• Title/Summary/Keyword: 태그특성

Search Result 257, Processing Time 0.032 seconds

High Speed Identification Method of RFID Tag (RFID 태그의 고속 인식 기법)

  • 이광재
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.6-12
    • /
    • 2004
  • Identification rate and time are very important in the identification of RFID tag, and the tag requires simple structure to use economically large quantity of tags. These factors make the MAC protocols of wired or wireless network environment result in different requirements. In the paper, we propose a method to apply spread spectrum scheme using orthogonal channel via Walsh function as the anti-collision communication system for the purpose of non-collision identification of multiple tags, and consider its property. The proposed system use two step identification. in the first step, collision is resolved via constructing to respond after specific delay time based on unique n, and conventional polling scheme follows in the second step.

  • PDF

A Query Tree Protocol with Stop Signal in RFID Systems (RFID 시스템에서 중지신호를 이용한 쿼리 트리 프로토콜)

  • Lim In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.526-529
    • /
    • 2006
  • In this paper, a QT_ss protocol is proposed for identifying all the tags within the identification range. The proposed QT_ss protocol revises the QT protocol. which has a memoryless property. In the QT_ss protocol, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. While the tags are sending their identification codes. if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ss protocol outperforms the QT protocol in terns of the number of response bits.

  • PDF

Experimental study on RFID frequency band and tag for construction material information management (건설자재 정보관리를 위한 RFID 주파수 대역 및 Tag에 관한 실험적 연구)

  • Han, ChoongHan;Ju, KiBum;Yang, SungHoon
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.874-877
    • /
    • 2007
  • 최근 건설 산업이 고도화, 지능화됨에 따라 건설자재정보의 효율적인 관리방안으로 RFID 기술을 이용하려는 연구 및 적용 사례가 증가 하고 있다. RFID(Radio Frequency Identification)란 라디오 주파수를 이용한 무선인식 기법을 뜻하는 것으로 건설자재에 RFID Transponder(이하 태그)를 부착하여 생산, 유통, 설비 등 전 과정의 정보 추적 및 관리가 가능하다. 그러나 RFID 시스템 특성상 전자기장이 형성되는 철골자재나 수분이 포함된 콘크리트, 도료(안료) 등의 자재에서는 RFID 적용이 쉽지 않다. 또한, 현재 사용 중인 RFID 장비마저도 표준화 되어 있지 않고 사용 주파수 대역 또한 각각 다르기 때문에 건설자재에 적용하기위한 RFID 시스템의 표준화 및 규격화가 절실하다. 본 논문에서는 건설자재에 RFID를 적용하기 위한 표준화 방향을 제시하는 기초 연구로써 목재, 철재 빔, 도료(안료), 콘크리트, 배관자재(철/동/PE)에 Passive Type의 일반(Pager) 태그, 금속 태그, 액체형 태그를 부착 매립하여 125KHz, 13.56MHz, 900MHz의 주파수 대역과 자재 물성별 인식거리 및 인식률 시험을 진행하여 건설자재에 RFID를 적용하기위한 표준 주파수 대역 및 재질에 따른 적정 태그를 제시하고자 한다.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Backward Channel Protection Method For RFID Tag Security in the Randomized Tree Walking Algorithm (랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식)

  • Choi Wonjoon;Roh Byeong-hee;Yoo S. W.;Oh Young Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.415-421
    • /
    • 2005
  • Passive RFID tag does not have its own power, so it has very poor computation abilities and it can deliver signals in very short range. From the facts, most RFID Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from a tag illegally. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes such as randomized tree walking, which have been proposed to secure tag information in tree-walking algorithm as an anti-collision scheme for RFID tags. We showed the efficiency of our proposed method by using an analytical model, and it is also shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to '0'.

Presentation of Self and SNS Posting Styles: Focusing on Goffman's Impression Management Framework (자아 표현과 SNS 게시 형식: 고프만의 인상관리 이론을 중심으로)

  • Song, Seung-A;Shin, Hyung-Deok
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.284-291
    • /
    • 2022
  • People use various tools to present themselves including Social Network Services(SNS hereafter). This study categorized three types of presentation of self, which are genuine, ideal, and social self, and based on Goffman's Impression Management Framework, investigated if these types of presentations have any patterns related to SNS posting styles. Especially, we focused on the styles of hashtags including if hashtags are used in the main tests, if hashtags are hidden, and what kinds of words are used for hashtags. Using 450 posting data uploaded to the Instagram, we found that the posting presenting ideal self show very high rate of using hidden hashtags(98%) and using common expressions(97%), which are not the case for genuine and social self types. This results imply that people concern more about their impressions especially when they present their ideal self on SNS, partially confirming Goffman's Impression Management Framework.

