• Title/Summary/Keyword: Reader Response

Search Result 85, Processing Time 0.029 seconds

Fast and Reliable Tag Estimation Algorithm in RFID Systems with Collision-Oblivious Reader (충돌 비 감지 리더 기반의 RFID 시스템에서 신뢰성 있는 고속 태그 개수 추정 알고리즘)

  • Jeong, Han-You;Yoon, Won-Ju;Chung, Sang-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.85-94
    • /
    • 2010
  • Many RFID systems use dynamic slotted ALOHA to identify the label information of the RFID tags. One of the key problems in the RFID system is how to estimate the number of RFID tags up to the desired level of accuracy. In this paper, we present the framework of tag estimation algorithm for the collision-oblivious (CO) reader which can only decide whether the tag response is successful or not. Thus, the CO reader must rely on the success estimator to predict the RFID tag population. We propose two estimation algorithms to predict the number of RFID tags, named the memoryless success estimator (MSE) and the intersection-based success estimator (ISE). The MSE considers only the estimate obtained at the current inventory round, while the ISE finds an appropriate intersection interval of the existing estimates collected at every inventory round. Through the simulation results, we demonstrate that the ISE is a fast, accurate, and controllable estimator whose performance is close to that of the collision/idle estimators.

A Message Reduction Method for Performance Improvement of the ISO/IEC 18000-7 based Active RFID System (ISO/IEC 18000-7 기반 능동형 RFID 시스템의 성능 개선을 위한 메시지 감소 기법)

  • Yoon, Won-Ju;Chung, Sang-Hwa;Kang, Su-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1459-1467
    • /
    • 2009
  • In this paper, we propose a novel method for improving the tag collection performance in active RFID systems by modifying the tag collection algorithm in the ISO/IEC 18000-7 standard. The proposed method enables to reduce the time slot size by reducing the response message size from the tag and to decrease the number of command messages from the reader throughout the tag collection process. This results in reducing the time required for tag collection and the battery consumption on tags by decreasing the total amount of messages. Via the simulation experiments, we evaluated the performance of the tag collection applied with the proposed method, compared with that of the basic tag collection complying with the standard. The simulation results showed that the proposed method could decrease the total amount of messages between the reader and tags dramatically and reduce the average tag collection time by 19.99% and 16.03% when the reader requested the additional data of 50 bytes and 100 bytes from the tags, respectively.

Anti-Collision Algorithm for Fast Tag Identification in RFID Systems (RFID 시스템에서 고속 태그 식별을 위한 충돌방지 알고리즘)

  • Lim, In-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.287-292
    • /
    • 2007
  • In this paper, a QT_ecfi algorithm is proposed for identifying all the tags within the identification range. The proposed QT_ecfi algorithm revises the QT algorithm, which has a memoryless property. In the QT_ecfi algorithm, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. When the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. While the tags are sending their identification codes, if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ecfi algorithm outperforms the QT algorithm in terms of the number of queries and the number of response bits.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

A Revised QT Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜)

  • Lim, In-Taek;Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.430-436
    • /
    • 2006
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

RFID Distance Bounding Protocol to Secure Against Relay Attack by Using Full-Response (Full response를 사용하여 중계 공격에 안전한 RFID 거리제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.3
    • /
    • pp.298-300
    • /
    • 2016
  • We propose a RFID distance bounding protocol that RFID tag still responds when reader sends a void challenge in order to reduce the probability of a relay attack. We analyze the success probability of relay attack depending on the full challenge ratio. Our experimental results show that our protocol is secure to relay attack.

A Study on Checklist Development of Articulating Reading Appreciation (독서감상 표현을 위한 체크리스트 개발에 관한 연구)

  • Lee, Susang;Lim, Yeojoo;Joo, So-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.4
    • /
    • pp.205-228
    • /
    • 2021
  • This study focuses on the development of checklist on articulating reading appreciation, which will be used as the initial data for book recommendation for library users. As reading comprehension is prerequisite for reading appreciation, researchers analyzed research articles on reading comprehension to find out the core factors on reading comprehension and categorize them. Studies on reader response theory and literacy education were also examined: key words and phrases that will stimulate readers' response to reading were extracted and formed as questions. These questions were reviewed by experts on reading education. The final checklist consists of 14 questions - 4 questions on literal·inferential comprehension, 3 on evaluative comprehension, and 3 on appreciative comprehension.

The Value of Peace and the Acts of Women of the Old Testament from the Migrational Perspective (이주의 관점으로 본 구약성서의 여성들의 행동과 평화의 가치)

  • Choi, Eunyoung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.321-328
    • /
    • 2016
  • This study seeks the applicable value for contemporary multiculturalism based on the women (Hagar, Tamar, Rahab, Ruth, A great woman who lives in Shunem, A nameless servant girl) of the Old Testament who experienced migration. The article critiques uses of scripture that emphasize the roles of the women in the household. It provides a new interpretation through the perspective of feminist criticism, narrative criticism, and reader-response criticism. The article introduces the examples of six migrant women who created peace with people around them through their positive roles despite the fact that women had limited function under patriarchal society at that time. It suggests, while recognizing the difference regarding race, gender, and class between migrants and non-migrants, women and men, that they should not be used as the tools of discrimination. Furthermore, through these women from the Bible, the reader may find role models of independent women who are working for peace and social justice.

Embodying a Field of Thoughts and Communications as a Political Agenda: A Reading of Shelley's The Mask of Anarchy (정치적 의제로서의 사유와 소통의 장의 실현 -셸리의 『혼돈의 가면극』 읽기)

  • Min, Byoung Chun
    • Journal of English Language & Literature
    • /
    • v.56 no.4
    • /
    • pp.667-690
    • /
    • 2010
  • This essay attempts to read Percy Bysshe Shelley s The Mask of Anarchy by attending to a political agenda that Shelley seeks to propose and embody in the poem. This poem was written as a response to an exceptional political event, the Peterloo Massacre, and thus it is evident that Shelley intended to engage in contemporary politics by writing this poem. As many critics have pointed out, however, the way in which this poem addresses social, plitical issues is ambivalent and even confusing, since it contains many elements that contradict each other, and sometimes its political visions are based on incoherent conceptions. For this reason, this poem has been considered to be a failure as an occasional poem which should provide the reader with a clear direction for political actions. Faced with this critical problem, this essay proposes that the ambivalence this poem reveals-e.g., the confrontation between moderate artistic fantasy and radical tenets-is not a retreat from political activism, as some critics suggested, but a result of its creation and embodiment of a public sphere which invites various social classes and their positions. The mode in which Shelley conceives this unified public sphere in the course of writing The Mask of Anarchy can be interpreted in terms of the following three features. First, this poem underscores the significance of thoughts in constituting a communal space between people, thus asking the reader to participate in this process of thinking on given issues. Second, this poem suggests that people should enlighten each other by engaging in communicative reciprocations. Lastly, the public sphere formulated by the previous two features should incorporate various socio-political agents beyond class boundaries (even oppressors themselves) into its own working field. After explaining how these three features are manifested in the poem, this essay argues that the unified public sphere thus formed in the poem is the very agenda that Shelley aims to propose for the contemporaneous politics and culture. As a conclusion, this essay highlights how Shelley s project of creating a unified public sphere finally failed in contemporary history through observing two contrasting receptions of Shelley s works.