• Title/Summary/Keyword: RFID standard

Search Result 234, Processing Time 0.031 seconds

A Study on Efficiency of RFID Middleware System with Priority (우선순위를 고려한 RFID 미들웨어 시스템의 효율화에 관한 연구)

  • Song, Jeong-Hwan;Kim, Chae-Soo;Park, Sung-Mee;Choi, Woo-Yong;Kim, Jung-Ja;Lee, Sang-Wan
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.4
    • /
    • pp.430-438
    • /
    • 2007
  • In the current RFID (Radio Frequency IDentification) middleware systems based on the EPCglobal standard, the tag data received by multiple readers are processed sequentially in FIFO (First In First Out) order. Considering the priority of RFID reader makes the RFID system more flexible and improve the data transaction throughput in the service environment where important tag data with high priority for a specific reader. In this study, we propose a new RFID middleware system architecture supporting priority service with the Buffer Management Component. Our proposals are compliant with the EPCglobal ALE (Application Level Events) standard interface for middleware systems and their clients. To verify the efficiency of this proposed system, simulation is used for evaluation.

RFID Code System for Traceability of Medical Herb (한약재 이력 정보 추적을 위한 RFID 코드체계)

  • Kim, Chul;Kim, Sang-Kyun;Kim, Jin-Hyun;Song, Mi-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.973-977
    • /
    • 2009
  • The tracing system means that the system can follows, traces, and records every steps of production and delivery of goods and its ingredient. Specially, Koreans have big concern about food tracing system which is influential for health directly. We were more interested in medical herb using in oriental medicine than any other things. We proposed the process and design of tracing system for medical herb based on RFID(Radio Frequency IDentification) technology in this research. This study shows current medical herb tracing ways and RFID code system by using for world standard. Firstly, We designed the new process of traceability of medical herb with various preceding references based on RFID technology. Secondly we suggest that RFID code configuration using the international standard code(ISO code) and korean agricultural and marine products code for the proposed process. RFID code system is very important because this plays a means of identification for tracing about medical herb. The proposed code system have the elements as Issuing Agency Code, Issuer Number, inspection information, inheritance flag, area code, modified agricultural and marine products code, serial number in 96 Bit length. Lastly We defined the code-generation process in the tracing system.

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF

Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network (완성품 이력추적을 위한 EPC Network기반 EPCIS Capturing Application 개발)

  • Kim, Jinsuk;Shin, Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.19-26
    • /
    • 2015
  • Operating on its own to develop a system or based on the standard to setup and operating of RFID System. If you want to operate RFID system yourself then It is no problem to use its own to develop a system, but have to implementation RFID System based standard for the system integration and data linkage in multiple companies or base. In this paper, I propose an EPCIS Capturing Application of the element for applying an RFID-based EPC Network as an international civil standards organization EPCglobal. EPCIS Capturing Application generation is a message for transmission to EPCIS receives the data transmitted from the reader and middleware to serve to transfer the EPCIS. This paper also proposes Capture Interface capable of receiving the data of the equipment does not use the ALE Interface as a portable RFID reader ALE Interface, as well as used by the RFID reader to implement a fixed system for use in the field. In this paper, we propose a EPCIS Capturing Application for tracking the history RFID is applied to the finished product. It is possible to take advantage to be applied to all systems based on the EPCglobal standard through proposed the EPCIS Capturing Application.

The Accuracy analysis of a RFID-based Positioning System with Kalman-filter (칼만필터를 적용한 RFID-기반 위치결정 시스템의 정확도 분석)

  • Heo, Joon;Kim, Jung-Hwan;Sohn, Hong-Gyoo;Yun, Kong-Hyun
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.447-450
    • /
    • 2007
  • Positioning technology for moving object is an important and essential component of ubiquitous. Also RFID(Radio Frequency IDentification) is a core technology of ubiquitous wireless communication. In this study we adapted kalman-filter theory to RFID-based Positioning System in order to trace a time-variant moving object and verify the positioning accuracy using RMSE (Roong technology for moving object is an important and essential component of ubiquitous Mean Square Error). The purpose of this study is to verify an effect of kalman-filter on the positioning accuracy and to analyze what does each design factor have an effect on the positioning accuracy by means of simulations and to suggest a standard of optimal design factor of a RFID-based Positioning System. From the results of simulations, Kalman-filer improved the positioning accuracy remarkably; the detection range of RFID tag is not a determining factor. The smaller standard deviation of detection range improves the positioning accuracy. However it accompanies a smaller fluctuation of the positioning accuracy. The larger detection rate of RFID tag yields the smaller fluctuation in the positioning accuracy and has more stable system and improves the positioning accuracy;

  • PDF

A Design of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 시스템 설계)

  • Hong, Yeon-Mi;Cho, Yoon-Sang;Byun, Ji-Woong;No, Young-Sik;Park, Sang-Yeol;Oh, Sang-Hyun;Byun, Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.469-473
    • /
    • 2006
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification, sensor network, home network, telematics and so on. Especially, RFID middle-ware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middle-ware systems that process RFID tag data efficiently.

  • PDF

Conformance Evaluation Method by Successively Applying Self-Running Test Mode in Active RFID Tag (능동형 RFID 태그에서 자체 시험 모드를 순차적으로 적용한 적합성 평가방법)

  • Song, Tae-Seung;Kim, Tae-Yeon;Lyou, Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.204-212
    • /
    • 2008
  • Active RFID tags are currently used in harbor transportation; they are attached to cargo containers for sea transportation. They are designed to be able to be identified by RFID readers installed at ports in many countries. The international standard ISO/IEC 18047-7 regarding RFID conformance test methods suggests the use of air interface evaluation between an RFID reader and a tag. However, the test method suggested by the international standard is intended to detect a radio signal over only a very short period. Outcomes were uncertain, making it difficult to evaluate the system accurately. This paper proposes a new evaluation method by incorporating a 'self-running test mode' environment into the RFID tags in order to reduce the test time and increase testing accuracy. We found that the application of the suggested method to actual tags improves measurement time and uncertainty over that obtained using existing methods.

Implementation of RFID Reader System using the Data Encryption Standard Algorithm (표준 암호화 알고리즘을 이용한 RFID 판독 시스템의 구현)

  • 박성욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.55-61
    • /
    • 2003
  • The Data Encryption Standard(DES) has been a worldwide standard for over 20 years. DES is one of the block encryption techniques which ciphers 64-bit input data blocks using a 56-bit private key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. Thus, it is impossible to deduce the plaintext from the ciphertext which encrypted by this algorithm without the key. This paper presents an implementation of RFID roader system using the DES algorithm. An implemented system enhances the credibility of the encryption algorithm by using the Cipher Block Chining(CBC). Experimental results also show that the implemented system has better performance over the conventional commercial product.

  • PDF