• Title/Summary/Keyword: RFID-tag

Search Result 1,210, Processing Time 0.026 seconds

An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks (중계 공격을 예방하는 효율적인 RFID Distance-Bounding 프로토콜)

  • Boo, Chang-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.610-619
    • /
    • 2010
  • RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from malicious attackers. For that reason, Brands, et al. proposed a certification protocol between a certifier and a verifier based on the concept of distance-bounding, and in addition Hancke et al. introduced the concept of RFID. However, the delivery of tag IDs, one of the main RFID features, is not still available, and there are two important demerits: anonymity in the delivery of tag IDs suggested by Kim et al. and inefficiency in finding a tag ID with regard to how to check errors which may occur in the process of data exchange between readers and tags. Therefore, this study proposes a protocol that meets the requirements of tag anonymity and location untraceability, has resistance to errors which may take place in the phase of tag data exchange, and is very efficient in finding tag IDs.

The Effects of Substrate, Metal-line, and Surface Material on the Performance of RFID Tag Antenna

  • Cho, Chi-Hyun;Choo, Ho-Sung;Park, Ik-Mo
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.1
    • /
    • pp.47-52
    • /
    • 2007
  • We investigated the effects of substrate, metal-line, and surface material on the performance of radio frequency identification(RFID) tag antenna using a tag antenna with a meander line radiator and T-matching network. The results showed that readability of the tag antenna with a thin high-loss substrate could be increased so that it was similar to that of a low-loss substrate if the substrate was very thin. The readability of the tag antenna decreased significantly when the metal line was thinner than the skin depth. The readability of the tag also decreased drastically when the tag was attached to high-permittivity high-loss target objects.

Auto Sushi Conveyer-Belt Payment System Using UHF RFID Dishes (UHF RFID 접시를 사용한 자동회전초밥 자동결제시스템)

  • Nam, Seahyeon;Yim, Yongho;Jung, Haeyong;Seok, Juwan;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1225-1229
    • /
    • 2014
  • This paper introduces a development of the auto sushi conveyer-belt payment system using UHF RFID dishes. In a sushi bar, instead of counting the number of the finished sushi dishes, sushi dishes with the UHF RFID have been used in the auto payment system to have accuracy and convenience. To recognize each dish, the UHF RFID tag has been designed, and auto-payment system has been developed. The UHF RFID tag under the dish has been recognized by an RFID reader, and the auto RFID payment system shows the total price of the finished dishes based on the color and number of dishes automatically. The performance of the developed UHF RFID tag and auto RFID payment system have been measured and verified.

Dual-band RFID Tag Antenna Applicable for RF Power Harvester System (RF 에너지 충전 시스템 기능을 위한 이중대역 RFID 태그 안테나)

  • Mun, Byeonggwi;Rhee, Changyong;Kim, Jae-Sik;Cha, Junghoon;Lee, Byungje
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.5
    • /
    • pp.46-51
    • /
    • 2013
  • In this paper, a dual-band antenna is proposed for the RF power harvester system as well as RFID tag. The proposed antenna operates as the passive and active RFID tag antenna in the UHF and microwave band, respectively. In addition, to charge the battery of an active RFID tag in the microwave band, it harvest the RF signal for tagging from the passive RFID tag antenna in the UHF band. The proposed antenna operates in the UHF band (917~923.5 MHz) and microwave band (2.4~2.45 GHz). In order to obtain the dual-band operation, the dipole structure and meander parasitic elements are proposed as the ${\lambda}/2$ and $1{\lambda}$ dipole antenna, respectively. The radiating dipole structure in the microwave band acts as the coupled feed for the meander parasitic elements in the UHF band. The impedance bandwidth (VSWR < 2) of the proposed antenna covers 917~923.5 MHz (UHF band) and 2.4~2.45 GHz (Microwave band). Measured total efficiencies are over 45 % in the UHF band and over 70 % in the microwave band. Peak gains are over 0.18 dBi and 2.8 dBi in the UHF and microwave band with an omni-directional radiation pattern, respectively.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

