• Title/Summary/Keyword: RFID multiple access control

Search Result 6, Processing Time 0.022 seconds

Emulator for Generating Heterogeneous Interference Signals in the Korean RFID/USN Frequency Band

  • Lee, Sangjoon;Yoon, Hyungoo;Baik, Kyung-Jin;Jang, Byung-Jun
    • Journal of electromagnetic engineering and science
    • /
    • v.18 no.4
    • /
    • pp.254-260
    • /
    • 2018
  • In this study, we suggest an emulator for generating multiple heterogeneous interference signals in the Korean radio frequency identification/ubiquitous sensor network (RFID/USN) frequency band. The proposed emulator uses only one universal software radio peripheral to generate multiple heterogeneous interference signals more economically. Moreover, the physical and media access control parameters can be adjusted in real time using the LabVIEW program, thereby making it possible to create various time-varying interference environments easily. As an example showing the capability of the proposed emulator, multiple interference signals consisting of a frequency-hopping RFID signal and two LoRa signals with different spreading factors were generated. The generated signals were confirmed in both frequency and time domains. From the experimental results, we verified that our emulator could successfully generate multiple heterogeneous interference signals with different frequency and time domain characteristics.

An Efficient Tag Identification Scheme based on the Reader's Power Control

  • Lim, Intaek
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.39-46
    • /
    • 2019
  • This paper proposes an efficient tag identification scheme for ISO/IEC18000-7 standard by dividing the tags into smaller groups. Tag grouping is based on the reader's transmission power. This can reduce the responding tags in the collection round. If the small number of tags exists, we can anticipate the collision probability will decrease. And it makes the identification speed high. A collection round initiated by the reader's collection command. It also proceeds with increasing the power of the reader until all tags are identified. The results showed that 25% of the performance improved.

IEEE 802.22 WG에서의 CR 응용: WRAN OFDMA 기술

  • Seon Tae-Hyeong;Jang Gyeong-Hui
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.28-37
    • /
    • 2006
  • 전파 자원은 국가의 무형 자산으로서 자원이 한정되어 있는 반면에 이에 대한 수요가 급증하면서 전파 자원의 가치가 점점 높아지고 있다. 특히 국내의 경우 IT839 전략으로 추진 중인 WiBro(Wireless Broadband), DMB(Digital Multimedia Broadcasting), Home Network, Telematics(Telecommunication Informatics), WCDMA(Wide Code Division Multiple Access), RFID/USN(Radio Frequency Identification/Ubiquitous Sensor Network) 등 무선 주파수를 이용하는 새로운 서비스가 증가하면서 주파수 자원에 대한 중요성은 더욱 강조되고 있다. 종래의 전파 정책이 정부가 정책을 세우고 이를 관리하는 Command-and-Control 위주였다면, 향후의 전파 정책은 OpYN1020en Spectrum 정책으로 전환될 것으로 전망된다. 본 고에서는 전파 자원의 효율적인 이용을 도모하는 일반적인 CR(Cognitive Radio) 기술에 대하여 언급하고, 이를 이동성이 없는 고정 환경에 적용하기 위한 IEEE 802.22 WRAN 시스템의 물리계층 전송 규격 사양, 프레임구조 및 현재 논의되고 있는 기술에 대하여 논의한다.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Optimal MIFARE Classic Attack Flow on Actual Environment (실제 환경에 최적화된 MIFARE Classic 공격 절차)

  • Ahn, Hyunjin;Lee, Yerim;Lee, Su-Jin;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2240-2250
    • /
    • 2016
  • MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.

UbiController: Universal Mobile System for Controlling Appliances in Smart Home Environment (UbiController: 스마트 홈 환경의 가전기기 제어를 위한 통합 모바일 시스템)

  • Yoon, Hyo-Seok;Kim, Hye-Jin;Woo, Woon-Tack;Lee, Sang-Goog
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1059-1071
    • /
    • 2008
  • Users in ubiquitous computing environment can easily access and use a multitude of devices and services anywhere and anytime. The key technology to realize this scenario is the method to intuitively provide proper user interfaces for each device and service. Previous attempts simply provided a designated user interface for each device and service or provided an abstract user interface to control common functions of different services. To select a target appliance, either user directly specified the target device or depended on sensors such as RFID tags and readers limiting the applicable scenarios. In this paper, we present UbiController which uniquely uses camera on the mobile device to recognize markers of appliances to acquire user interface for controlling task. UbiController aims to provide automatic discovery of multiple services in the smart home environment, support traditional GUI and novel camera-based recognition method as well as intuitive interaction methods for users. In this paper, we show experiments on the performance of UbiController's discovery and recognition methods and user feedback on interaction methods from a user study.

  • PDF