• Title/Summary/Keyword: Wireless identification system

Search Result 205, Processing Time 0.025 seconds

Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals

  • Kim, Young-Han;Ahn, Hyun-Seok;Yoon, Changseok;Lim, Yongseok;Lim, Seung-ok;Yoon, Myung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1250-1264
    • /
    • 2017
  • This paper presents the architecture design, implement, experimental validation of a bistatic backscatter wireless communication system in Wi-Fi network. The operating principle is to communicate a tag's data by detecting the power level of the power modulated Wi-Fi packets to be reflected or absorbed by backscatter tag, in interconnecting with Wi-Fi device and Wi-Fi AP. This system is able to provide the identification and sensor data of tag on the internet connectivity without requiring extra device for reading data, because this uses an existing Wi-Fi AP infrastructure. The backscatter tag consists of Wi-Fi energy harvesting part and a backscatter transmitter/a power-detecting receiver part. This tag can operate by harvesting and generating energy from Wi-Fi signal power. Wi-Fi device decodes information of the tag data by recognizing the power level of the backscattered Wi-Fi packets. Wi-Fi device receives the backscattered Wi-Fi packets and generates the tag's data pattern in the time-series of channel state information (CSI) values. We believe that this system can be achieved wireless connectivity for ultra- low-power IoT and wearable device.

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

Gateless System in the Subway station (전철역에서의 Gateless 시스템)

  • Lee, Yong-Jea;Kim, Do-Hun;Lee, Kyo-Sung;Oh, Se-Ho;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2002.07b
    • /
    • pp.1211-1213
    • /
    • 2002
  • We have frequently felt it inconvenient to collect fare drawing the card in transportation system. Especially, for subway the fares of mass transportation at rush hours of the days, it's important to find a way to collect fares without unnecessarily delaying passengers. In this paper, we proposed a system for the gateless fare collection passing through the booth in only carrying the card. In this system that RF-ID system and Bluetooth are applied. We designed two wireless communication channels. One is the 125kHz communication channel by FSK and PSK for power supplying on the card and identification and the other is 2.4GHz channel for the collection.

  • PDF

Interface of Tele-Task Operation for Automated Cultivation of Watermelon in Greenhouse

  • Kim, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.28 no.6
    • /
    • pp.511-516
    • /
    • 2003
  • Computer vision technology has been utilized as one of the most powerful tools to automate various agricultural operations. Though it has demonstrated successful results in various applications, the current status of technology is still for behind the human's capability typically for the unstructured and variable task environment. In this paper, a man-machine interactive hybrid decision-making system which utilized a concept of tole-operation was proposed to overcome limitations of computer image processing and cognitive capability. Tasks of greenhouse watermelon cultivation such as pruning, watering, pesticide application, and harvest require identification of target object. Identifying water-melons including position data from the field image is very difficult because of the ambiguity among stems, leaves, shades. and fruits, especially when watermelon is covered partly by leaves or stems. Watermelon identification from the cultivation field image transmitted by wireless was selected to realize the proposed concept. The system was designed such that operator(farmer), computer, and machinery share their roles utilizing their maximum merits to accomplish given tasks successfully. And the developed system was composed of the image monitoring and task control module, wireless remote image acquisition and data transmission module, and man-machine interface module. Once task was selected from the task control and monitoring module, the analog signal of the color image of the field was captured and transmitted to the host computer using R.F. module by wireless. Operator communicated with computer through touch screen interface. And then a sequence of algorithms to identify the location and size of the watermelon was performed based on the local image processing. And the system showed practical and feasible way of automation for the volatile bio-production process.

RFID Applications in Product Lifecycle Management (PLM) (제품 라이프 사이클 관리에서 RFID 응용에 관한 연구)

  • Jun, Hong-Bae
    • IE interfaces
    • /
    • v.19 no.3
    • /
    • pp.181-189
    • /
    • 2006
  • This study introduces an overall framework for RFID applications in product lifecycle management(PLM). PLM is a new strategic approach to manage product related information efficiently over the whole product lifecycle. Recently, with emerging technologies such as radio frequency identification(RFID), global positioning system(GPS), and wireless communication, PLM provides a new environment that enables us to gather and analyze product lifecycle information, and make decisions on several issues without spatial and temporal constrains. However, a PLM system just provides us with new opportunities to gain the PLM system, first and foremost, it is necessary to look into its overall framework in the viewpoint of hardware, software, and business model. For this purpose, in this study, first, we introduce the technical framework of the new PLM environment with the concept of extended RFID system, called product embedded information device(PEID). Then, for each lifecycle phase such as beginning of life(BOL), middle of life(MOL), and end of life(EOL), we explore several research problems that become highlighted under the new PLM environment.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

A Hybrid Hyper Query Tree Algorithm for RFID System (RFID 시스템을 위한 하이브리드 하이퍼 쿼리 트리 알고리즘)

  • Kim, Tae-Hee;Lee, Seong-Joon;Ahn, Kwang-Seon
    • The KIPS Transactions:PartA
    • /
    • v.15A no.5
    • /
    • pp.287-294
    • /
    • 2008
  • A tag collision arbitration algorithm for RFID passive tags is one of the important issues for fast tag identification, since reader and tag have a shared wireless channel in RFID system. This paper suggests Hyper-Hybrid Query Tree algorithm to prevent the tag-collisions. The suggested algorithms determine the specified point in time for tag to transfer ID to reader by using value 1 of the upper 3 bit based on Query Tree. Also, because the transferred upper 3 bits of tag is different depending on the time of transfer, it is possible to predict in the suggested Algorithm. In the performance evaluation through simulation, it shows the suggested algorithm has higher performance in the number of queries compared to other Tree-based protocols.

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

A Study on the Design of multimedia Service Platform on Wireless Intelligent technology (무선인식 기술기반 멀티미디어 서비스 플렛폼 설계에 관한 연구)

  • Kang, Myoung-Ku
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • The advancements in the infusion of broadcasting and communication and the radio frequency identification technology have made the next generation mobile communication service technology be recognized as an important technology in many different fields and demanded systems of practical service using the technology. Designed in the study was a multimedia platform that would increase the utilization efficiency of limited frequency resources, which made an important part of the next generation mobile communication technology using the radio frequency identification technology, search for vacant frequencies not generating interfering signals to the old frequency users, and consider the growth of infused and complex services. In order to implement the platform, the investigator applied STI as a research model to maximize the functions of a service system and improve reliability. And also suggested IDMA of information required for platform building to maximize the functions of a service system.

  • PDF

Hazard Identification and Risk Assessment for the Use of Passenger Portable Electronic Devices (승객 휴대 전자기기 사용에 대한 위해요인 식별 및 리스크 평가)

  • Lim, In-Kyu;Kim, Mu-Geun;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.4
    • /
    • pp.288-294
    • /
    • 2018
  • The entertainment system of the aircraft has changed its paradigm in the form of using passenger electronic devices instead of using a fixed monitor. This has simplified the on-board equipment while the risk of safety has increased with the electric charging of portable electronic devices. Unlike personal portable electronic devices that do not have a transmission function, the use of Wi-Fi enabled electronic devices(T-PED) is allowed and the battery is required to be charged in the cabin. In this study, we used the NASA Aviation Safety Reporting System to investigate the effects of changes in wireless environment and entertainment service. Based on this, we analyzed the risks of personal electronic devices by sharing event occurrence cases caused by in-flight electronic equipment or passenger portable electronic devices(especially smart phones) from the viewpoint of aircraft safety management. This analysis includes identification of potential hazards and risk assessment, and finally the strategies for risk mitigation for safe use of portable electronic devices are suggested.