• Title/Summary/Keyword: Rfid tag

Search Result 1,210, Processing Time 0.025 seconds

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

Algorithms for Localization of a Moving Target in RFID Systems (RFID 시스템에서 이동체의 위치 추적을 위한 알고리즘)

  • Joo, Un-Gi
    • IE interfaces
    • /
    • v.23 no.3
    • /
    • pp.239-245
    • /
    • 2010
  • This paper considers a localization problem of a moving tag on RFID(Radio Frequency Identification) systems, where a positioning engine collects TDOA(Time-difference of Arrival) signal from a target tag to estimate the position of the tag. To localize the tag in the RFID system, we develop two heuristic algorithms and evaluate their performance in the estimation error and computational time by using randomly generated numerical examples. Based upon the performance evaluation, we can conclude our algorithms are valuable for localization the moving target.

Bolt Shape UHF RFID Tag Antenna for Insertion to a Tree (생목 삽입용 볼트 모양의 UHF RFID 태그 안테나 설계)

  • Chung, You-Chung;Jeon, Byung-Don
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.2
    • /
    • pp.270-273
    • /
    • 2012
  • A plastic bolt shape UHF RFID tag has been developed for a live tree. The UHF tag is designed and installed into the head part of the bolt, inserted into a tree for management of tree. If the tag antenna is installed near the high dielectric constant material, the impedance of the tag antenna will be changed, and the tag does not work. Therefore, the dielectric constants of wood and plastic bolt are considered for tag antenna design. The input reflection coefficient characteristics and the reading range patterns are measured and compared. This UHF RFID tag can be applied into a live tree, and the status and location of tree can be controlled with the RFID tag. This developed UHF tag can be applied to any applications and objects using a bolt.

Multichannel Anticollision Protocol for Improving Tag Collection Performance in Active RFID Systems (능동형 RFID 시스템에서 태그 수집 성능 향상을 위한 다중채널 기반 충돌방지 프로토콜)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Park, Shin-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.50-57
    • /
    • 2009
  • Tag collection is one of the major functions in RFID systems. In this paper, we propose a multichannel slotted-aloha anticollision protocol to mitigate the tag collision problem and improve tag collection performance in active RFID systems. In the proposed anticollision protocol, while an RFID reader transmits commands to multiple RFID tags via a common channel, it receives multiple tag responses over multiple channels simultaneously. We also implemented an active RFID system supporting the proposed anticollision protocol. In experiments with the implemented reader and 60 tags, the proposed dual-channel slotted-aloha anticollision protocol showed a large improvement in tag collection performance compared with the single-channel slotted-aloha anticollision protocol. With 60 tags, the average time spent on tag collection using the dual-channel anticollision protocol was 600.543 ms, which was 46.3% of the 1289.721 ms required using the single-channel anticollision protocol.

A Empirical Study on the Adoption of RFID Systems in the Food Industry's E2E Process - Focusing on the Methodology on the Tag Attachment via BMT - (식품산업의 E2E 프로세스상에서 RFID 시스템 적용방안에 관한 실증 연구 - BMT(Bench Mark Test)를 통한 태그 부착 방안을 중심으로-)

  • Shin, Hwa-Sung;Min, Cheon-Hong
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.149-158
    • /
    • 2009
  • Although current RFID technologies can provide wide advantages in food industry area, most food companies do not consider willingly adopting this technology yet. This paper will present how the effective implementation of RFID systems in food industry could be realized. To Measure the importance of RFID systems, this study utilized the BMT(Bench Mark Test) methodology using RFID systems that were composed of tag and reader. After conducting this study, it suggests the effective tag attachment methods on the objects. The results are shown that the excellent tag product is a RFCamp and a fixed reader of Thingmagic Mercury 4 is the best product. Also, a portable reader of Motorola MC9090-RFID is recommend to the highest product. Therefore, this test is useful for selecting the best RFID systems to the food industry area. In addition, this study displays the effective tag attachment method to each bottle that was used to the experiments in food industry. Therefore, this study is contributed to the not only importance in the government IT areas as a growth engine but also the importance for consumer as a right for the knowledge about the food quality.

  • PDF

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

An RFID Tag Anti-Collision Protocol for Port Logistics Systems (항만 물류 시스템을 위한 RFID 태그 충돌 방지 프로토콜)

  • Lee, Seong Ro;Lee, Yeonwoo;Joo, Yang-Ick
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.202-207
    • /
    • 2013
  • RFID technology is applied to port logistics applications since it monitors objects wirelessly without line of sight and constructs ubiquitous system with low cost. Changes of stock status in the warehouse environment make the technology more important for managing such frequent storing and un-storing. Although the RFID has beneficial characteristics of low cost and low complexity, simultaneous responses of RFID tags cause tag identification collision due to absence of elaborate medium access control scheme. Several algorithms have been proposed to overcome the tag collision problem. However, it is difficult to adopt the methods to the logistics systems that has varying loads since there was no consideration on RFID tag's mobility. Therefore, we propose an efficient RFID tag anti-collision protocol, and simulation results demonstrate performance improvement by using the proposed scheme.

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.