. Then, we can use this tags for mobile robot localization without additional costs. So, in this paper, the smart floor using passive RFID tags is proposed and, passive RFID tags are mainly used for identifying mobile robot's location and pose in the smart floor. We discuss a number of challenges related to this approach, such as tag distribution (density and structure), typing and clustering. When a mobile robot localizes in this smart floor, the localization error mainly results from the sensing range of the RFID reader, because the reader just ran know whether a tag is in the sensing range of the sensor. So, in this paper, we suggest two algorithms to reduce this error. We apply the particle filter based Monte Carlo localization algorithm to reduce the localization error. And with simulations and experiments, we show the possibility of our particle filter based Monte Carlo localization in the RFID tag based localization system.

Research about RFID Healthcare System (RFID 건강관리 시스템에 관한 연구)

  • Sung, Hycuk;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.17-26
    • /
    • 2005
  • RFID(Radio Frequency IDentification) is a method of remotely storing and retrieving data using devices called 'RFID tags'. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries fro an RFID transceiver. Eventually, RFID SYSTEM is very interesting to watch people live linger than they used to before. Some of reasons for that phenomenon is the improving medical studies. As we live healthier and get to know more about our body, we can extend our lives. This Platform is Physical Health Promotion Service, Home Health Monitoring Service, Mental Health Promotion Service, Home Patient Management Service, Chronic Disease Management Service, Emergency Patient Management Service, Medical Information and Consulting Service of the RFID.

  • PDF