• Title/Summary/Keyword: Low-cost RFID system

Search Result 59, Processing Time 0.03 seconds

An RFID Tag Anti-Collision Protocol for Port Logistics Systems (항만 물류 시스템을 위한 RFID 태그 충돌 방지 프로토콜)

  • Lee, Seong Ro;Lee, Yeonwoo;Joo, Yang-Ick
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.202-207
    • /
    • 2013
  • RFID technology is applied to port logistics applications since it monitors objects wirelessly without line of sight and constructs ubiquitous system with low cost. Changes of stock status in the warehouse environment make the technology more important for managing such frequent storing and un-storing. Although the RFID has beneficial characteristics of low cost and low complexity, simultaneous responses of RFID tags cause tag identification collision due to absence of elaborate medium access control scheme. Several algorithms have been proposed to overcome the tag collision problem. However, it is difficult to adopt the methods to the logistics systems that has varying loads since there was no consideration on RFID tag's mobility. Therefore, we propose an efficient RFID tag anti-collision protocol, and simulation results demonstrate performance improvement by using the proposed scheme.

Efficient Authentication Protocol for Low-Cost RFID System (저비용 RFID 시스템에 적합한 효율적인 인증 방법)

  • Kim, Jin-Ho;Seo, Jae-Woo;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.117-128
    • /
    • 2008
  • Compared with the existing bar code system, RFID system has lots of advantages such as it identifies automatically massive objects. We might anticipate RFID technology will be a substitution for an optical bar code system in the near future. However, their feature that uses radio waves may cause various security problems. Many kinds of solutions have been researched to overcome these security problems. In this paper, we analyze the previous proposed protocols. And then, we categorize RFID authentication into two types according to the synchronization requirement between a Back-end Database and a Tag. In addition, we introduce the previous proposed approaches to tag search problem in RFID authentication. And we propose an efficient method which provides fast tag search by using membership test algorithm, a Bloom filter.

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF

Analyses of A Lightweight Stream Cipher for RFID Encryption Model (RFID 암호 모델을 위한 경량화 스트림 암호 방식의 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.827-828
    • /
    • 2012
  • WG-7 is a stream cipher based on WG Stream Cipher and is designed by Y. Luo, Q. Chai, G. Gong, and X. Lai in 2010. This cipher is designed to implement in low cost and lightweight application such as RFID tags. In this paper, we survey and compare cryptographic module such as stream and block cipher. We can estimate security performance suitable to system.

  • PDF

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System (검색 정보 사전 동기화를 이용한 저비용 RFID 인증 방식)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.77-87
    • /
    • 2008
  • Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.

A Study on the Design of Health-Care Application System through Control of Multiple RFID in USN (USN 환경에서 다중 RFID 제어를 통한 헬스케어 응용 시스템 설계에 관한 연구)

  • Lee, Yang-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1937-1942
    • /
    • 2010
  • In this paper, RFID technology was applied to fitness center and order to exercise the right of each user without the guidance of a personal trainer should be made systematically. for example, excercise sequence, equipment usage, excercise and golas etc. Also, Customers who use the fitness center using RFID is trainer at a low-cost under the guidance of the same effect can be expected. In this paper, Our system will record the movements of time, as well as our system can be analyze of excercise using micro processor and acceleration sensor.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

The Industrialization Plans of RFID for the Use of New Logistics Information Systems (신물류정보시스템으로서의 활용을 위한 RFID의 산업화방안)

  • Kim, Jong-Deuk
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.171-191
    • /
    • 2004
  • Recently, RFID(Radio Frequency IDentification) is observed with government and connection enterprises as the central figure. RFID utilizing radio is a technology that enable exchange of information sensing and recognize object. RFID is expected that the practical use limits widens by territory that can form vast market such as logistics management according to RFID's low-cost aggravation as well as usage of life and improvement of performance because present R&D is gone vigorously. Because RFID is possible application everywhere if it is various service industries as well as logistics, industry spot, manufactory and place that flowing of goods is, is used, and is becoming big limelight from society several territories.

  • PDF

An Implementation of a Virtual RFID Emulator System using a Commercial CAD tool (상용 CAD 툴을 이용한 RFID 에뮬레이터 시스템 구현)

  • Lim, Hyung-Mu;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1049-1054
    • /
    • 2005
  • With the growth of RFID market in logistics industry, such as post office, airline, shipping etc., development of RFID readers and tags becomes crucial. Especially, $860{\sim}960MHz$ RFID is worth noticing because of its long identification range and low production cost. Therefore, performance tests and verification of reader and/or tag under development are very important. In this paper, a RFID emulator system is designed and implemented using a commercial CAD tool, a signal generator and a data acquisition device. With the RFID emulator system, many parameters such as spectrum masks, transmit power levels, data waveform and other RF characteristics can be analyzed. Furthermore it can be applied to the verification of real RFID Readers or Tags.

  • PDF

The Study of Auto Recogniton System by Using Zigbee (Zigbee를 이용한 자동 인식 시스템에 관한 연구)

  • Baek, Dong-Won;Yoon, Seon-Tae;Park, Seung-Yub;Ko, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.393-398
    • /
    • 2009
  • In this paper, we study the design and implementation of an auto recognition system by using wireless sensor node. RFID system has a limited communication range and communication network is damaged, it is impossible to communicate. Therefore, easy installation and low cost wireless system are required in an area where the installation of communication between RFID system and monitoring system is difficult, or a portable RFID system is installed. The auto recognition system in this study is implemented by the combination of 13.56MHz RFID system using MLX12115 RFID chip of Melexis company and wireless sensor node system using CC2420 Zigbee chip of Chipcon company. As a result, we develop an auto recognition system which makes it possible to get tag's information wirelessly. Also, it has a simple circuit structure and is small in size.

  • PDF