• Title/Summary/Keyword: Wireless identification system

Search Result 205, Processing Time 0.029 seconds

A Study on Displaying the Flag for Indicating the Nationality of Ships (선박 국적 표시를 위한 국기 게양에 대한 고찰)

  • Yun, Gwi-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.4
    • /
    • pp.465-473
    • /
    • 2021
  • Since the past, ships have hoisted national flags as a means of indicating their nationality. Both domestically and internationally, laws and conventions related to the nationality and hoisting of the flag have been enacted because it is significant that the nationality of a ship is a matter of the jurisdiction of the ship. Nevertheless, there are differences in domestic and international regulations related to the hoisting of the flag of a ship, and if the flag is not hoisted irrespective of the intention, there may be a difference in interpretation as to whether or not the ship will be regarded unconditionally as a stateless ship. However, there is no disagreement locally or abroad about the necessity of indicating the nationality of ships. Therefore, I would like to propose a method to indicate and confirm the nationality of the ship by using wireless communication equipment with hoisting the flag as the only way to express its nationality, reflecting the situation of the era such as high-speed, larger and unmanned ship. Representatively, the method utilizes the automatic identification system(AIS), which is one of the equipment legally installed in the ship, and includes the ship's nationality in its information. If the nationality information is included in the AIS, nationality can be identified earlier and even from a distance, and there will not be instances of nationality not being identified because the flag is not hoisted or the flag is damaged. In addition, it is expected that the problem of nationality indication can be solved even when vessels are unmanned in future.

The data transmission of the of u-lD sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-lD센서네트워크 구성에서의 데이터 전송)

  • Kim Young-kil;Park Ji-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.242-246
    • /
    • 2005
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. his paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Detection Probability Evaluation of ORCOMM LEO Satellite AIS for Maritime-Terrestrial Integrated Wireless Communications (해상육상통합 무선통신환경에서 오브컴 저궤도위성 AIS시스템 성능평가)

  • Moon, Min-Woo;Kim, Kyung-Sung;Lee, Jin-Seok;Lee, Yeon-Woo;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.868-877
    • /
    • 2011
  • In this paper, the feasibility of ORBCOMM satellite-based automatic identification system (SAT-AIS) is evaluated in the context of ship AIS slot collision probability depending on reporting rate, We evaluate detection probability evaluation of ORBCOMM satellite-based AIS considering link budget, SOTDMA protocol and satellite's swath width. The simulation determines the total number of vessels served by ORBCOMM satellite according to satellite's swath width, AIS slot allocation and reporting rate. By simulation results, the ORBCOMM satellite-based AIS slot collision is increased directly proportional to the total number of vessels and the more detection probability evaluation of ORBCOMM satellite-based AIS degrader, the more sip AIS reporting rate shorter.

The data transmission of the of u-ID sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-ID센서네트워크 구성에서의 데이터 전송)

  • 김영길;박지훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.45-48
    • /
    • 2004
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. this paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server

  • PDF

Monitoring of Tidal Sand Shoal with a Camera Monitoring System and its Morphologic Change (카메라를 활용한 조석사주 관측시스템 구축 및 지형변화)

  • Lee, Soong-Ji;Lee, Guan-Hong;Kang, Tae-Soon;Kim, Young-Taeg;Kim, Tea-Lim
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.326-333
    • /
    • 2015
  • A tidal sandshoal, called 'Puldeung' in the Daeijackdo Marine Protected Area(DMPA), is facing erosion due to sand mining in the nearby coastal region. To monitor the morphologic change and erosion of Puldeung, a camera monitoring system was established at the top of Song-Ee Mountain in Daeijack Island. The system consists of 2 Cannon digital cameras, Eye-fi memory card/Long-Term Evolution wireless network, and solar power supply. The acquired camera images were analyzed to obtain the area of Puldeung by the following methods: geometric correction of image, identification of shoreline, areal measurement of Puldeung and its error estimation. To compare the Puldeung area with previously measured area of 1.79 km2 at tidal height of 137 cm in 2008 and of 1.59 km2 at tidal height of 148 cm in 2010, we selected images with same tidal heights. The Puldeung area was 1.37 and 1.23 km2 at the tidal height of 137 and 148 cm, respectively. The erosion at DMPA is very severe and thus it is imperative to initiate the morphodynamical study on the seasonal variation and long-term evolution of Puldeung as well as the causes and measures of Puldeung erosion.

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

Design and Performance Evaluation of Two-Layered Microwave Absorbers(Dielectric/Magnetic) for Wide Oblique Incidence Angles Used for ITS (ITS용 2층형 전파 흡수체(유전체/자성체) 설계 및 경사 입사 흡수 특성 해석)

  • Kim, Jae-Woong;Kim, Sung-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.11
    • /
    • pp.1217-1223
    • /
    • 2007
  • Advanced microwave absorbers for wide oblique incidence angles are required in many applications including wireless communication or vehicle identification in ITS(Intelligent Transport System) where 5.8 GHz DSRC(Dedicated Short Range Communication) system is applied. In this study, two-layered microwave absorber(with a laminate structure of dielectric/magnetic composites) has been designed for the achievement of low reflection coefficient over wide incidence angles at 5.8 GHz. Iron flake particles are used as the filler in the absorbing layer, and the magnetic composite sheet exhibits high magnetic loss due to ferromagnetic resonance in gigahertz frequencies. The surface layer of low dielectric constant containing small amount of carbon black is used as the impedance transformer. On the basis of transmission line theory, the reflection loss has been calculated for the two-layer structure with variation of incident angles for both TE(Transverse Electric) and TM(Transverse Magnetic) polarizations. At the optimum thickness of the composite layers, a low value of reflection loss(less than -10 dB) has been predicted for wide incidence angles up to $55^{\circ}$ which is in good agreement with the measured value determined by free-space measurement.