• Title/Summary/Keyword: 저가 RFID 태그

Search Result 97, Processing Time 0.025 seconds

Design and Implementation of PDA based RFID Recognition System for the Logistics Application (물류응용을 위한 PDA 기반의 RFID 인식 시스템 설계 및 구현)

  • Jung Sung-Hun;Yim Jae-Hong;Kim Gi-Rae
    • Journal of Navigation and Port Research
    • /
    • v.30 no.1 s.107
    • /
    • pp.85-90
    • /
    • 2006
  • RFID(Radio Frequency IDentification) is appearing by point technology by Ubiquitous environment of new paradigm and Logistics' application But, RFID chip of this is high price and short bandwidth, low power and interference etc. can become technological problem This is getting into obstacle in common use. Reader and tag, Embedded software etc.. that are accomplishing standardization are imported paying most expensive royalty. This paper deals with a RFID cognition system that use PDA under ubiquitous environment to apply to Logistics system A RFID cognition system processes input/output of fundamental information attaching a tag onto products. And a RFID cognition system supports quick, correct and sqfe synthetic Logistics managerial system through construction of database. This can minimize logistics costs and improve the quality of customer service. A RFID cognition system has advantage that can widen range of application to area that cognition system of existent fixing style can not do. Also, it can expect economical effect through inexpensive system construction.

Design and Implementation of Authentication System for RFID Security (RFID 보안을 위한 인증 시스템의 설계 및 구현)

  • Lee, Ji-Yong;Joo, Hong-Il;Han, Jong-Uk;Ryu, Dae-Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.328-331
    • /
    • 2005
  • In this paper we review the security and privacy problems in the RFID system and briefly describe the research topics to solve these problem. And, we design and implement the tag authentication system to authenticate tags in the RFID system which is composed of PC, reader and passive type tag with low power 8 bit microprocessor.

  • PDF

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

Technological Trend for Wireless Ingestible Capsule Design (무선 경구투여캡슐 설계의 기술동향)

  • Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1524-1534
    • /
    • 2009
  • In recent, diagnosing and monitoring technology via in vivo information has been evolved rapidly in worldwide with such capsule-kinds means of incorporating an RFID tag as wireless communication tool. Thus circumstance is pressing local body in Korea to research and develop ingestible RFID capsule which has more miniaturized form, less low power, harmless. This paper focused to investigate new technology and patents, R&D information for adopting proper frequency and designing wireless ingestible capsule antenna system, and suggested practical assignments to implement local R&D. Descriptions are consist of introduction, technology outline, tendency for R&D, patent, market, conclusion and suggestion.

Unproved Mutual Authentication Scheme based on Quadratic Residue for RFID (RFID를 위한 이차잉여 기반의 개선된 상호인증 기법)

  • Park, Han-Nah;Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.425-429
    • /
    • 2009
  • Recently, Chen et al.'s proposed mutual authentication scheme based on the quadratic resiidue, finding the squaring root problem, for avoiding exhaustive search on the server. But, if a malicious reader sends same random value, the tag is traced by an adversary. Moreover, there is realization problem because of its limited ability to compute squaring and hash function. In this paper, we analyze Chen et al.'s scheme and its weakness. Furthermore we present an improved mutual authentication scheme based on the quadratic residue which solves the tracing problem by generating random value on the tag and uses only squaring. We also make the scheme satisfy to forward secrecy without updating and synchronizing and avoid exhaustive search.

A Study on the Low Power Communication of Sensor Network Based on Semi-Mobility (Semi-Mobility 기반 Sensor Network의 저전력 통신 기법에 관한 연구)

  • Park, Han-Soo;Won, Jun-Sok;Kwark, Gwang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.407-409
    • /
    • 2012
  • 기존 IP-USN 및 RFID 기술의 장점을 접목시킨 Active IP-RFID 기술은, IP 인프라와 IP-USN과 RFID 인프라 간 시너지 효과를 극대화하기 위해 RFID 태그에 IP를 탑재하여 확장성과 이동성을 보장하고 태그의 직접적인 관리 및 제어도 가능하게 하는 기술이다. 본 논문에서는 Active IP-RFID 시스템이 Semi-Mobility 기반에서 IP-TAG가 적은량의 에너지를 사용하여 보다 장시간 통신을 하기위한 Advanced Low Power Listening 기법을 제안하고, Always On 방식과 제안한 Advanced Low Power Listening 기법의 전류 소모 차이를 비교하였다.

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.

RFID mutual authentication protocol using OTP (OTP 를 이용한 RFID 상호인증 프로토콜)

  • Lee, Young-Sil;Jang, Won-Tae;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.789-792
    • /
    • 2011
  • RFID(Radio Frequency Identification) 시스템은 비접촉식 무선 인식 기술로 유통 및 물류, 환경, 교통, 보안 분야 등 산업 전반에 걸쳐 다양하게 활용되고 있다. 그러나 태그의 정보가 전송과정에서 무선특성에 따른 과도한 정보 노출과 사용자의 위치정보 추적 등 심각한 프라이버시 침해를 유발시킨다. 본 논문에서는 해쉬된 ID 와 스트림 암호 알고리즘을 이용한 OTP 를 활용하여 리더와 태그간 상호인증을 제공하는 프로토콜을 제안한다. 제안된 프로토콜의 OTP 생성에 사용된 NLM-128 알고리즘은 $2^{128}$ 비도 수준(Security level)을 갖는 스트림 암호로써, 안전성 및 구현 용이성 등의 특징을 가지며 RFID/USN 등의 저전력, 제한된 메모리 및 컴퓨팅 사양에서 적용하기 용이한 알고리즘이다.

Radiation Efficiency Improvement of RFID Tag Antenna for Metallic Objects Printed on Lossy Substrate (손실 기판을 이용한 금속 부착형 RFID 태그 안테나의 복사 효율 향상)

  • Son, Hae-Won;Choi, Won-Kyu;Choi, Gil-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.11
    • /
    • pp.1265-1271
    • /
    • 2008
  • In this paper, we propose a new antenna design method for RFID tass on metallic surfaces using a low-cost, high-loss substrate such as FR4. The proposed design method highly reduces the substrate loss due to its dielectric loss, and so improves the radiation efficiency of the tag antenna more than double compared with a conventional PIFA(planar inverted-F antenna). The equivalent circuit model of the antenna according to the proposed method was established and its characteristics were analyzed systematically in this paper. The excellency of the proposed design method was verified by the fabrication and measurement of a prototype antenna.