• Title/Summary/Keyword: USN/RFID

Search Result 410, Processing Time 0.024 seconds

Open-Ended Two-Strip Meander-Line Antenna for RFID Tags

  • Son, Hae-Won;Choi, Gil-Young;Pyo, Cheol-Sig
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.383-385
    • /
    • 2006
  • A new meander-line antenna consisting of two open-ended strips is proposed for a compact and broadband UHF radio frequency identification tag. An equivalent circuit model for the proposed antenna is derived and used to perform a simple and wideband impedance match to an arbitrary complex impedance of a tag chip without any additional matching network. The performance of the proposed antenna is validated by comparing calculated and measured results, which show good agreement.

  • PDF

Design and Implementation of a Power-Saving Management System using Intelligent Scheduler based on RFID/USN Technology (RFID/USN 기술 기반의 지능형 스케줄러를 이용한 절전관리 시스템 설계 및 구현)

  • Jeong, Kyu-Seuck;Choi, Sung-Chul;Jeong, Woo-Jeong;Kim, Tae-Ho;Kim, Jong-Heon;Seo, Dong-Min;Park, Yong-Hun;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.64-76
    • /
    • 2009
  • Recently, the ubiquitous environment and the practical technology associated with it become more popular topic along with the rapid development of wireless technologies. The necessity of the automated system based on the ubiquitous environment has been increasing when the concept of the ubiquitous is integrated into the fields of existing IT. Also, the necessity of formulating a power-saving plan on large buildings and public institutions is gathering strength because of a raise in exchange rates and high oil prices. In this paper, to efficiently manage the power consumption of the electronic machine such as electric lights, electric heaters, and air conditioners in a building, power-saving manage- ment system using RFID/USN technologies is proposed. Proposed system controls the electric machine and monitor it's condition by RFID and collects the real time information about the surrounding and the power consumption of the electric machine by USN. Especially, proposed system analyzes the real time information and supports the intelligent scheduler with the best power-saving. Finally, this paper shows the difference between proposed system and existing system and establishes thereality of our system through experiments in variety environments.

A Study on The Management of A Building by Applying RFID/USN (RFID/USN의 적용을 통한 건축물 관리 방안)

  • Ju, Hyun-Tae;Kim, Kyung-Hwan;Lee, Yoon-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.331-336
    • /
    • 2007
  • The importance of a building management is embossed at construction industry and the concernment about a lengthening longevity and a efficient management of construction project is concentrated. At present, a study about maintenance management of existing building is progressed and normal papers concentrate in partial construction project for showing management method. This paper proposes Management method that make use of RFID/USN at the whole course of construction project that is composed plan, design, supply, construction, operation, maintenance management and so on. First of all, this paper analyzes process and applicable scope of RFID/USN at construction project. At each step, use scope, location, method and so on are decided at plan, design step and equipment, human power, materials and so on are established at supply step. real time progress, human power, safety, material, equipment management and so on put in operation at construction step and building is managemented real time by established sensor tag and wireless sensor network. This paper want to helps efficient project progress and management and presents convenience of maintenance management.

  • PDF

Analysis of RFID/USN Technology based Infrastructure Asset Management (사회기반시설물 자산관리에 RFID/USN 기술의 도입 방안)

  • Kim, Jung-Ryul;Chae, Myung-Jin;Park, Jae-Woc;Lee, Giu;Cho, Moon-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.772-775
    • /
    • 2008
  • According to Korean Ministry of Land, Transportation and Maritime Affairs, total national SOC(Social Overhead Capital) stock comes up to 500 billion dollars. Until now, although the construction of SOC is more important than the maintenance of them in Korea, it is necessary to introduce of valuation based total asset management concept in nowadays. In this paper describes problems of exsiting data collection method, needs of Information Technology and introduction of RFID/USN(Radio Frequency IDentification/Ubiquitous Sensor Network) in data collection stage.

