• Title/Summary/Keyword: tag trace

Search Result 29, Processing Time 0.038 seconds

Postal RFID Application Model and Performance

  • Park, Jeong-Hyun;Park, Jong-Heung
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.405-408
    • /
    • 2006
  • In this letter, we suggest a postal RFID application model and system architecture that can be used for real-time trace and tracking system implementation of parcel processing and pallet management. This letter also shows the tag recognition performance of parcels and pallets by speed and mounting tag materials such as cans, water, and paper using an implemented postal RFID system for postal logistics.

  • PDF

RFID Adaptation Model for Postal Logistics Environment (우편 물류 환경에서의 RFID 적용 모델)

  • Park, Jeong-Hyun;Lee, Boo-Hyung;Kim, Hwang-Rae;Kim, Young-Chun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.119-120
    • /
    • 2006
  • In this paper, we suggest postal RFID adaptation model, tag data structure and code which can be used for real time trace and track of parcel processing and pallet management. This paper also shows postal RFID application system architecture and testbed based on the proposed tag data structure and code, and shows recognition performance of tag on parcel and pallet by speed and mounting tag material such as can, water, and paper using implemented postal RFID system for postal logistics. The contribution of this paper is to stimulate deployment of RFID technology for postal logistics service and SCM (Supply Chain Management).

  • PDF

Tag Mis-recognition Detection using RFID Tag Sensitivity in Logistics System (물류 시스템에서 RFID 태그 수신감도를 이용한 태그 오인식 검출)

  • Kim, Youngmin;Kang, Euisun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.8
    • /
    • pp.9-17
    • /
    • 2015
  • One of RFID features is that each RFID tag has a unique identifying code. Logistic System utilizes RFID tag as location tracing, understanding stock or etc. On the other hand, there is a problem of overall lower recognition rate by getting the information of non-mobility tags with no need for reading. To solve this problem, we trace and analyze variation of moving and moveless RFID tag sensitivity by the hour. In analyzed data, we verify that tag sensitivity of mobile RFID is gradually increase while non-mobility tag has same intensity value. In order to detect mobile tag, we generate a function using Matlab with analyzed data and separate moving tags from non-mobility tags by software. As a result, we can confirm that non-mobility tags are detected by software and recognition rate of RFID tag is improved by separating moveless tag.

Designing Smart-tag based Logistics System with Intelligent Track and Trace Service

  • Oh, Se-Won;Park, Joo-Sang;Lee, Yong-Joon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.244-247
    • /
    • 2003
  • All over the value chain, a logistics information system must satisfy several requirements about gathering and sharing related information. For example, distributors or forwarders need up-to-date information for scheduling and managing their logistics resources. Meanwhile, consignors or consignees want to know the dynamic information about current states or location of their goods. Such information is dependent upon the quality of data sets collected throughout the logistics processes. Thus, gathering accurate data promptly is the essential factor for the success of a logistics information system. However, there are limits in reducing both time-gap and man-power for datn sourcing, since this process is done manually or by using bar codes and scanning devices. Smart-tag can be the alternative to such n time-consuming and inefficient operation, especially for handling piles of goods. The tag includes a micro-chip containing data which is remotely readable by readers with antenna. Logistics system with Smart tag can provide all the information anywhere and anytime, and it will increase the efficiency of logistics and satisfaction of users. In this paper, we propose a conceptual architecture for smart-tag based logistics system and describe its functions.

  • PDF

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

A Time Parameterized Interval Index Scheme for RFID Tag Tracing (RFID 태그의 추적을 위한 시간매개 변수간격 색인 기법)

  • Ban, Chae-Hoon;Hong, Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.56-68
    • /
    • 2006
  • For tracing tag locations, the trajectories should be modeled and indexed in radio frequency identification (RFID) systems. The trajectory of a tag can be represented as a line that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. If a tag enters but does not leave a reader, its trajectory is represented only as a point captured at entry. Because the information that a tag stays in a reader is missing from the trajectory represented only as a point, it is impossible to find the tag that remains in a reader. To solve this problem we propose the data model in which trajectories are defined as time-parameterized intervals and new index scheme called the Time Parameterized Interval R-tree. We also propose new insert and split algorithms that reduce the area of nodes to enable efficient query processing. We evaluate the performance of the proposed index scheme and compare it with previous indexes on various datasets.

Implementation of Multidimensional Trace System for Specific Object by RFID (RFID를 이용한 다차원 특정 객체 추적 시스템의 구현)

  • Min, So-Yeon;Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3694-3701
    • /
    • 2009
  • This paper suggests that location tracking system by RFID. It uses the location tracking and the authentication to entrance after inserts passive RFID tag into user Identification card. The readers periodically broadcast their signal, and then the readers understand where users are by analyzing them. In one of tracking systems, it is possible to detect the area where user had stayed for the longest time during moving according to signal power, to know user moved path and user next moving path. Also, it can be used in entrance authentication system in security area by using tag ID value which stored to backend server.

Tracking and Tracing the Status Changes of Sensor Tags based on the SIP Presence Model (SIP 프레즌스 모델 기반 센서 태그의 상태이력 추적)

  • Kim, Dong-Uk;Hong, Jin-Pyo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.231-242
    • /
    • 2009
  • The EPC-Discovery Service (EPC-DS) is a good representative of the RFID Track & Trace. But this mechanism has several problems. EPC-DS uses centralized server scheme which may arise bottle-neck state and that cannot provide detail trace information of a RFID object. In addition, a trace node requires direct access method to a RFID object or an element which has information of the RFID object for Track & Trace. In this paper, we propose a novel RFID Track & Trace mechanism which based on the SIP presence model and SIP event notification. This mechanism can provide detail trace information and monitoring function, and also can rid the bottle-neck section by combination of SIP methods instead of centralized element.

Design of Spatio-temporal Indexing for searching location of RFID Objects (RFID 객체의 위치 검색을 위한 시공간 색인 설계)

  • Jun, Bong-Gi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.5
    • /
    • pp.71-78
    • /
    • 2014
  • The RFID-tag objects can be recognized by a distinct reader where it is installed. The RFID-tag objects are likely described as storages rather than the mobiles in the use of GPS. As RFID tags are large in number compared to moving objects, so the storing and retrieval costs are highly expensive. Here, two solutions for spatio-temporal model taking account of the feature in the tagged objects are proposed. First, the moving-tag objects are expressed by the terms "now" as well as "path location". Second, the size of storing index was noticeably reduced by not saving the tag information of palletizing products but mapping the tagged objects.

Study on RFID tag Design and Privacy Protection (RFID tag 설계 및 프라이버시 보호에 관한 연구)

  • Baek, Hyun-Ok;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.41-49
    • /
    • 2007
  • RFID in which subminiature IC chip with the indentified information is built a core technique that can recognize, trace and manage various information of an object using radio frequency in the age of Ubiquitous. Several pressing matters about an infringement of Privacy and a security of private information should be settled as soon as possible because an information of specific circumstance can be collected and used without any awareness by others as well as a private information. In addition, various algorithms with high level of security, which is normally used in wire, can be hardly applied to RFID tag because of a lot of restrictions of tag. In this report, designed-RFID tag based on the standard of ISO/IEC 18000-6 and the problems which originated from the technical procedure of that design were analyzed, and the algorithm which could be applied to the designed-tag was also investigated.

  • PDF