A Hypertension Management Healthcare System in Mobile Environment (모바일 환경에서의 고혈압관리 헬스케어 시스템)

  • Lee, Mal-Rey;Kim, Eun-Gyung;Lee, Jae-Wan;Zang, Yu-Peng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.552-558
    • /
    • 2010
  • This is an example of ABSTRACT format. This study proposes a hypertension management system that implements a signal collision avoidance algorithm for RFID tags and enables accurate medical services for hypertension patients. The proposed system enables the mobile RFID reader to accurately recognize the RFID tag signals emitted from the patient by using OR logic. Moreover, the system adopts a multi-agent approach to provide and manage information on patient condition and automated medical service in a mobile environment.

The printing tag for activation of RFID industry (RFID확산을 위한 Printing TAG)

  • Kim, Ji-Tae
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2007.11a
    • /
    • pp.109-115
    • /
    • 2007
  • Instead of existing bar code system, RFID is now the core sensor technique of Ubiquitous computing and it will bring a revolution of corporation's logistics systems. In recent years, RFID becomes the center of government and other related companies and furthermore, its basic and applied techniques and have been established as various international standards. Many major countries announced application cases in various fields and concentrate their effort to make new RFID technologies as well. Recently Korean government announced the basic plan of u-Korea and all-out plan of activation of RFID/USN. SO in this paper, we will discuss two things; the trends of RFID technologies and the printing tag technique, which is needed to spread of RFID item units.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

A STUDY FOR RFID APPLICATION OF CONSTRUCTION MATERIALS

  • Choong-Han Han ;Ki-Bum Ju
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1155-1160
    • /
    • 2009
  • The trend in construction industry, now, lies in improving efficiency and competitive power in construction management and on-the-spot instruction by combining with new IT technology. Above all, it is safe to say that the application of RFID technology can play a pivotal role at this point, but it is not that easy to apply RFID due to the physical, chemical and environmental peculiarities of construction materials. Thus, a study on the standardization of the usable frequency, specifications, protocol, and package administration is required. This study, as part of the study on the standardization, figured out the restrictions by attaching the existing RFID Tag to the construction materials, turned out the prototype of RFID Tag to perform a field test. In result the effective recognition range varies according to the physical and environmental peculiarities of construction materials; and the management efficiency varies as the attaching method and/or applying method. To analyze the management method (media, process etc.) systematically for the existing construction materials; to prepare more various restrictions and its solutions for practical construction spots will be the key for successful RFID implementation.

  • PDF

Optimal Time Structure for Tag Cognizance Scheme based on Framed and Slotted ALOHA in RFID Networks (RFID 망에서 프레임화 및 슬롯화된 ALOHA에 기반한 Tag 인식 방식을 위한 최적 시간 구조)

  • Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.9
    • /
    • pp.29-36
    • /
    • 2010
  • Consider an RFID network configured as a star such that a single reader is surrounded by a crowd of tags. In the RFID network, prior to attaining the information stored at a tag, the reader must cognize the tags while arbitrating a collision among tags' responses. For this purpose, we present a tag cognizance scheme based on framed and slotted ALOHA, which statically provides a number of slots in each frame for the tags to respond. For the evaluation of the cognizance performance, we choose the cognizance completion probability and the expected cognizance completion time as key performance measures. Then, we present a method to numerically calculate the performance measures. Especially, for small numbers of tags, we derive them in a closed form. Next, we formulate a problem to find an optimal time structure which either maximizes the cognizance completion probability under a constraint on the cognizance time or minimizes the expected cognizance completion time. By solving the problem, we finally obtain an optimal number of slots per frame for the tags to respond. From numerical results, we confirm that there exist a finite optimal number of slots for the tags to respond. Also, we observe that the optimal number of slots maximizing the cognizance completion probability tends to approach to the optimal number of slots minimizing the expected cognizance completion time as the constraint on the cognizance time becomes loose.