• Title/Summary/Keyword: RFID code system

Search Result 153, Processing Time 0.022 seconds

Study on the Effective Management Plans of Mobilization Security Business which Utilizes NFC (NFC를 활용한 출동경비업무의 효율적 관리방안에 관한 연구)

  • Kim, Min Su;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.95-100
    • /
    • 2013
  • As the near field communication technology's application scope tends to expand gradually in the various fields, application of mobile-based NFC(Near Field Communication) is increasing in the various types of technologies. The method which reads the URL address and supports access to the web site of the address if you touch the NFC device in the tag(RFID) that the URL address is stored was applied to the unmanned security system. It proposed the effective plan to manage mobilization security business in the aspects of Integrity, Damage, Real-Time, and Speed through comparison and verification of the method with the existing unmanned security system.

Development of Autonomous Logistics Transportation System using Raspberry Pi (라즈베리파이를 이용한 자율물류 운반 시스템 개발)

  • Kang, Young-Hoon;Park, Chang-Hyeon;Lee, Min-Woo;Kim, Da-Eun;Lee, Seung-Dae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.125-132
    • /
    • 2022
  • In this paper, we presented a cart which can automatically transport loads to the distribution center of the appointed indoor place, based on Raspberry pi 4. It can recognize the obstacles by using the ultrasonic sensors so that it prevents the collision and takes a detour. Further, we entered the direction control code in the RFID. It has installed at important points such as the intersections of the destinations, so that if the RFID reader of the cart senses the RFID, the cart would stop or change the direction. After the transportation, if the load cell(weight sensor) recognizes that the baggage is unloaded, the cart returns to the initial point and would be retrieved. Therefore, we embodied the transportation cart which reduces the use of manpower and solves the problems conveniently across the transportation strategies.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Concatenated Diversity System for Bandwidth Efficient Communication of Flight Type Air Node in Unstable Channel Environments (비정형 통신 채널 환경에서 비행형 에어노드의 대역 효율적인 통신을 위한 연접 다이버시티 시스템)

  • Kang, Chul-Gyu;Park, Jin-Hee;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.247-254
    • /
    • 2012
  • In this paper, we propose a concatenated diversity system to assure the data transmission reliability between flight type air nodes which move according to their atypical orbit, then its performance is analyzed using computer simulation and it is designed with hdl. The proposed system cannot only improve a bandwidth efficient and coding gain from diversity TCM code but also the reliability of data transmission is high. From the computer simulation result about bit error rate(BER) of the proposed system, we confirm that its BER performance is about 11dB greater than TCM code at $10^{-2}$ and about 11dB greater than space time block code at $10^{-3}$ which has a full diversity gain. In addition, when we compare its BER performance with space time trellis code which has both a diversity gain and a coding gain, the performance of the proposed system is greater than about 1.5dB at $10^{-5}$. Lastly, after designing the proposed system with HDL, we can confirm that the operation result is correct.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Study on Design of Mobile Robot for Autonomous Freight Transportation (무인 화물이송 이동로봇의 설계에 관한 연구)

  • Jeong, Dong-Hyuk;Park, Jin-Il;Kim, Yong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.3
    • /
    • pp.202-207
    • /
    • 2013
  • In the paper, we design a autonomous mobile robot for freight transportation and propose an operation method of the robot in the warehouse. In order to implement autonomous navigation, it is needed to recognize the position of the robot and track the path to the target. Previous methods are hard to change the workspace environment and need high cost to install and keep a maintenance of the system. The lifter of freight transportation robot is designed to load and unload a baggage through up and down motion. Also, ultrasonic sensor, RFID, QR-code and camera sensor is used to carry out various functions while the robot navigates in the various environment. We design an operation method of the mobile robot in order to effectively arrive a goal position and transport a freight. The proposed methods are verified through various experiments.

Strong Yoking-Proof Protocol using Light-Weighted MAC (경량화된 MAC을 이용한 강력한 Yoking-Proof 프로토콜)

  • Cho, Chang-Hyun;Lee, Jae-Sik;Kim, Jae-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.83-92
    • /
    • 2009
  • Ari Juels proposed Yoking-Proof protocol for authenticating multiple tags simultaneously using RFID system. Because common Yoking-Proof methods authenticate by using MAC (Message Authentication Code), it is difficult to apply them to inexpensive tags. It is also difficult to implement common hash functions such as MD5 in inexpensive tags. So, Ari Juels also proposed a lightweighted Yoking-Proof method with only 1 authentication. However, Minimalist MAC, which is a lightweighted MAC used in the proposed method is for single-use, and the proposed structure is vulnerable to replay attacks. Therefore, in this study, the minimalist MAC using Lamport's digital signature scheme was adopted, and a new type of Yoking-Proof protocol was proposed where it uses tags that are safe from replay attacks while being able to save multiple key values.

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

Design of Ubiquitous Reference Point for Location Service (위치정보 제공 서비스를 위한 유비쿼터스 기준점 설계 연구)

  • Park, Jae-Min;Oh, Yoon-Seuk;Kang, Jin-A;Kim, Byung-Guk
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.301-310
    • /
    • 2007
  • There are 21,000 National Surveying Control Points (NSCP) made of stone for precise surveying nationwide. NSCPs that provide location information are usually buried at the top of a mountain for view points that cannot be used by the public. Recently, according to the growing ubiquitous computing generation, location-based information has become very important and a service that can be easily accessed by the public is needed. In this research, a new type of reference point for a location information service is proposed. It is an Intelligent Reference Point (IRP) equipped with RFID tags and a two-dimensional bar-code system. The IRP system is composed of an electronic tag component, a tag identification component, and an IRP service component. We designed the IRP receiver identifying RFID tag and two-dimensional barcode was designed using a PDA, digital camera, and an RFID receiver. Also designed was IRP input data and input information. Furthermore, the operation software was developed in a PDA for identifying IRP and using IRP the service, and the IRP positioning method was developed using a GIS spatial analysis.

  • PDF

A Study on Performance Comparison of Multipurpose Function Electronic Measurement Reference Station Prototype System using LED and Gyro Sensor (LED 및 자이로센서를 이용한 다기능 전자측량기준점 프로토타입 시스템의 성능비교에 관한 연구)

  • Park, Sung-Kyun;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1247-1255
    • /
    • 2013
  • In this paper, We proposes multipurpose function electronic measurement reference station prototype system based on LED and Gyro Sensor. This system have developed to possible with real time data collection and landscape illumination and surrounding diastrophism monitoring for that analyze problems of existing planted reference station. Hardware for the proposed system consists of a gyro sensor module to detect diastrophism, GPS module to process location information, environment sensor module to process surrounding environmental data and CDMA wireless data communication to send the collected data to server. In addition, this paper intends to enhance system management and future usability in a way that applies LED, QR-code, RFID and Solar cell module to outer side of electronic measurement reference station to improve usability of H/W for electronic measurement reference station. Lastly, this paper conducted current amount evaluation to supply stabilized electricity with its various functions in the proposed multipurpose function electronic measurement reference station and it's proved that this system can be stably operated with its electricity loss factor of 2.29% loss factor. And this paper conducted a qualitative comparison with existing electronic measurement reference station system in order to evaluate superiority of the proposed electronic measurement reference station.