• Title/Summary/Keyword: ID3 태그

Search Result 37, Processing Time 0.027 seconds

RFID Variable ID Scheme with Efficient Identification (효율적인 식별기능을 갖는 RFID 가변 정보화 방식)

  • 한승우;최재귀;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.61-64
    • /
    • 2004
  • RFID 시스템에서 태그와 리더 사이의 통신은 Radio Frequency를 이용해서 이루어짐으로 공격자에 의해 도청될 수 있으며, 태그의 정보가 노출되면 사용자의 프라이버시 침해 문제를 가져올 수 있다. RFID 태그의 프라이버시를 보호하기 위해 제안된 대부분의 기존 방식들은 태그의 ID를 식별하기 위해 모든 태그에 대한 정보를 가지고 식별 과정을 수행해야 하는 비효율성을 가지고 있다. 본 논문에서는 태그의 출력을 매번 다르게 변화시켜, 태그에 대한 위치 추적을 불가능하게 하고, 3번의 지수연산만으로 해당 태그를 식별할 수 있는 RFID 가변 정보화 방식을 제안한다.

  • PDF

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

A Hybrid Hyper Query Tree Algorithm for RFID System (RFID 시스템을 위한 하이브리드 하이퍼 쿼리 트리 알고리즘)

  • Kim, Tae-Hee;Lee, Seong-Joon;Ahn, Kwang-Seon
    • The KIPS Transactions:PartA
    • /
    • v.15A no.5
    • /
    • pp.287-294
    • /
    • 2008
  • A tag collision arbitration algorithm for RFID passive tags is one of the important issues for fast tag identification, since reader and tag have a shared wireless channel in RFID system. This paper suggests Hyper-Hybrid Query Tree algorithm to prevent the tag-collisions. The suggested algorithms determine the specified point in time for tag to transfer ID to reader by using value 1 of the upper 3 bit based on Query Tree. Also, because the transferred upper 3 bits of tag is different depending on the time of transfer, it is possible to predict in the suggested Algorithm. In the performance evaluation through simulation, it shows the suggested algorithm has higher performance in the number of queries compared to other Tree-based protocols.

SAW ID Tag and Receiver System for Passive RFID System Application (수동형 RFID 시스템 적용을 위한 SAW ID 태그 및 수신 시스템 구현)

  • Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.4
    • /
    • pp.64-71
    • /
    • 2008
  • SAW (Surface Acoustic Waves) ID (identification) tags have been designed and implemented for RFID (Radio frequency IDentification) systems. With SAW ID tag of pulse position encoding method, the data capacity increased 3 times compared with SAW ID tag of amplitude on/off method. Two different kinds of SAW ID tag receiver systems, heterodyne and homodyne receiver systems, were made. The direct conversion receiver showed better isolation property, 10 dB improvement than the heterodyne receiver to increase wireless interrogation distance.

Lightweight RFID Authentication Protocols Based on Hash Function (해쉬함수에 기반한 경량화된 RFID 인증 프로토콜)

  • Ha, Jae-Cheol;Baek, Yi-Roo;Kim, Hwan-Koo;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.61-72
    • /
    • 2009
  • To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.

Synchronized MP3 Playing System Using XML Extension of MP3 Tag (MP3 태그의 XML 확장을 이용한 동기화된 재생 시스템)

  • Gwak, Mi-Ra;Jo, Dong-Seop
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.67-76
    • /
    • 2002
  • MP3 audio format has good quality and high compression rate ; therefore, the use of MP3 format increases. The requirement of keeping the extra information such as author and lyrics in MP3 files increases. And the tagging systems designed to meet this requirement are suggested. ID3 vl tag and Lyrics3 v2 tag are two most widely used tagging systems. But ID3 vl tag and Lyrics3 v2 tag are the last things to arrive when the file is being streamed. Therefore, users cannot get the tag information until the entire audio file is downloaded. Moreover information synchronized with audio stream may lose its feature. In this paper, a system searching and playing audio files based on tag information in MP3 files is implemented. This system solves the problem that the tag information is ignored when an MP3 files is played on internet. An audio object is described in an XML document, and timing and synchronization between elements in that In document is provided in HTML+TIME style using XSL.

