• Title/Summary/Keyword: Reader Protocol

Search Result 175, Processing Time 0.025 seconds

The Cooperate Middleware System based on Web-Service for Logistics Information Process with Applies RFID (RFID를 활용하여 물류정보 처리를 위한 웹 서비스 기반의 연동 미들웨어 시스템)

  • Kim, Yei-Chang;Park, Myung-Soo
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.1-13
    • /
    • 2007
  • Recently, RFID has emerged as the main technology in the logistic services. When the existing recognition technology based on bar codes brings about lots of problem due to its own limits. RFID becomes the center of attention to solve them. However, RFID is not without any obstacles: companies have their own operating systems, while RFID is developed regardless of each company's special features. RFID middleware system based on web service is expected to remove these obstacles. This paper shows how to operate the middleware based on web service and to lay in the DB the tag informations taken from reader system. Middle assures that companies adopting RFID system for their logistic service are given adaptability to any systems whatsoever, available by way of defining logistic information, tag information and reader information. For this purpose, we implement as the basic web service a middleware system that turns all data into XML(eXtensible Markup Language) of SOAP (Simple Object Access Protocol), the standard data.

  • PDF

The Construction of 365 Public Service System: Focus on the Case of Gwangju Seo-Gu (365민원서비스 시스템 구축에 관한 연구: 광주서구청 사례를 중심으로)

  • Kim, Oh-Sung;Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.83-90
    • /
    • 2007
  • Recently, RFID has emerged as the main technology in the logistic services. When the existing recognition technology based on bar codes brings about lots of problem due to its own limits. RFID becomes the center of attention to solve them. However, RFID is not without any obstacles: companies have their own operating systems, while RFID is developed regardless of each company's special features. RFID middleware system based on web service is expected to remove these obstacles. This paper shows how to operate the middleware based on web service and to lay in the DB the tag informations taken from reader system. Middle assures that companies adopting RFID system for their logistic service are given adaptability to any systems whatsoever, available by way of defining logistic information, tag information and reader information. For this purpose, we implement as the basic web service a middleware system that turns all data into XML(eXtensible Markup Language) of SOAP (Simple Object Access Protocol), the standard data.

  • PDF

RFID Mutual Authentication Protocol on Insecure Channel for Improvement of ID Search (ID 검색 개선을 위한 비보호채널상의 RFID 상호인증 프로토콜)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.121-128
    • /
    • 2010
  • In this paper, we proposed a new secure RFID(Radio Frequency IDentification) mutual authentication protocol on insecure communication channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol used a secure one-way hash function and the goal is to improve search time of a tag ID and overload of hash calculational load in DB. In addition, the proposed protocol supports not only basic security requirements to be provided by RFID mutual authentication protocol but also forward secrecy, and the tag does not generate a random number to reduce overload of processing capacity in it.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Development of Long-Range RFID Reader System supporting Sensor Tag (센서태그를 지원하는 장거리 RFID 리더 시스템 개발)

  • Shin, Dong-Beom;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.626-633
    • /
    • 2009
  • ISO/IEC/WD 24753 defines new modem specifications for a long-range RFID communications and application protocol for a sensor tag system. According to the standard, the frequency offset of the tag is 4%. In general wireless communications systems, it is known that a coherent receiver is superior to a non-coherent receiver. However, if the frequency offset is large, it is difficult to restore the original data accurately with a coherent receiver, and the performance of a coherent receiver is easily degraded. In this paper, a non-coherent receiver structure is adopted to solve the frequency offset problem of long-range RFID communications. We designed a frequency estimation block to find an optimal frequency from the received signal with 4% frequency offset and proposed a start frame delimiter (SFD) detection algorithm to determine the start position of the payload. The frequency estimation block finds the optimal frequency from the received signal using 9-correlators. And the SFD detection block searches the received signal to find the start position of the payload with dual correlator. We implemented a long-range RFID reader with the proposed methods and evaluated its performance in a wired/wireless test network. The implemented long-range RFID reader showed more superior performance than the commercial RFID reader in terms of recognition range.

A Secure RFID Multi-Tag Search Protocol Without On-line Server (서버가 없는 환경에서 안전한 RFID 다중 태그 검색 프로토콜)

  • Lee, Jae-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.405-415
    • /
    • 2012
  • In many applications a reader needs to determine whether a particular tag exists within a group of tags without a server. This is referred to as serverless RFID tag searching. A few protocols for the serverless RFID searching are proposed but they are the single tag search protocol which can search a tag at one time. In this paper, we propose a multi-tag search protocol based on a hash function and a random number generator which can search some tags at one time. For this study, we introduce a protocol which can resolve the problem of synchronization of seeds when communication error occurs in the S3PR protocol[1], and propose a multi-tag search protocol which can reduce the communication overhead. The proposed protocol is secure against tracking attack, impersonation attack, replay attack and denial-of-service attack. This study will be the basis of research for multi-tag serach protocol.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Comparative performance study of anti-collision protocols in RFID system Information and Communication Engineering (상대적인 RFID 시스템 정보와 커뮤니케이션 공학의 anti-collision 프로토콜에 대한 연구)

  • Karmacharya, Kishan;Choi, Young-Il;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.253-259
    • /
    • 2008
  • RFID is a generic term for technologies which use RF waves to identify, track, or categorize any object. A radio frequency identification (RFID) reader recognizes objects through wireless communications with RFID tags. Tag collision arbitration for passive tags is a significant issue for fast tag identification due to communication over a shared wireless channel. One of the research areas in RFID system is a tag anti-collision protocol. In this paper, various anti-collision protocols are discussed. The pros and cons of different anti-collision protocols are compared with each other and their performance is analyzed and the better performance anti-collision protocol is suggested.

  • PDF

Improvements of the Anti-collision Algorithms for Multi Tag Interrogation in RFID System (RFID 시스템에서 다중 태그 인식을 위한 충돌회피 알고리즘의 성능 개선에 관한 연구)

  • NamGung, Ho-Young;Min, Byoung-Taek;Jeon, Jun-Soo;Kim, Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1169-1172
    • /
    • 2005
  • In this paper, we propose an improved anti-collision algorithm for multi tag interrogation in ubiquitous sensor network(USN) and show the result of simulation for multi tag interrogation in RFID systems. We have analyzed an EPC(Electronic Product Code) protocol which specifies the physical and logical requirements for a passive-backscatter Reader-Talk-First(RTF) RFID(Radio Frequency Identification) system operating in the $860MHz{\sim}960MHz$ frequency range. We have also designed and implemented the simulator of the RFID system based on the EPC protocol. Finally, we find that proposed algorithm works better than an existing algorithm.

  • PDF