• Title/Summary/Keyword: Passive tag

Search Result 152, Processing Time 0.029 seconds

A Physical Sequence Estimation Scheme for Passive RFID Tags using Round Trip Scan (왕복 스캔을 통한 수동형 RFID태그의 물리적 순차 추정기법)

  • Lee, Joo-Ho;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1358-1368
    • /
    • 2012
  • A tag sequence estimation scheme is to estimate the physical sequence of passive RFID tags that are linearly spread using the movement of a RFID reader. Since RFID readers communicate with the passive tags by very weak radio waves, scanning passive tags are unstable. In this paper, we applied round-trip scanning of a reader to enhance the tag sequence estimation. Proposed scheme first determines the turning point of the reader movement, and then estimates the sequence of the tags using the tag sets scanned in each read cycles. Test experiments show that the proposed scheme can improve the estimation accuracy.

SAW ID Tag and Receiver System for Passive RFID System Application (수동형 RFID 시스템 적용을 위한 SAW ID 태그 및 수신 시스템 구현)

  • Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.4
    • /
    • pp.64-71
    • /
    • 2008
  • SAW (Surface Acoustic Waves) ID (identification) tags have been designed and implemented for RFID (Radio frequency IDentification) systems. With SAW ID tag of pulse position encoding method, the data capacity increased 3 times compared with SAW ID tag of amplitude on/off method. Two different kinds of SAW ID tag receiver systems, heterodyne and homodyne receiver systems, were made. The direct conversion receiver showed better isolation property, 10 dB improvement than the heterodyne receiver to increase wireless interrogation distance.

Directivity Pattern Design of a Vehicle Tag Antenna for Improvement of the Readable Range (인식 거리 개선을 위한 차량용 태그 안테나의 지향성 설계)

  • Park, Dae-Hwan;Min, Kyeong-Sik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.8
    • /
    • pp.872-879
    • /
    • 2010
  • This paper describes the design for radiation pattern directivity of vehicle license plate RFID tag antenna to improve the readable range. Directivity pattern of the proposed passive antenna is decided by the meander line position and the bumper size attached to the tag antenna. In order to prove the verification of the calculated directivity pattern and readable range of the proposed antenna, the tag antenna has been fabricated and measured at the anechoic chamber. It is shown that the maximum directivity gain of the measured radiation pattern of active and passive tag antenna were observed 2.32 dBi and 3.1 dBi, respectively. The maximum readable range of passive tag antenna was measured about 8.5 m at ${\pm}45^{\circ}$ beam direction on the basis of the driving car direction($0^{\circ}$ of azimuth angle).

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Passive UHF RFID Propagation Characteristics and Reconsideration of Link budget on Practical Communication Area (수동형 UHF RFID 인터페이스에 대한 Link budget의 재해석 및 전파 환경 요소 분석)

  • Jung, Jin-Woo;Park, Kyoung-Tae;Roh, Hyoung-Hwan;Park, Jun-Seok;Kim, Hyeong-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.469-472
    • /
    • 2008
  • In this paper, we discuss the recent trends on the passive UHF RFID tag chip design techniques and several important system parameters. We also summarize link budget studies on both conventional and modem UHF RFID communications. The paper highlights the reverse link limited case, which has known to be the minor concern if reader continuous wave (CW) can reach the tag in sufficient level. This makes sense when the tag sensitivity is rather high (over 10-12${\mu}W$); however, since the tag chip fabrication technologies have been developed by time, the tag chip threshold levels are now less-dominant in determining link margin. If the tag limitation can be alleviated, the forward link limited case can be resolved; thus, we rather focus on the path-loss problem. Since the path-losses are still exist in both forward and reverse links, and it can be doubled while CW travels the reader-tag-reader path because forward link and reverse link are on the same distance. Consider if reader receiver sensitivity is very high in the worst case. In this case, weaken tag response (i.e., backscatters) cannot reach the level that reader receiver can process tag data; bit-error rate can be higher. Overall, backscatter levels should be high enough so that reader receiver can correctly function. After discussing link budget, we carried out practical measurements on fading effects between two circularly polarized UHF RFID antennas in a small scale area.

  • PDF

An Intelligent Estimation Method of Robot-location based on Passive RFID Tags in Static Position (정적 Passive RFID 태그를 이용한 지능적인 로봇위치추정기법)

  • Moon Seung-Wuk;Ji Yong-Kwan;Park Jahng-Hyon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.9-14
    • /
    • 2006
  • This paper presents methods of robot localization using recent radio frequency identification technology. If the absolute position and orientation of a tag are given in an indoor environment where RFID tags are installed, a robot can estimate its location using the relationship of the identified tag and the robot in a relative coordinate. To derive this relationship, we propose three estimation techniques using a model of a RFID reader, the direction of identification and the detection range. In this algorithm, a suitable estimation method is selected out of the three proposed techniques depending on the situations and trajectory of robot in the detection range. Simulation and experimental results show that the proposed methods can provide good performance for localization.

A Study On RFID Security Enhancement Protocol Of Passive Tag Using AES Algorithm (AES 알고리즘을 이용한 수동형 태그의 RFID 보안 강화 프로토콜에 관한 연구)

  • Kim, Chang-Bok;Kim, Nam-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • Recently arithmetic circuit of lightweight AES symmetric key algorithm that can apply to passive tag have been developed, then security protocol of RFID system using AES symmetric encryption techniques have been proposed. This paper proposed security enhancement protocol of RFID system using lightweight AES arithmetic circuit and random number generator of passive tag. The proposed protocol have AES algorithm and random number generator at server, reader, tag, and transmit encrypted message by separate secret key using random number at each session. The mutual authentication of tag and reader used reader random number and tag random number. As a result, proposal protocol reduce authentication steps of the existing mutual authentication protocol, and reduce amount of computation of tag, and demonstrate as secure protocol to every attack type of attacker by decrease communication step of Air Zone.

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

Performance Improvement in Passive Tag Based RFID Reader (수동형 태그 기반 RFID 리더기의 성능 개선)

  • Rhee, Seung-Hak;Chun, Jong-Hun;Park, Jong-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1159-1166
    • /
    • 2006
  • In this paper, we have designed a RFID reader receiver system for improving the performance of the passive Tag based 9$'908.5{\sim}914MHz'$ RFID reader, and analyzed the system performance according to the frequency, the reader, and tag properties. The commercial receive system causes a loss in sensitivity because of 24 capacitors and 6 inductors. So we have designed an improved system using a circulator, LNA and a SAW filter. The experimental results show that the use of a circulator to separate the Tx/Rx paths eliminates interference, the LNA improves the sensitivity of the Rx module and SAW filter eliminates the noise and spurious components in the received signal.

A security implementation based on the sensor tag (센서 태그를 이용한 보안 장치 구현)

  • Kim, Sang-Choon;Park, Ji-Mann
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.19-24
    • /
    • 2011
  • This paper describes a passive SID sensor tag that provide physical security functions based on a sensor interface module. It elementarily consists of a serial I/O interface, control module, and sensor module. In this paper, it show tamper-proof security functions by comparison and encryption with the sensor signal data using the physical resistors. The passive SID sensor tag can be realized by the real time management for the safety, forgery, and so on. The proposed SID tag embedded with a sensor module is expected to find wide physical security applications.