• Title/Summary/Keyword: Radio-frequency identification

Search Result 810, Processing Time 0.025 seconds

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.

Application of a REID-Based Monitoring System for the Concrete Pour Process (RFID를 응용한 콘크리트 타설 모니터링 시스템의 적용방안)

  • Moon, Sung-Woo;Hong, Seung-Moon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2007
  • A ubiquitous environment in construction should be developed integrating hardware and software systems. The objective of this paper is to study the feasibility of applying the RFID technology to the concrete pour process, and improve the effectiveness of data exchange A pilot system of u-CPS (Ubiquitous Concrete Pour System) has been developed to test the feasibility. The pilot can automatically generate the data for concrete pour work such as departure time, arrival time, concrete pour time. Construction managers can keep track of the progress of concrete pour work using the information. A case study was done for a building construction using the pilot system, the result of which demonstrated that the RFID-base system can help improve the effectiveness of data communication during the concrete pour process.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

A Position Tracking System Using Pattern Matching and Regression Curve (RFID 태그를 이용한 실내 위치 추적 시스템에 관한 연구)

  • Cho, Jaehyung
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.211-217
    • /
    • 2019
  • Location positioning systems are available in applications such as mobile, robotic tracking systems and Wireless location-based service (LBS) applications. The GPS system is the most well-known location tracking system, but it is not easy to use indoors. The method of radio frequency identification (RFID) location tracking was studied in terms of cost-effectiveness for indoor location tracking systems. Most RFID systems use active RFID tags using expendable batteries, but in this paper, an inexpensive indoor location tracking system using passive RFID tags has been developed. A pattern matching method and a system for tracing location by generating regression curves were studied to use precision tracking algorithms. The system was tested by verifying the level of error caused by noise. The three-dimensional curves are produced by the regression equation estimated the statistically meaningful coordinates by the differential equation. The proposed system could also be applied to mobile robot systems, AGVs and mobile phone LBSs.

RosettaNet based Business Integration Model for Enhancing Manufacturing Firm's Responsiveness (제조 기업의 대응성 향상을 위한 로제타넷 기반 비즈니스 통합 모델)

  • Park, Mok-Min;Park, Jeong-Ho;Shin, Ki-Tae;Park, Jin-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.89-101
    • /
    • 2010
  • In some industries, manufacturing firms' distinctive competences include not only product superiority but also service excellence. For example, in a highly volatile and dynamic market, flexibility and responsiveness are more valued than just the product cost. And sales order processing, in that respect is a very important process. However, previous studies on sale order processing have considered only due-date assignments or dealt with production scheduling to minimize production cost or delivery lead time. Due to recent advances in information technology, a new approach is possible in dealing with sales order processing. For example, RFID(Radio Frequency IDentification) and ubiquitous computing technology adds real time visibility and traceability to supply chain. In this study, we develop a new due-date re-negotiation process for sales order management and propose a new business integration model to support the re-negotiation process based on RFID, ubiquitous computing technology and RosettaNet's PIPs.

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.

Design and Analysis of Social Network Service Model Using a Ubiquitous Business Card (RFID가 내재된 비즈니스 카드를 활용한 유비쿼터스 사회 연결망 서비스 모델 설계 및 분석)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.75-95
    • /
    • 2009
  • The aim of this research is to design and analyze a social network service model using mobile RFID based business card. This paper suggests how the behavior of exchanging business cards will be changed in ubiquitous environment and designs a social networking service model using a ubiquitous business card, which embeds a RFID tag. We describe the scenarios and analyze a role, value and potential benefits of participants of the u-SNS service model. For the proof of the superiority and the feasibility of our model, we compare it with its related researches and products based on the calculation of the benefits and costs of the alternatives.

  • PDF

Performance Evaluation of Authentication Protocol for Mobile RFID Privacy (모바일 RFID 프라이버시를 위한 인증 프로토콜 성능 평가)

  • Eom, Tae-Yang;Yi, Jeong-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.618-630
    • /
    • 2011
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. Although the users can get the information about a certain product anytime anywhere, there is high probability that their privacy may be violated because their belongings with RFID tags can be scanned by other mobile readers at any time. Several RFID authentication schemes have been proposed to deal with these privacy issues. However, since the existing solutions require heavy computation on the tag side, most of them is not applicable to the general low-cost passive tags which do not have any processing unit. In this paper, we propose the efficient authentication scheme for mobile RFID system applicable to the passive tags as well as the active ones by the best use of computing capability of mobile devices. The proposed scheme satisfies the import security issues such as tag protection, untraceability, anti-traffic analysis. We also implement the proposed scheme on top of real smartphone for feasibility and show the experimental results from it.

Implementation of an Efficient Slotted CSMA/CA Anti-collision Protocol for Active RFID System (능동형 RFID 시스템을 위한 효율적인 Slotted CSMA/CA 충돌방지 프로토콜의 구현)

  • Joo, Jin-Hoon;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1013-1022
    • /
    • 2012
  • Tag collection is one of the major concerns in radio frequency identification(RFID) system. All tags in RFID reader's transmission range send response message back to the reader in response to collection request message on the given rf channel. When multiple tags respond simultaneously, tag-collision may occur. Tag-collision problem is one of the most important issues in active RFID performance. To mitigate this problem, frame slotted ALOHA(FSA) anti-collision protocol is widely used in active RFID system. Several studies show that the maximum system efficiency of FSA anti-collision protocol is 36.8%. In this paper, we propose an efficient slotted CSMA/CA protocol to improve tag collection performance. We compare our protocol to the FSA anti-collision protocol. For the experiment, an 433MHz active RFID system is implemented, which is composed of an RFID reader and multiple tags. We evaluated the tag collection performance using one RFID reader and 40 tags in the real test bed. The experimental result shows that proposed protocol improves the tag collection time, round and collision probability by 18%, 37.4% and 77.8%, respectively.