An Improved Hybrid Query Tree Algorithm for RFID System (RFID 시스템을 위한 개선된 하이브리드 쿼리 트리 알고리즘)

  • Tae-Hee Kim;Seong-Joon Lee;Kwang-Seon Ahn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.802-805
    • /
    • 2008
  • RFID 시스템에서 리더와 태그는 단일 무선 공유 채널을 갖기 때문에 RFID 수동형 태그를 위한 태그 충돌 중재가 태그 인식을 위한 중요한 이슈이다. 본 논문에서는 태그 충돌 방지를 위한 Improved Hybrid Query Tree algorithm 을 제안한다. 제안된 알고리즘은 쿼리 트리를 기반으로 태그가 리더에게 ID 를 전송하는 시점을 전송 ID 상위 3 비트 내의 '1' 값을 이용하여 결정한다. 또한 전송받은 Tag 의 상위 3 비트는 충돌이 발생하더라도 전송 슬롯에 따라 다르므로 제안한 알고리즘에서 예측이 가능하다. 시뮬레이션을 통한 성능 평가에서 다른 트리 기반 프로토콜에 비해 제안한 알고리즘이 쿼리 횟수에서 높은 성능을 갖는다는 것을 보여준다.

Technology Trend of RFID Sensor Tags (센서 태그 기술 동향)

  • Jung, J.Y.;Yeo, J.H.;Lee, H.S.;Pyo, C.S.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.3 s.105
    • /
    • pp.38-45
    • /
    • 2007
  • 최근 각광을 받고 있는 RFID 기술은 기존의 바코드를 대체하여 상품 관리를 네트워크화 및 지능화 함으로써 유통 및 물품 관리뿐만 아니라 보안, 안전, 환경 관리 등에 혁신을 선도할 것으로 전망되며, 이전에 존재하지 않았던 거대한 새로운 시장을 형성할 것으로 기대된다. 이러한 RFID 기술은 사물의 고유한 ID를 단순히 인식하는 읽는 기능중심에서 사물의 이력 정보를 관리할 수 있는 읽고 쓰기 기능, 그리고 전자 태그들이 자신의 고유 정보뿐만 아니라 온도, 습도, 압력 등 주변의 정보까지 감지하는 센싱 기능을 가지도록 발전할 것이다. 이와 같이 기존의 ID 획득만 가능한 태그에 외부 환경 정보를 습득할 수 있는 센서와 자체 전원 공급을 위한 박형 전지(film battery)가 추가된RFID 태그를 ‘센서 태그(smart active label 혹은 RFID sensor tag)’라고 부르며, 그방식은 크게 반능동형 방식(semi-passive 혹은 semi-active)과 능동형 방식(active)으로 구분된다. 본 고에서는 현재 국내외에서 활발히 연구 개발되고 있는 반능동형 센서 태그 기술 동향과 센서 태그 관련 국제 표준화 동향에 대해서 알아본다.

The development of RFID multi-codes converter based on ID profiles (ID 프로파일을 이용한 RFID 멀티 코드 변환기 연구)

  • Lee, Chang-Yeol;Mo, Hee-Sook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.124-133
    • /
    • 2009
  • There are many different ID representation forms depending on the media or applications. In case of RFID tag, ID representation form must be followed by the rule of ISO/IEC 15962. In this study, we developed the efficient ID conversion algorithm between ID representation form on RFID tag and Internet. The main idea is on the use of XML based ID profiles and three step logical IDs forms. The algorithm was tested by the typical three kinds of real IDs such as EPC, ISO/IEC 15459 KKR Code, and mCode which are the typical meta-IDs can be defined in ISO/IEC 18000-6C tag.

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.