  • PDF

Performance Analysis of a LoRa Device on Duty Cycle Local Regulation of Korean RFID/USN Frequency Band (국내 RFID/USN 주파수 대역의 Duty Cycle 기술기준 하에서 LoRa 기기의 성능 분석)

  • Yoon, Hyungoo;Um, Jungsun;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.113-119
    • /
    • 2017
  • In this paper, we have shown the performance analysis results of the LoRa low power wide area network under duty cycle local regulation in Korean RFID/USN frequency band. Especially, we analyzed uplink throughput and data transmission time of a single LoRa end device. From the analysis results, duty cycle regulation, in which a data transmission should be ended within 0.4 second, limits the performance of LoRa network. Therefore, it is necessary to revise Korea's duty cycle regulation referencing EU regulation in order to assess LoRa network in Korea.

Security Protocol Design and Analysis for passive RFID Tag (수동형 RFID 태그를 위한 보안 프로토콜 설계 및 분석)

  • Kim, In-Seop;Lee, Byung-Gil;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.52-54
    • /
    • 2005
  • 모든 사물에 고유 식별 정보(Unique Product Identifier)가 부착되어 사물의 개별 관리 및 컴퓨팅 환경을 구성하는 RFID(전자식별) 기술이 다양한 응용 및 구현 기술을 위해 활발하게 연구되고 있다. 하지만 수동형 태그 기반 RFID 시스템은 태그 자체의 자원 제약성 때문에 인가되지 않은 사용자에 의한 악의적인 태그 점보 노출이 용이하고, 그 결과 개인의 프라이버시 및 정보의 기밀성이 위협받게 된다. 비록 이를 예방하기 위해 다양한 보호 기법이 제안 되고 있지만 수동형 태그에 적용하기 힘들거나(예: Hash 기반 메카니즘) 보안에 취약하다. 따라서 본 논문에서는 태그 코드 암호화와 리더 인증 관리를 통해서 수동형 태그에 적합하고 프라이버시 보호 및 기밀성을 제공할 수 있는 메카니즘을 제안하고자 한다.

  • PDF

Design of the Secure and Efficient Library Circulation System based on Moblie RFID (모바일 RFID 기반의 안전하고 효율적인 도서대출시스템 설계)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.233-236
    • /
    • 2013
  • 현대사회가 언제 어디서나 정보를 주고 받는 유비쿼터스 사회로 변화하면서 센싱기술, 통신기술, 서비스 기술 등을 이용하여 우리가 볼 수 있는 모든 사물을 사람과 통신 가능하게 해주는 IoT기술이 부각되고 있다. IoT는 일반적으로 사람의 관여 없이 사물 간에 이루어지는 통신을 뜻하는 것으로 국내에선 개념적으로 USN기술과 흡사하다. 본 논문에서는 USN 분야 중 하나인 모바일 RFID 기술을 이용한 도서 대출 시스템을 제안하고 무선으로 정보를 주고 받는 모바일 RFID의 특성을 고려하여 태그와 리더 간의 인증 프로토콜을 제시한다.

  • PDF

Trends of RFID Technology and Applications for Marine Information Systems (전자태그의 기술동향과 해양정보시스템에의 활용방안에 관한 연구)

  • Jeong, Jung-Sik;Jong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.11 no.1 s.22
    • /
    • pp.39-45
    • /
    • 2005
  • Recently, RFID technology play a key role to implement ubiquitous sensor network(USN). In this paper, we introduce trends of RFID technology, standardization, and then its applications. The purpose of this work is to suggest prosperous applications of RFID, which is applicable on marine information system, such as ship inventory management, management of container and its contents, sensing of environments within cargo hold, management of fishery boats. In case that RFID technology is utilized on marine information systems, it makes safety at sea and marine environments protection.

  • PDF

The Study of Sensor Network for Information Retrieval and Communication protocol High Performance (센서네트워크의 정보검색 및 통신프로토콜 성능향상에 관한 연구)

  • Kang, Jeong-Yong;Kwon, Hyuk-Dae;Roh, Yong-Gi;Kim, Byoung-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.529-532
    • /
    • 2011
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

  • PDF

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.