• Title/Summary/Keyword: RFID-Reader

Search Result 743, Processing Time 0.028 seconds

Mobile RFID Service QoS, Security Model (모바일 RFID 서비스를 위한 QoS 및 보안 모델)

  • Kim Mar-Ie;Lee Yong-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5C
    • /
    • pp.562-567
    • /
    • 2006
  • This paper extends Diameter AAA Protocol to provide secure communication channels between Mobile RFID Service Components and distinct service based on user's QoS level authorization. This paper supposes 900MHz, which is the target RF for Mobile RFID Forum and supposes RFID phone, which equitted with RFID reader. By using extended Diameter AAA server, user is authenticated, authorized and provided dynamic security associations between Mobile RFID Service components. The types of security associations are as followings:between RFID tag and RFID reader, between RFID reader(phone) and MobileRFID Service Agent, between phone and OIS, between phone and OTS and between phone and Accounting/Financial server.

RFID Smart Tag System (RFID 스마트 태그 시스템)

  • Eum, Sang-hee;Lee, Byung-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.232-234
    • /
    • 2018
  • In this study, We developed the non-contact RFID smart tag system. which are consists of passive RFID Tag and Reader. The system was designed for the low frequency of 13.56Mhz-band. The developed RFID smart tag board was developed to improve response time through simulation experiments were conducted. We introduced in the body of an RFID tag technology, circuit design and simulation and experimental results are described.

  • PDF

Wearable Wireless RFID Glove System for Emotional Learning Method (감성 학습 방식을 위한 무선 RFID 장갑 시스템)

  • Park, Hyun-Sik;Kim, Sung-Soo;Jung, Kyung-Kwon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.4
    • /
    • pp.241-247
    • /
    • 2009
  • In this paper, we present a wireless RFID glove in emotional learning method. The proposed wireless RFID glove consists of three parts: RF wireless module, RFID reader, and RFID tags. Objects tagged with a small passive RFID tag, can be sensed at short ranges by using wireless RFID glove. We describe the wireless RFID glove prototype, and present some interactive learning programs and games. The proposed system can be utilized to analyze user activities and train the brain of old person.

Improvement of Tag Collection Performance for Active RFID Systems (능동형 RFID 시스템을 위한 태그 수집 성능 개선)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Moon, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.518-527
    • /
    • 2008
  • Tag collection is one of the major functions in Radio Frequency Identification (RFID) systems. IS0/IEC 18000-7 defines the tag collection algorithm using the anti-collision algorithm, based on the framed slotted ALOHA for active RFID systems. However, it has inefficiency problems that reduce tag collection performance by deciding non-optimum slot size or using point-to-point commands to put collected tags to sleep. In this paper, we propose two mechanisms to overcome the inefficiency problems and improve tag collection performance: 1) a new slot size decision mechanism to allow the reader to choose the optimum slot size flexibly and 2) a broadcast-based sleep mechanism to put collected tags to sleep effectively. We also implemented an active RFID system, composed of an active RFID reader and multiple tags, and the reader is designed to maximize tag collection performance when the proposed mechanisms are applied. In experiments, we evaluated the tag collection performance using one reader and 50 tags in the real-world environment. The experimental results show that when two mechanisms are applied and the initial number of slots is chosen appropriately, the performance of the proposed tag collection algorithm is greatly enhanced, compared with that of the standard.

Channel Assignment for RFID Readers in Dense Reader Environments (밀집리더환경에서 RFID 리더를 위한 채널 할당)

  • Sohn, Surgwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.69-76
    • /
    • 2013
  • Reader-to-reader interference in RFID system is occurred due to the use of limited number of frequencies, and this is the main cause of read rate reduction in the passive RFID tags. Therefore, in order to maximize the read rate under the circumstances of limited frequency resources, it is necessary to minimize the frequency interference among RFID readers. This paper presents a hybrid FDM/TDM constraint satisfaction problem models for frequency interference minimization problems of the RFID readers, and assigns optimal channels to each readers using conventional backtracking search algorithms. A depth first search based on backtracking are accomplished to find solutions of constraint satisfaction problems. At this moment, a variable ordering algorithm is very important to find a solution quickly. Variable ordering algorithms applied in the experiment are known as efficient in the graph coloring. To justify the performance of the proposed constraint satisfaction problem model, optimal channels for each readers in the passive UHF RFID system are allocated by using computer simulation satisfying various interference constraints.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

A Study on Efficiency of RFID Middleware System with Priority (우선순위를 고려한 RFID 미들웨어 시스템의 효율화에 관한 연구)

  • Song, Jeong-Hwan;Kim, Chae-Soo;Park, Sung-Mee;Choi, Woo-Yong;Kim, Jung-Ja;Lee, Sang-Wan
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.4
    • /
    • pp.430-438
    • /
    • 2007
  • In the current RFID (Radio Frequency IDentification) middleware systems based on the EPCglobal standard, the tag data received by multiple readers are processed sequentially in FIFO (First In First Out) order. Considering the priority of RFID reader makes the RFID system more flexible and improve the data transaction throughput in the service environment where important tag data with high priority for a specific reader. In this study, we propose a new RFID middleware system architecture supporting priority service with the Buffer Management Component. Our proposals are compliant with the EPCglobal ALE (Application Level Events) standard interface for middleware systems and their clients. To verify the efficiency of this proposed system, simulation is used for evaluation.

A Physical Sequence Estimation Scheme for Passive RFID Tags using Round Trip Scan (왕복 스캔을 통한 수동형 RFID태그의 물리적 순차 추정기법)

  • Lee, Joo-Ho;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1358-1368
    • /
    • 2012
  • A tag sequence estimation scheme is to estimate the physical sequence of passive RFID tags that are linearly spread using the movement of a RFID reader. Since RFID readers communicate with the passive tags by very weak radio waves, scanning passive tags are unstable. In this paper, we applied round-trip scanning of a reader to enhance the tag sequence estimation. Proposed scheme first determines the turning point of the reader movement, and then estimates the sequence of the tags using the tag sets scanned in each read cycles. Test experiments show that the proposed scheme can improve the estimation accuracy.

Automatic Identification and Tracking in Blood Supply Distribution Using RFID System

  • Kang, Jin-Suk;Jeon, Young-Jun;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.389-393
    • /
    • 2007
  • The distribution of donated blood for medical purpose is an area that presents many challenges. In order to establish a comprehensive solution, the current patterns of distribution must be reviewed and problems related to it need to be clearly understood. This paper introduces 'Radio Frequency Identification (RFID) System', as a potential solution to some of the problems which arise in the process of blood supply distribution, and a way to systematically manage the blood supply. For the various possible RFID systems, the reader and tag must be suitable for the purpose of blood distribution. A database has been designed that can recognize tags and objects in a ubiquitous RFID blood distribution system. In this paper, we design the real-time software to control the RFID reader system and transponder, using the EEPROM memory by RFID. The experimental results confirm that the transmission rate of 3.9kbps for RF is 125 KHz. The electric power usage of transponder chip is $100{\mu}W$, with the recognition distance is about 7cm range.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.