• Title/Summary/Keyword: Radio-tracking

Search Result 265, Processing Time 0.026 seconds

Assessing the Impact of RFID based materials tracking - Focusing on Curtain-Wall Work - (RFID 기반 물류 관리의 적용 효과 분석 - 커튼월 공사를 중심으로 -)

  • Yoon, Su-Won;Chin, Sang-Yoon;Kim, Yea-Sang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.1
    • /
    • pp.24-35
    • /
    • 2012
  • RFID-based logistics is increasingly adopted in various areas of the construction industry as a technology that can improve effectiveness and efficiency of construction logistics. However, the technology is not widely adopted yet compared to the potential of RFID applications in the construction industry that the existing research has shown. Since the validation and verification of the benefit from RFID applications were biased toward the productivity of managers, more wide aspect of validation and verification is necessary. Therefore, the objective of this paper is to show how much impact the RFID-based logistics management system can have on resource leveling and allocation that have a direct impact on a construction project as well as the managers' productivity improvement that was shown by the existing research. This paper also discusses issues arisen during the test process.

MES for the Product Tracking using RFID and Bayesian network (RFID와 베이지안 네트워크를 이용한 제품추적 MES)

  • Kim, Bong-Seok;Lee, Hong-Chu;Cheon, Hyeon-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.211-221
    • /
    • 2006
  • Manufacturing Execution System(MES) immediately enables users to share the information of systems industrywide, efficiently manages synthetic information with data collection through treating the data in a fast way, and helps their decision-making. MES for real-time information processing requires certain conditions such as data modeling of RFID, which has recently attracted attentions, and monitoring of each product unit from manufacture to sales. However, in the middle of processing the unit with a RFID tag, transponders(readers) can't often read the tag due to reader's malfunctions, intentional damages, loss and the circumstantial effects; for that reason, users are unable to confirm the location of the product unit. In this case, users cannot avoid tracing the path of units with uncertain clues. In this paper we suggest that the unique MES based on RFID and Bayesian Network can immediately track the product unit, and show how to evaluate it.

  • PDF

Implementation of RFID-based Information Management System for Bullfights (싸움소를 위한 RFID 기반 정보 관리시스템의 구현)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.768-774
    • /
    • 2008
  • This paper implements a information management system for a bullfights using RFID technology in which the objects containing electronic tag are automatically identified by using radio frequency wave. The presented system is composed of the information systems for career and train, and the real-time informant system to provide various informations to remote bull breeders and administers. As the first step for implementation, we analyze the requirements for information management systems based on the RFID and suggests design considerations. Based on the analysis, we implement an efficient RFID middleware system for tracking a tag location based on antenna transfer method and managing an intelligent tag information which efficiently manages a bullfight informations in field. And we also implement the web-based integrated management system for managing and providing a bullfight informations. The career management system sequentially recognizes a tags, and the training system concurrently recognizes the man tags.

Wi-Fi Fingerprint Location Estimation System Based on Reliability (신뢰도 기반 Wi-Fi 핑거프린트 위치 추정 시스템)

  • Son, Sanghyun;Park, Youngjoon;Kim, Beomjun;Baek, Yunju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.6
    • /
    • pp.531-539
    • /
    • 2013
  • Fingerprinting technique uses the radio signal strength measured reference locations is typically used, although there are many Wi-Fi based location tracking techniques. However, it needs numerous reference locations for precision and accuracy. This paper the analyzes problems of previous techniques and proposes a fingerprinting system using reliability based on a signal strength map. The system collects the signal strength data from a number of reference locations designated by the developer. And then it generates path-loss models to one of the access points for each reference location. These models calculate the predicted signal strength and reliability for a lattice. To evaluate proposed method and system performance, We perform experiments in a $20m{\times}22m$ real indoor environment installed access points. According to the result, the proposed system reduced distance error than RADAR. Comparing the existing system, it reduced about 1.74m.

An improvement algorithm for localization using adjacent node and distance variation analysis techniques in a ship (근접노드와 거리변화량분석기법을 이용한 선내 위치인식 개선 알고리즘)

  • Seong, Ju-Hyeon;Lim, Tae-Woo;Kim, Jong-Su;Park, Sang-Gug;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.213-219
    • /
    • 2013
  • Recently, with the rapid advancement in information and communication technology, indoor location-based services(LBSs) that require precise position tracking have been actively studied with outdoor-LBS using GPS. However, in case of a ship which consists of steel structure, it is difficult to measure a precise localization due to significant ranging error by the diffraction and refraction of radio waves. In order to reduce location measurement errors that occur in these indoor environments, this paper presents distance compensation algorithms that are suitable for a narrow passage such as ship corridors without any additional sensors by using UWB(Ultra-wide-band), which is robust to multi-path and has an error in the range of a few centimeters in free space. These improvement methods are that Pythagorean theory and adjacent node technique are used to solve the distance error due to the node deployment and distance variation analysis technique is applied to reduce the ranging errors which are significantly fluctuated in the corner section. The experimental results show that the number of nodes and the distance error are reduced to 66% and 57.41%, respectively, compared with conventional CSS(Chirp spread spectrum) method.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

A Study on the Logistics Information Synchronization based Smart SCM Model (물류정보동기화 기반의 Smart SCM 모델에 관한 연구)

  • Kim, JangGoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.311-318
    • /
    • 2013
  • Recently, there have been many studies on RFID-based SCM. Yet, studies of synchronizing errors caused by tracking logistics information in supply chain, and activating & monitoring RFID infra is still insufficient. Also, there is no case of developing the intelligent SCM system enabling total monitoring and controlling RFID Infra by applying these technologies. Logistics information synchronization based Smart SCM model is intelligent supply chain service model to monitor the status of the RFID equipments in supply chain and the synchronization of the logistics process in each logistics point through one integrated view, as well as to react instantly by providing the information to help the various decision makings, when the emergency occurs. By adopting global logistics standard, RFID related standard specification, EPCIS standard, and SSI middleware platform, this model provides the domestic standard specification.

Intelligent Production Management System with the Enhanced PathTree (개선된 패스트리를 이용한 지능형 생산관리 시스템)

  • Kwon, Kyung-Lag;Ryu, Jae-Hwan;Sohn, Jong-Soo;Chung, In-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.621-630
    • /
    • 2009
  • In recent years, there have been many attempts to connect the latest RFID (Radio Frequency Identification) technology with EIS (Enterprise Information System) and utilize them. However, in most cases the focus is only on the simultaneous multiple reading capability of the RFID technology neglecting the management of massive data created from the reader. As a result, it is difficult to obtain time-related information such as flow prediction and analysis in process control. In this paper, we suggest a new method called 'procedure tree', an enhanced and complementary version of PathTree which is one of RFID data mining techniques, to manage massive RFID data sets effectively and to perform a real-time process control efficiently. We will evaluate efficiency of the proposed system after applying real-time process management system connected with the RFID-based EIS. Through the suggested method, we are able to perform such tasks as prediction or tracking of process flow for real-time process control and inventory management efficiently which the existing RFID-based production system could not have done.