• Title/Summary/Keyword: RFID-Reader

Search Result 743, Processing Time 0.024 seconds

Monte Carlo Localization for Mobile Robots Under REID Tag Infrastructures (RFID 태그에 기반한 이동 로봇의 몬테카를로 위치추정)

  • Seo Dae-Sung;Lee Ho-Gil;Kim Hong-Suck;Yang Gwang-Woong;Won Dae-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2006
  • Localization is a essential technology for mobile robot to work well. Until now expensive sensors such as laser sensors have been used for mobile robot localization. We suggest RFID tag based localization system. RFID tag devices, antennas and tags are cheap and will be cheaper in the future. The RFID tag system is one of the most important elements in the ubiquitous system and RFID tag will be attached to all sorts of goods. Then, we can use this tags for mobile robot localization without additional costs. So, in this paper, the smart floor using passive RFID tags is proposed and, passive RFID tags are mainly used for identifying mobile robot's location and pose in the smart floor. We discuss a number of challenges related to this approach, such as tag distribution (density and structure), typing and clustering. When a mobile robot localizes in this smart floor, the localization error mainly results from the sensing range of the RFID reader, because the reader just ran know whether a tag is in the sensing range of the sensor. So, in this paper, we suggest two algorithms to reduce this error. We apply the particle filter based Monte Carlo localization algorithm to reduce the localization error. And with simulations and experiments, we show the possibility of our particle filter based Monte Carlo localization in the RFID tag based localization system.

A method for automatic EPC code conversion based on ontology methodology (온톨로지 기반 EPC 코드 자동 변환 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.452-460
    • /
    • 2008
  • ALE-complient RFID middleware system receives EPC code data from reader devices and converts the data into URN format data internally. After filtering and grouping, the system sends the resulting URN code to application and(or) users. Meanwhile, not only the types of EPC code are very diverse, but also another new kinds of EPC code can be emerged in the future. Therefore, a method to process all kinds of EPC code effectively is required by RFID middleware. In this paper, a method to process various kinds of EPC code acquired from RFID reader devices in ALE-complient RFID middleware is proposed. Especially, we propose an approach using ontology technology to process not only existing EPC code but also newly defined code in the future. That is, we build an ontology of conversion rules for each EPC data type to effectively convert EPC data into URL format data. In this case, we can easily extend RFID middleware to process a new EPC code data by adding a conversion rule ontology for the code.

Implementation of Mobile Gateway Integrated RFID Reader (무선인식 리더기와의 연동을 위한 이동 게이트웨이 구현에 관한 연구)

  • Park, Jin-Hee;Kim, Hee-Su;Kim, Dae-Hwan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.251-252
    • /
    • 2009
  • In smart cold chain, environment monitoring (for example temperature, humidity, and etc) is an important. Especially, because monitoring may be broken on passage, in order to success of cold chain management, it is important that seamless monitoring. To solve this problem, we implement mobile gateway supporting RFID and demonstrate using of RFID middleware emulator.

  • PDF

Analyse of Trade-off for Implementing RFID Tag to Enhance Security (보안성 향상을 위한 RFID 태그 구현시의 Trade off 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.754-756
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis is process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and then mitigate the risks.

  • PDF

Analyses of Security Issues and Requirements for RFID System and Its Application

  • Kim, Jung-Te
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.335-339
    • /
    • 2009
  • RFID security and privacy issues have been intensively studied in the research field, the authentication between RFID reader and tag is the fundamental them. Most of the existing authentication protocols draw assumptions on classic primitives. Since tags have small capacities, the security mechanisms which are in use in computer networks and communication are not suitable. In this paper, we compare and analyze recent technical research on the problems of privacy and security. It consists of security mechanism, threats and performance evaluation, etc.

Hardware Design and Deployment Issues in UHF RFID Systems

  • Jang, Byung-Jun;Yoon, Hyun-Goo;Lim, Jae-Bong
    • Journal of electromagnetic engineering and science
    • /
    • v.9 no.1
    • /
    • pp.39-45
    • /
    • 2009
  • In this paper, we discuss hardware design and deployment issues in current passive UHF RFID systems. Using the link budget concept, the methodology to calculate forward- and reverse-link interrogation range is shown. Then, we consider hardware issues: phase diversity, phase noise with range correlation, and TX leakage problems. Finally, three interference problems when deploying RFID systems are presented.

Design of Security Primitive based on Hardware Architecture For RFID Tag (RFID 태그를 위한 하드웨어 구조에 기반한 보안 프리미티브 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.817-819
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its read. Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach consideration of security analysis with cryptographic primitive based on hardware basis.

  • PDF

Implementation of a Jitter and Glitch Removing Circuit for UHF RFID System Based on ISO/IEC 18000-6C Standard (UHF대역 RFID 수신단(리더)의 지터(비트동기) 및 글리치 제거회로 설계)

  • Kim, Sang-Hoon;Lee, Yong-Joo;Sim, Jae-Hee;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1A
    • /
    • pp.83-90
    • /
    • 2007
  • In this paper, we propose an implementation and an algorithm of 'Jitter and Glitch Removing Circuit' for UHF RFID reader system based on ISO/IEC 18000-6C standard. We analyze the response of TI(Texas Instrument) Gen2 tag with a reader using the proposed algorithm. In ISO/IEC 18000-6C standard, a bit rate accuracy(tolerance) is up to +/-22% during tag-to-interrogator communication and +/-1% during interrogator-to-tag communication. In order to solve tolerance problems, we implement the Jitter and Glitch Removing Circuit using the concept of tolerance and tolerance-accumulation instead of PLL(DPLL, ADPLL). The main clock is 19.2MHz and the LF(Link Frequency) is determined as 40kHz to meet the local radio regulation in korea. As a result of simulations, the error-rate is zero within 15% tolerance of tag responses. And in the case of using the adaptive LF generation circuit, the error-rate varies from 0.000589 to zero between 15% and 22% tolerance of tag responses. In conclusion, the error-rate is zero between 0%-22% tolerance of tag response specified in ISO/IEC 18000-6C standard.

Record Processing System using the Attendance Information of RFID (RFID 출결 정보를 이용한 성적 처리 시스템)

  • Baek, Mi-Hye;Kim, Bong-Gi;Choo, Yeon-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.549-552
    • /
    • 2011
  • RFID technology is one of the verification technology that use radio frequency. Use and study of RFID are on the increase because RFID is a one of main technologies in ubiquitous. In this paper, we address to develop a Record Processing System using RFID. The purpose of this paper is improvement of accuracy and efficiency on Record Processing System by applying RFID. Later, This paper will be able to help to establish of u-Campus.

  • PDF

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF