• Title/Summary/Keyword: Low-cost RFID system

Search Result 59, Processing Time 0.024 seconds

Gravure Offset Printing for Printed Electronics (인쇄전자를 위한 그라비아 옵셋 인쇄)

  • Kim, Chung-Hwan;Choi, Byung-Oh;Ryu, Byung-Soon;Kim, Dong-Soo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.5
    • /
    • pp.96-102
    • /
    • 2008
  • Manufacturing of printed electronics using printing technology has begun to get into the hot issue in many ways due to the low cost effectiveness to existing semi-conductor process. This technology, with low cost and high productivity, can make it possible to produce printed electronics such as TFT, solar cell, RFID Tag, printed battery, and so on. In this study, apparatus of gravure-offset printing are developed for fine line-width/gap printing and the results obtained from the apparatus shows that it is possible to make around 20 micro-meter line-width/gap printing patterns. The roll-to-roll printing system for fine line-width printing based on primary experiment is presented. The printing results obtained from the system shows around 30 micro-meter line-width/gap printing patterns.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

A Study on Implementation Methods of the 3-D u-City Portal Systems (3차원 u-City 포탈시스템의 구현방안 연구)

  • O, Jong-U;Gu, Yang-Mo;Ju, Yeong-Bok
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.409-418
    • /
    • 2006
  • The purpose of this paper is to present a low cost u-City portal development idea and to propose an exclusive system architecture using 3-D interface layers. 3-D interface layers consist of reused ideas of data from existed public data produced from GIS in order to reduce Produce Processes. 3-D interface layers implement a u-City portal systems that tags from physical spaces 1 ink to mobiles from ubiquitous networks between electronic spaces and physical spaces. Primary produce of this study exhibits an exclusive architecture of a u-City portal for speedy and low cost web 3-D interface layers and GIS data, and for implementation interface of 3-D types on USN of physical spaces. Secondary produce of this study represents that a 3-D u-City portal system has visualized speedy implementation characteristics for implementation of the application systems to execute an ubiquitous concept by returning electronic space to physical space, and to present the low cost 3-D u-City portal than an existed 3-D u-city development strategy. Therefore continuous expansion and study of the 3-D interface physical space under a 상황인지(Context Awareness)ubiquitous will appear the innovated u-City portal systems.

  • PDF

인쇄전자를 위한 롤투롤 프린팅 공정 장비 기술

  • Kim, Dong-Su;Kim, Chung-Hwan;Kim, Myeong-Seop
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2009.05a
    • /
    • pp.15.2-15.2
    • /
    • 2009
  • Manufacturing of printed electronics using printing technology has begun to get into the hot issue in many ways due to the low cost effectiveness to existing semi-conductor process. This technology with both low cost and high productivity, can be applied in the production of organic thin film transistor (OTFT), solar cell, radio frequency identification (RFID) tag, printed battery, E-paper, touch screen panel, black matrix for liquid crystal display (LCD), flexible display, and so forth. The emerging technology to manufacture the products in mass production is roll-to-roll printing technology which is a manufacturing method by printings of multi-layered patterns composed of semi-conductive, dielectric and conductive layers. In contrary to the conventional printing machines in which printing precision is about $50~100{\mu}m$, the printing machines for printed electronics should have a precision under $30{\mu}m$. In general, in order to implement printed electronics, narrow width and gap printing, register of multi-layer printing by several printing units, and printing accuracy of under $30{\mu}m$ are all required. We developed the roll-to-roll printing equipment used for printed electronics, which is composed of un-winder, re-winder, tension measurement system, feeding units, dancer systems, guide unit, printing unit, vision system, dryer units, and various auxiliary devices. The equipment is designed based on cantilever type in which all rollers except printing ones have cantilever types, which could give more accurate machine precision as well as convenience for changing rollers and observing the process.

  • PDF

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

Localization Algorithm for a Mobile Robot using iGS (iGS를 이용한 모바일 로봇의 실내위치추정 알고리즘)

  • Seo, Dae-Geun;Cho, Sung-Ho;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.242-247
    • /
    • 2008
  • As an absolute positioning system, iGS is designed based on ultrasonic signals whose speed can be formulated clearly in terms of time and room temperature, which is utilized for a mobile robot localization. The iGS is composed of an RFID receiver and an ultra-sonic transmitter, where an RFID is designated to synchronize the transmitter and receiver of the ultrasonic signal. The traveling time of the ultrasonic signal has been used to calculate the distance between the iGS system and a beacon which is located at a pre-determined location. This paper suggests an effective operation method of iGS to estimate position of the mobile robot working in unstructured environment. To expand recognition range and to improve accuracy of the system, two strategies are proposed: utilization of beacons belonging to neighboring blocks and removal of the environment-reflected ultrasonic signals. As the results, the ubiquitous localization system based on iGS as a pseudo-satellite system has been developed successfully with a low cost, a high update rate, and relatively high precision.

Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application (RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Implementation of A Hospital Information System in Ubiquitous and Mobile Environment

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.53-59
    • /
    • 2015
  • In this paper, we developed a Hospital Information System in which the business process is formalized and a wire/wireless integrated solution is used. This system consists of the administration office program, the medical office program, the ward management program and the rounds management program. The administration office program can enroll and accept patients, issue and reissue the RFID card. The medical office program inputs a medical examination and treatment, outputs a diagnosis, requests a hospitalization, retrieves the record of a medical examination and treatment, assigns the corresponding examination room to the accepted patients, and updates the number of an waiting patient and a patient number according to the examination room on real time. The ward management program handles hospitalizations and leaving hospital, a nurse's note, and an isolation ward monitoring. The rounds management program handles a medical examination and treatment, and a leaving hospital using PDA. This developed system can be built at low cost and increase the quality of the medical services highly by making it automated the medical administration automation. Also the small number of the medical staffs can manage the inpatients efficiently by using the monitoring functions.

Improving the Key Search using Parallelism in RFID Privacy Protection

  • Shin, Myeong-Sook;Kim, Choong-Woon;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.19-24
    • /
    • 2007
  • Abstract. In the ubiquitous environment of the next generation, RFID is predicted to occupy an important technical location and also expected to apply to various fields. However, the properties of tags in itself which is the core of RFID have a dysfunction like an invasion of privacy for user. An existing cryptanalytic protection scheme of the information leakage have a difficult problem to apply to RFID tags for privacy protection. We applied Ohkubo et al.'s scheme to the protection of the tag's information efficiently in the RFID system environment using low-cost tags. But, this method has all informations of tagsto identify tag's ID and then performs the process of identification in sequence in the Back-end server. These processes have lots of computations so that it have problems about a scalability. In this paper, we are based on Ohkubo et al.'s scheme to solve problems, and then analyze the parallelism with the Hellman's tradeoff method, divide it into nodesin parallel. In this paper, we are based on Okubo et al.'s scheme to solve problems, and then analyze the parallelism with Hellman's tradeoff method, divide it into the ${\omega}$ node in parallel. as a result, we can reduce the computing complexity of key search to $O(\frac{m^{2/3}n^{2/3}}{\omega})$ seconds from O(mm) seconds. finally we show the results to be enhanced the scalability.

  • PDF

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.