• Title/Summary/Keyword: radio frequency identification (RFID) identification

Search Result 765, Processing Time 0.03 seconds

Material Management Using Radio-Frequency Identification (RFID) in the Construction Industry

  • Kim Changwan;Huh Youngki;Kwon Soonwook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.1 s.17
    • /
    • pp.107-113
    • /
    • 2004
  • The advent of Radio Frequency Identification (RFID) technology has created new opportunities for improving the material management function in the construction industry and is starting to provide major improvements in the efficiency of the material management process. The objective of the research reported herein was to introduce the benefits of RFID technology on material management in the construction industry. RFID technology is discussed and various aspects of this technology are investigated. Potential RFID applications on material management proposed by Construction Industry Institute (CII) Breakthrough Strategy Committee (BTSC) and Fully Integrated and Automated Technology (FIATECH) are spelled out Finally, business analysis of RFID to estimate its impact is provided. It is concluded that there is a significant potential for improvement of material management function in the construction industry through the use of RFID.

Optimization for RFID Based on Construction Material Management System Using Genetic Algorithm (Genetic Algorithm을 이용한 RFID 건설 자재 관리 시스템 최적화)

  • Kim, Chang-Yoon;Kim, Hyoung-Kwn;Han, Seung-Heon;Park, Sang-Hyuk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.511-514
    • /
    • 2006
  • Material Management is one of the most important task in construction projects. More than 50% of the cost in a construction project is related to material management process. Material management method using RFID(Radio Frequency Identification) is now trying to the construction field. However, there are no enough researches on effective material management in terms of how and where RFID transponder should be installed and there are no other research that which optimization method can be used for effective installation. Therefore, this paper suggest that where and how RFID transponder can be installed on the appropriate position in construction fields using Genetic Algorithm optimization method.

  • PDF

Analysis and Implementation of RFID Security Protocol using Formal Verification (정형검증을 통한 RFID 보안프로토콜 분석 및 구현)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Han, Keun-Hee;Choi, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.7
    • /
    • pp.332-339
    • /
    • 2008
  • Radio Frequency Identification (RFID) technology is an important part of infrastructures in ubiquitous computing. Although all products using tags is a target of these services, these products also are a target of attacking on user privacy and services using authentication problem between user and merchant, unfortunately. Presently, it is very important about security mechanism of RFID system and in this paper, we analyze the security protocol among many kinds of mechanisms to solve privacy and authentication problem using formal verification and propose a modified novel protocol. In addition, the possibility of practical implementation for proposed protocol will be discussed.

RFID Mutual Autentication Protocol Using AES (AES를 이용한 RFID 상호인증 프로토콜)

  • Kim, Seok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1963-1969
    • /
    • 2012
  • Recently use of RFID(Radio Frequency Identification) tends to be rapidly increased and will be also extended throughout the whole life. Using radio-frequency data can be recognized automatically in the RFID system is vulnerable to personal information protection or security. And passive tags have a hardware problem is the limit for applying cryptographic. This paper presents an authentication protocol using AES and Nounce. After completing mutual authentication server to access and strengthen security vulnerability to the use of the Nounce, because safety in denial of service attacks.

Wireless Sensor Network Development using RFID for Agricultural Water Management (농업용수관리를 위한 RFID 기반 무선 센서 네트워크 개발)

  • Nam, Won-Ho;Kim, Tae-Gon;Choi, Jin-Yong;Kim, Jin-Taek;La, Min-Chul
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.53 no.5
    • /
    • pp.43-51
    • /
    • 2011
  • Irrigation facilities are spread over demand area in a low density and exposed in the field requiring efficient operation and maintenance. Thus, it could be more efficient to manage an irrigation system when it is with wireless sensor network (WSN) using RFID (Radio Frequency Identification) application. A WSN, a kind of ubiquitous sensor network composed of wireless network, RFID and database management system was developed for agricultural water management in terms of operational status and maintenance requirements. Identification code for RFID tag was designed and an application for RFID reader was developed for field data collection, and a database management system was constructed for managing irrigation facility attributes. The system was installed in I-dong irrigation districts in Gyounggi-province, Korea and the operated results showed the applicability of the WSN for agricultural water management.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

An Interactive Learning using Wearable Wireless RFID Glove (무선 RFID 장갑을 이용한 인터랙티브 학습)

  • Jung, Kyung-Kwon;Hyun, Kyo-Hwan;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.721-724
    • /
    • 2007
  • Radio Frequency IDentification (RFID) is increasingly popular technology with many application. The majority of applications of RFID deployed in supply-chain management. In this paper, we present a wireless RFID glove in interactive learning method. Objects tagged with a small passive RFID tag, can be sensed at short ranges by using wireless RFID glove. We describe the wireless RFID glove prototype, and present some interactive learning programs and games.

  • PDF

Performance Evaluation of Anti-collision Algorithms in the Low-cost RFID System (저비용 RFID 시스템에서의 충돌방지 알고리즘에 대한 성능평가)

  • Quan Cheng-hao;Hong Won-kee;Lee Yong-doo;Kim Hie-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.17-26
    • /
    • 2005
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects attached with electronic tags by using radio wave. For the implementation of an RFID system, an anti-collision algorithm is required to identify several tags within the RFID reader's range. Few researches report the performance trade-off among anti-collision algorithms in terms of the communications traffic between the reader and tags, the identification speed, and so on. In this paper, we analyze both tree based memoryless algorithms and slot aloha based algorithms that comprise of almost every class of existing anti-collision algorithms. To compare the performance, we evaluated each class of anti-collision algorithms with respect to low-cost RFID system with 96-bit EPC(Electronic Product Code). The results show that the collision tracking tree algorithm outperforms current tree based and aloha based algorithms by at least 2 times to 50 times.

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF