• Title/Summary/Keyword: Wireless identification system

Search Result 206, Processing Time 0.026 seconds

A Design of Management System for Sensor Nodes Identification Scheme in Wireless Sensor Networks (무선 센서 네트워크 환경에서의 센서 노드 식별 체계 관리 시스템 설계)

  • Ryu, Seung-Hak;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1016-1018
    • /
    • 2010
  • 무선 센서 네트워크(Wireless Sensor Network)는 유비쿼터스 컴퓨팅 구현을 위한 기반 네트워크로 초경량, 저전력의 센서들로 구성된 무선 네트워크이다. 센서노드에서 센싱된 데이터는 싱크노드에 의하여 수집되어 사용자에게 제공된다. 이런 환경에서 서비스마다 다른 정보교환 방법을 사용하는 것은 사용자들에게 불편함을 주므로 사용자와 서비스 간의 원활한 정보공유 및 교환방법을 위한 표준화된 식별 체계가 필요하다.

A Study on Pre-treatment and Performance Evaluation for Printing RFID Antenna with Conductive Paste (RFID 안테나용 전도성 프린팅을 위한 PET 직물의 최적 전처리 공정연구 및 성능평가)

  • Hong, Jinpyo;Jung, Chando;Yoon, Seokhan;Choi, Sanghyun
    • Textile Coloration and Finishing
    • /
    • v.25 no.4
    • /
    • pp.287-291
    • /
    • 2013
  • Nowadays, terms such as 'Smart Textile', 'Intelligent Textile' and 'Wearable Computing' are commonly used in everyday contexts. And radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. These products are required technologies which are textile treatments, printing, ink, etc. Durability of textile substrates is an essential marker for conductive ink printing process. Especially, heat stability is important, since conductive ink should be processable (annealing, curing) at temperatures below $150^{\circ}C$. This study was application of RFID on textiles. The textile pre-treatment processes should be carried out to use RFID antenna on textiles.

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

A Study on a Wireless Communication-based Tool Control System to prevent FOD Occurrence (FOD 발생 예방을 위한 무선통신 기반 공구 관리 시스템 연구)

  • Junyi Park;Myungjun Kim
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.2
    • /
    • pp.16-25
    • /
    • 2023
  • There are various types of foreign object debris (FOD) in the aviation industry. Tools lost by workers can act as a risk factor throughout aircraft operation, manufacturing, and maintenance fields. Accidents caused by tools lost due to workers' carelessness continue to occur throughout the aviation industry. Aviation-related institutions such as FAA and EASA have established tool control regulations and systems to prevent FOD occurrence. However, in Korea, related regulations and procedures are insufficient. A systematic and effective tool control system is required for reliable manufacturing, airworthiness, operation, and maintenance of aircraft. In this paper, tool control regulations and procedures of domestic and foreign air traffic authorities and aviation industry-related organizations were studied. A wireless communication-based tool control system was proposed based on the NAS 412's tool control regulations certified by the National Standards Association.

Implementation of Automatic Gate System under AVI/AEI (화물차량 및 화물 인식 중 자동 게이트 시스템의 구현)

  • Hong, S.B.;Hong, G.Y.;Lim, W.Y.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.12 no.2
    • /
    • pp.43-58
    • /
    • 2004
  • Up-to-date cargo transport system, CVO(Commercial Vehicle Operations) is the system to manage efficiently cargo distribution as providing at real time the information of cargo location and situation through ITS and GPS technology. In this paper, we proposed the Gate Automation System of harbors among AEI/AVI. To implement his system, we use the DSRC/RFID(Dedicated Short Range Communication / Radio Frequency IDentification) which adopts an wireless communication between RSE(Road-side Equipment) and OBE(on-Board Equipment) on a vehicle. When constructing the Gate automation system of harbors, the business application ability are reviewed practically and the logistics facilities to be constructed in the near future may use this project results according to the international standard and it could help complete integrated logistics system.

  • PDF

Performance Evaluation of a Pilot Interference Cancellation Scheme in a WCDMA Wireless Repeater (WCDMA 무선 중계기에서 파일럿 간섭제거 기법의 성능평가)

  • Kim, Sun-Ho;Shim, Hee-Sung;Im, Sung-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.111-117
    • /
    • 2009
  • In the wideband code division access (WCDMA) systems, a pilot channel is used to determine WCDMA network coverage, cell identification, synchronization, timing acquisition and tracking, user-set handoff, channel estimation, and so on. A wireless repeater, which is deployed in the urban area for the WCDMA system to meet the growing demand on wireless communication services, has the possibility to receive several pilot signals from a large number of base stations, however, cannot distinguish its service base station's signal among them. This pilot interference results in frequent handoffs in the user equipment, which degrades the radio reception, transmission efficiency, quality of service, and channel capacity and increases the unwanted power consumption. In this paper, thus, we propose a pilot pollution interference cancellation scheme using one of the adaptive estimation algorithms, normalized least mean square (NLMS), which is applicable to a wireless repeater. We carried out link-level and network-level computer simulations to evaluate the performance of the proposed scheme in a wireless repeater. The simulation results verify the bit error rate (BER) improvement in the link level and the call drop probability improvement in the network level.

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

A study for implementation of wireless sensor network to optimize building environment (건물 환경 최적화를 위한 무선 센서 네트워크 구현에 대한 연구)

  • Chung, Sung-Boo;Kim, Joo-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2235-2241
    • /
    • 2009
  • RFID and USN are major technology in Ubiquitous. RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders through RFID reader. USN is wireless sense network and monitoring environment conditions that is temperature, noise, pressure, oscillation. In this paper, we propose wireless sensor network system that is monitoring to optimize environment conditions.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.