Electrical Properties of RFID Tag Antenna Fabricated by Si CMOS Process (Si CMOS 공정을 적용한 RFID 태그 안테나 제작 및 전기적 특성)

  • Lee, Seok-Jin;Park, Seung-Beom;Jung, Tae-Hwan;Lim, Dong-Gun;Park, Jae-Hwan;Kim, Yong-Ho;Mun, Nam-Su
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.16 no.1
    • /
    • pp.21-25
    • /
    • 2009
  • By using Si CMOS process, small RFID tag antenna were fabricated on Si substrate and their electrical properties were evaluated. Firstly, tag antenna pattern and the electromagnetic properties were simulated with HFSS. The frequency was 13.56 MHz, the line-width and line-gap were modeled in the range of $50{\sim}200{\mu}m$. S parameters, SRF, and Q value were calculated from geometry. When the line-width and line-gap were $100{\mu}m$ and $100 {\mu}m$, respectively and the loop-turn was 10, the SRF was 80 MHZ and the Q value was ca. 9. When the microstrip antenna pattern of aluminum $2{\mu}m$ was fabricated by using DC sputtering, Vpp of ca. 4.3 V was obtained when the reader and tag were closely contacted.

  • PDF

An Omnidirectional Antenna for REID UHF Band Tag (UHF대역 RFID 태그용 전방향성 안테나)

  • Son, Tae-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.145-149
    • /
    • 2006
  • UHF band omnidirectional antennas for RFID tag were designed. Crossed loaded dipole and bended dipole were applied to be designed for both miniaturization and omnidirectional radiation pattern. By suppling 90 degrees phase difference between crossed dipoles, omnidirectional E-plane patterns can be obtained. -10 dB reflection coefficients of 3 types dipole antenna which have designed under conjugate matched with input impedance of chip were shown as 670-1,050 MHz, 700-1,250 MHz and 600-1,020 MHz, respectively, and also shown that all antenna have omnidirectional radiation pattern both E and H plane.

  • PDF

The Characteristics for UHF RFID Tag Antenna Using Planar Dipole Antenna (평면형 다이폴 안테나를 이용한 UHF RFID 태그 안테나 특성)

  • Kim Young-Dal;Lee Young-Hun;Kwon Won-Hyun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.2 s.93
    • /
    • pp.204-210
    • /
    • 2005
  • In this paper, we are proposed the antennas for RFID tag operated at UHF band which are inserted ground plane easy to mount the RFTD chips at the antenna surfaces. In order to implemented antenna for RFID tag which the size is same as conventional name card, the structure of the antenna is meander type, matching method for improvement characteristics of the antenna use T matching method, ground plane is inserted at the antenna substrate fer mounting RFID chips. The substrate size of implementation is $100\times60\;mm^2$ and the FR4 substrate is used. Results of the experiment, the center frequency of the implemented antenna is 427 MHz, -10 dB return loss bandwidth is 8 MHz, maximum return loss is 21 dB, the radiation pattern is omnidirectional. From these results, we are conformed application for UHF RFID tag antenna.

Impedance and Read Power Sensitivity Evaluation of Flip-Chip Bonded UHF RFID Tag Chip (플립-칩 본딩된 UHF RFID 태그 칩의 임피던스 및 읽기 전력감도 산출방법)

  • Yang, Jeenmo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.203-211
    • /
    • 2013
  • UHF RFID tag designers usually ndde the chip impedance and read power sensitivity value obtained when a tag chip is mounted on a chip pad. The chip impedance, however, is not able to be supplied by chip manufacturer, since the chip impedance is varied according to tag designs and fabrication processes. Instead, the chip makers mostly supply the chip impedances measured on the bare dies. This study proposes a chip impedance and read power sensitivity evaluation method which requires a few simple auxiliary and some RF measuring equipment. As it is impractical to measure the chip impedance directly at mounted chip terminals, some form test fixture is employed and the effect of the fixture is modeled and de-embeded to determine the chip impedance and the read power sensitivity. Validity and accuracy of the proposed de-embed method are examined by using commercial RFID tag chips as well as a capacitor and a resistor the value of which are known.