• Title/Summary/Keyword: Reader Protocol

Search Result 175, Processing Time 0.03 seconds

Implementation of An Efficient Reader Protocol for Active RFID Readers (능동형 RFID 리더를 위한 효율적인 리더 프로토콜의 구현)

  • Moon, Young-Sik;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.822-829
    • /
    • 2009
  • A reader protocol is an interface between a host and RFID readers. There are several standards for reader protocol such as EPCglobal Low Level Reader Protocol (LLRP) 1.0.1, EPCglobal Reader Protocol (RP) 1.1, and ISO/IEC 15961/15962. Unfortunately, these standards focus on the passive RFID system, and so they are not appropriate for the active RFID system. In this paper, we implemented an efficient reader protocol for the active RFID system, which is based on EPCglobal LLRP 1.0.1, but smoothing/filtering functions of EPCglobal RP 1.1 are added. This protocol is designed to configure air interface parameters for active RFID readers and tags. It can reduce the amount of data transfer between the reader and host by filtering function, and can improve the performance of tag collection by smoothing function. In addition, it can remove inefficiency caused by tag memory data change according to the standards of ISO/IEC 15961/15962. In the real-world environment, we evaluated the performance of our implemented reader protocol using one RFID reader and 45 tags.

Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment

  • Song, In-Chan;Fan, Xiao;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.299-311
    • /
    • 2008
  • The Radio Frequency IDentification (RFID) system is a contactless automatic identification system, which comprises readers and tags. In RFID systems, a reader collision occurs when there is interference in communication between one reader and the tags, due to the signals from other readers. The reader collision problem is considered as the fundamental problem affecting high density RFID reader installations. In this paper, we analyze the existing reader anti-collision algorithms. We also propose a pulse protocol-based reader anti-collision algorithm using slot occupied probability (SOP). The implementation of this improvement is simple, yet it effectively mitigates most reader collisions in dense reader mode, as shown in our simulation. That is, the proposed algorithm reduces the identification time, and increasesthe system throughput and system efficiency compared with the conventional reader anti-collision algorithms.

Design and Implementation of a R1000/R2000 based RFID Reader Which Supports the Low Level Reader Protocol (LLRP를 지원하는 R1000/R2000 겸용 RFID 리더)

  • Bae, Sung-Woo;Ryu, Won-Sang;Kwak, Ho-Gil;Joung, Sub-Myoung;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.279-286
    • /
    • 2010
  • RFID reader protocol is an interface between RFID readers and higher (host) such as RFID middlewares and applications. At present, reader protocols provided by vendors are different from each other and there are compatibility problems in environment using heterogeneous readers. In this paper, to solve this problem, an RFID reader which supports LLRP(Low Level Reader Protocol), a well-known standard reader protocol presented by EPCglobal is designed and implemented. It is designed with two modules and supports various interfaces for easy adaptation to various applications. The LLRP protocol is implemented over a embedded LINUX multi-thread environment. It not only supports almost all properties of LLRP, and is designed with flexible hardware/software architecture to meet various requirements.

Pulse Protocol-based Hybrid Reader Anti-collision Algorithm using Slot-occupied Probability under Dense Reader Environment (밀집 리더 환경 하에서 슬롯 점유확률을 이용한 Pulse Protocol 기반의 Hybrid 리더 충돌방지 알고리즘)

  • Song, In-Chan;Fan, Xiao;Yoon, Hee-Seok;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10A
    • /
    • pp.987-996
    • /
    • 2008
  • In this paper, the conventional anti-collision algorithms, such as Channel Monitoring algorithm and Pulse Protocol algorithm are analyzed. To decrease tag identification time, and increase system throughput and efficiency, we propose a new reader anti-collision algorithm, Pulse Protocol-based Hybrid Reader Anti-collision Algorithm, using Slot-occupied Probability under dense reader environment. The proposed algorithm uses Slot-occupied Probability to improve the performance of Pulse Protocol Algorithm. That is, A reader checks Slot-occupied Probability after generating random backoff time. If Slot-occupied Probability is greater than 0, it uses another new random backoff time to avoid reader collision. We also compare the performance of the proposed algorithm with those of Channel Monitoring and Pulse Protocol algorithms in respect of identification time system throughput, and system efficiency. Simulation results show that the proposed algorithm has an increment of 5% of identification time and system throughput as increasing the number of readers.

A Study about Implementation Method of Multi-Interface Multi-Channel 2.4GHz Active RFID Reader Protocol (다중인터페이스 다중채널 2.4GHz 능동형 RFID 리더 프로토콜 구현방법에 관한 연구)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-Doek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1005-1014
    • /
    • 2010
  • When reader collect tags, we found that they tend to get together to specific interface in Multi-Interface Multi-Channel 2.4GHz Active RFID system. To solve this problem, we designed the LP-Combind and AP-Balanced protocol for load distribution between interfaces, then verified its superiority of the performance through the simulation. There are three problems to implement designed protocols in hardware of firmware-level. first, tag selects randomly the channel of reader and reader need the method which can change the channel of tags. second, reader has the synchronization problem between reader and tag. third, reader has problem that MCU of reader have to operate simultaneously dual interface. To slove this problems, we designed the message and implemented method for tag channel change and the protocol in order to adjust synchronization between reader and tag, Therefore, we compared and analyzed the performance of protocols by experiment. If LP windows size is same, the performance of LP-Combined protocol and AP-Balanced protocol which lower collision probability by its load distribution is more outstanding than single interface protocol performance.

Performance of Multiple Coordinators-based RFID Reader Protocol (다중 코디네이터를 이용한 RFID 리더 프로토콜 성능 분석)

  • Lee, Se-Hee;Yang, Hoon-Gee;Yang, Sung-Hyun;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2247-2256
    • /
    • 2011
  • In this paper, we propose a coordinator-based reader protocol that can avoid reader collisions in a passive RFID system. In a proposed protocol, unlike conventional protocols that a reader itself selects its own slot randomly to communicate with tags such as DCS, Colorwave, a coordinator reader allocates an unused slot to a reader to participate in the network and sends a current slot number. A reader allocated a slot can communicate with tags. The proposed protocol can adaptively modified to apply for multiple coordinator readers environment in a wide area. This causes reader collision problem, but can be alleviated partly by applying the frequency planning. In this way, we verifies that a RFID system using the proposed protocol is three to five times better than existing systems through the simulation.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

Multi-Protocol RFID Reader SoC Design (Multi-Protocol RFID Reader SoC 설계)

  • Ki, Tae-Hun;Bae, Gyu-Sung;Kim, Jong-Bae;Moon, Jeon-Il
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.667-668
    • /
    • 2006
  • Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. RFID systems is coming into increasing use in industry and logistics. This paper discuses implementation of multi-protocol RFID reader SoC. The SoC contains multi-protocol RFID RFID reader, CPU, UART, memory.

  • PDF

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF