• Title/Summary/Keyword: Ubiquitous ID system

Search Result 61, Processing Time 0.025 seconds

Past Anti-Collision Algorithm in Ubiquitous ID System (Ubiquitous ID 시스템에서 고속 충돌 방지 알고리즘)

  • 차재룡;김재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.942-949
    • /
    • 2004
  • This paper proposes and analyzes the anti-collision algorithm in Ubiquitous ID system. We mathematically compares the performance of the proposed algorithm with that of binary search algorithm, slotted binary tree algorithm using time slot, and bit-by-bit binary tree algorithm proposed by Auto-ID center. We also validated analytic results using OPNET simulation. Based on the analytic results, comparing the proposed algorithm with bit-by-bit algorithm which is the best of existing algorithms, the performance of proposed algorithm is about 5% higher when the number of tags is 20, and 100% higher when the number of tags is 200.

Enhanced bit-by-bit binary tree Algorithm in Ubiquitous ID System (Ubiquitous ID 시스템에서의 Enhanced bit-by-bit 이진 트리 알고리즘)

  • 최호승;김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.8
    • /
    • pp.55-62
    • /
    • 2004
  • This paper proposes and analyzes two anti-collision algorithms in Ubiquitous ID system. We mathematically compares the performance of the proposed algorithms with that of binary search algorithm slotted binary tree algorithm using time slot, and bit-by-bit binary tree algorithm proposed by Auto-ID center. We also validated analytic results using OPNET simulation. Based on analytic result comparing the proposed Modified bit-by-bit binary tree algorithm with bit-by-bit binary tree algorithm which is the best of existing algorithms, the performance of Modified bit-by-bit binary tree algorithm is about 5% higher when the number of tags is 20, and 100% higher when the number of tags is 200. Furthermore, the performance of proposed Enhanced bit-by-bit binary tree algorithm is about 335% and 145% higher than Modified bit-by-bit binary tree algorithm for 20 and 200 tags respectively.

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Implementation of UHF Multi-band Multi-protocol u-ID Mobile Reader System (UHF 대역 멀티밴드 멀티프로토콜 ubiquitous-ID 휴대형 리더기 시스템 구현)

  • Ko, Dae-Soo;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.707-713
    • /
    • 2007
  • This paper implements a RFID multi-band multi-protocol reader platform, possible to select one of the UHF bands used in particular for distribution system in RFID, that is, from 860MHz to 960MHz, through programmable configuration. It also enables implemented platform in this paper to recognize many kinds of TAG protocol, such as EPC Class 1 GEN 1, Class 1 Gen2, ISO 18000-6A, B and C.

On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System (신기통신망 번호체계로서 번호문 번호체계를 이용한 보편개인대표 번호의 구현방안)

  • Ku Jay-Il;Chinn Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.165-172
    • /
    • 2006
  • This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.

  • PDF

Design and Implementation of Scalable ID Federation System in Mobile Computing Environments (모바일 컴퓨팅 환경에서 확장 가능한 ID 연동 시스템 설계 및 구현)

  • Ryoo, In-Tae;Kim, Bae-Hyun;Moon, Young-Jun;Cho, Yeong-Sub;Jin, Seung-Hun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.155-166
    • /
    • 2005
  • Currently, almost of all the Internet users have as many IDs as the number of sites they have subscribed for, The users should memorize and input every independent ID and password whenever they want to login to the system. Although ID management system is used to solve this problem, 10 and password management will become more complicated in the forthcoming ubiquitous computing environments because so many computers will be interconnected on various kinds of wired and wireless networks, Furthermore, it is not enough to use the existing single Circle of Trust (COT) ID management system for the forthcoming computing environments. To solve this problem, the paper proposes ID federation models in multiple COT domain and implements an ID federation system that can be scaled to mobile computing environment as well as wired computing environment. The proposed ID federation models has been verified to operate with no problem between the systems in different trust domains by doing the ID scaability test.

  • PDF

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Embedded System Implementation of Tree Routing Structure for Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 트리 라우팅 구조의 임베디드 시스템 구현)

  • Park, Hyoung-Keun;Lee, Cheul-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4531-4535
    • /
    • 2011
  • In this paper, USN(Ubiquitous Sensor Network) is used in the structure of the tree routing was implemented in embedded systems. Tree Routing in the USN to the sink node to transmit sensor data is one of the techniques. When routing, sensor data is transmitted based on pre-defined ID according hop number. In order to have optimal routing path, the current state of the wireless sector and the sensor node informations were used. Also, received sensor data and the results of the tree routing by implementing an embedded system. This embedded system can be applied to a portable sensor information collecting system.

Development of the passive tag RF-ID system at 2.45 GHz (2.45 GHz 수동형 태그 RF-ID 시스템 개발)

  • 나영수;김진섭;강용철;변상기;나극환
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.8
    • /
    • pp.79-85
    • /
    • 2004
  • In this paper, the RF-ID system for ubiquitous tagging applications has been designed, fabricated and analysed. The RF-ID System consists of passive RF-ID Tag and Reader. The passive RF-ID tag consists of rectifier using zero-bias schottky diode which converts RF power into DC power, ID chip, ASK modulator using bipolar transistor and slot loop antenna. We suggest an ASK undulation method using a bipolar transistor to compensate the disadvantage of the conventional PIN diode, which needs large current Also, the slot loop antenna with wider bandwidth than that of the conventional patch antenna is suggested The RF-ID reader consist of patch array antenna, Tx/Rx part and ASK demodulator. We have designed the RF-ID System using EM and circuit simulation tools. According to the measured results, The power level of modulation signal at 1 m from passive RF-ID Tag is -46.76 dBm and frequency of it is 57.2 KHz. The transmitting power of RF-ID reader was 500 mW

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.