• Title/Summary/Keyword: location tracking system

Search Result 573, Processing Time 0.037 seconds

A Time Interval Index for Tracking Trajectories of RFID Tags : SLR-Tree (RFID 태그의 이력 추적을 위한 시간 간격 색인 : SLR-트리)

  • Ryu, Woo-Seok;Ahn, Sung-Woo;Hong, Bong-Hee;Ban, Chae-Hoon;Lee, Se-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.59-69
    • /
    • 2007
  • The trajectory of a tag in RFID system is represented as a interval that connects two spatiotemporal locations captured when the tag enters and leaves the vicinity of a reader. Whole trajectories of a tag are represented as a set of unconnected interval because the location of the tag which left the vicinity of a reader is unknown until it enters the vicinity of another reader. The problems are that trajectories of a tag are not connected. It takes a long time to find trajectories of a tag because it leads to searching the whole index. To solve this problem, we propose a technique that links two intervals of the tag and an index scheme called SLR-tree. We also propose a sharing technique of link information between two intervals which enhances space utilization of nodes, and propose a split policy that preserves shared-link information. And finally, we evaluate the performance of the proposed index and prove that the index processes history queries efficiently.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

Implementation of Smart Shoes for Dementia Patients using Embedded Board and Low Power Wide Area Technology (저전력장거리 기술과 임베디드 보드를 이용한 치매 돌봄 스마트 신발 구현)

  • Lee, Sung-Jin;Choi, Jun-Hyeong;Seo, Chang-Sung;Park, Byung-Kwon;Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.100-106
    • /
    • 2020
  • In this paper smart shoes for dementia care using embedded boards and Low Power Wide Area technology and their application software are implemented. The communication board composed of Cortex-M3 board and LoRa module is embedded into groove made in outsole of smart shoes. Including the mold, the shoe outsole was manufactured by hand. By using application software and embedded board, caregiver can track the position of dementia patient using GPS and LoRa network. The location tracking and data transmission operations of smart shoes have been successfully verified in the outdoor environment. The smart shoes of this paper are applicable to a safety device to prevent the disappearance of demented patients through results of experiments and if bigdata is collected and analyzed by deep-learning, it may be helpful to analyze the predictive path of dementia patients or the pattern of dementia.

Review of Operating Technological Innovation in the Logistics Industry of Uzbekistan: Opportunities and Challenge (우즈베키스탄 물류산업의 기술혁신운영 현황 고찰: 기회와 도전)

  • Sevara, Karimova;DonHee, Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.1
    • /
    • pp.83-94
    • /
    • 2023
  • The study examines the current status of introducing technological innovation in the Uzbekistan logistics industry and proposes opportunities and challenging factors for the logistics industry following the introduction of technological innovation in the future. The analysis results revealed that the information technology used in the Uzbekistan logistics industry following technologies: RFID, barcode, Cool Guardian, tracking system, transport satellite monitoring, digital TIR, and GPS monitoring. In addition, Uzbekistan has recently been increasing investment in advanced information and communication technology not only at the corporate level but also at the governmental level in anticipation of becoming a hub for logistics. Based on these analysis results, the Uzbekistan logistics industry's proposed opportunities and challenging factors can be used as basic information for government policymakers, transportation and logistics companies, and various partners. It can also be used by logistic companies that seek to take advantage of Uzbekistan's strategic location to create a logistics hub in Central Asia.

Development of the Path Generation and Control System for Unmanned Weeding Robot in Apple Orchards (사과 과원 무인 제초를 위한 작업 경로 생성 및 경로 제어 시스템 개발)

  • Jintack Jeon;Hoseung Jang;Changju Yang;Kyoung-do Kwon;Youngki Hong;Gookhwan Kim
    • Journal of Drive and Control
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2023
  • Weeding in orchards is closely associated with productivity and quality. The customary weeding process is both labor-intensive and time-consuming. To solve the problems, there is need for automation of agricultural robots and machines in the agricultural field. On the other hand, orchards have complicated working areas due to narrow spaces between trees and amorphous terrain. Therefore, it is necessary to develop customized robot technology for unmanned weeding work within the department. This study developed a path generation and path control method for unmanned weeding according to the orchard environment. For this, the width of the weeding span, the number of operations, and the width of the weeding robot were used as input parameters for the orchard environment parameters. To generate a weeding path, a weeding robot was operated remotely to obtain GNSS-based location data along the superheated center line, and a driving performance test was performed based on the generated path. From the results of orchard field tests, the RMSE in weeding period sections was measured at 0.029 m, with a maximum error of 0.15 m. In the steering period within row and steering to the next row sections, the RMSE was 0.124 m, and 0.047 m, respectively.

Institutional and Technical Improvement Measures to Facilitate the Use of Smart Construction Safety Technology (스마트 건설안전 기술 도입 촉진을 위한 제도적⋅기술적 개선 방안에 관한 연구)

  • Jaehyun Jeong;Sang I. Park;Hyungtaek Sim;Yuhee Kim
    • Journal of the Korean Society of Safety
    • /
    • v.39 no.1
    • /
    • pp.41-54
    • /
    • 2024
  • Efforts to reduce on-site safety incidents have expanded, leading to active research in this domain. However, a systematic analysis to improve the utility of technology is lacking. In this study, we conducted a survey on the various institutional and technical improvement measures to promote the application of smart construction safety technology over three years after the implementation of the "Smart Safety Equipment Support Project." The results showed that financial constraint was the primary obstacle in the adoption of this innovation. Fostering a flexible environment in the utilization of management fees and financial support of projects was determined to aid in the extensive application of the technology. Ensuring cost efficiency and user-friendliness were principally necessary for technical enhancements in the smart construction safety technology. Technologies, such as VR/AR safety education, real-time location tracking, wearable devices, and innovation on streamlining safety-related work efficiency, had been anticipated to contribute to on-site safety. Operating a smart safety control center was expected to be beneficial in the systematic securing of data and reduction of safety blind spots. Effective methods had been suggested to overcome the barriers that hindered the development and application of smart construction safety technology. This study facilitates in the technological improvements in this field.

Design and Implementation of Centralized TIS-B Server for Broadcasting Air Traffic Situation (항공 교통 상황 방송 서비스를 위한 중앙 집중형 TIS-B 서버 설계 및 구현)

  • Song, Inseong;Jang, Eunmee;Choi, Sangbang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.27-39
    • /
    • 2015
  • As a radar based air surveillance hits the limit along with the growing air traffic needs, a new air surveillance technology called ADS-B has emerged. ADS-B provides more accurate position information with a shorter interval, and aircraft equipped with ADS-B transponders can check each other's location. However not all aircraft are equipped with ADS-B transponders, and aircraft with different ADS-B data links cannot check each other's location. To address these problems a TIS-B service, which broadcasts information that a radar is tracking, and an ADS-R service, which cross-broadcasts information of different ADS-B data links, have been emerged. In this paper, we design and implement a centralized TIS-B server for broadcasting air traffic situation which is capable of providing a TIS-B service and an ADS-R service at the same time. The implemented TIS-B server has been verified with a configured ADS-B ground system, by receiving ADS-B surveillance data and radar surveillance data followed by generating surveillance data for providing a TIS-B service and an ADS-R service and simulating broadcast of those generated surveillance data.

A Study on Indoor Position-Tracking System Using RSSI Characteristics of Beacon (비콘의 RSSI 특성을 이용한 실내 위치 추적 시스템에 관한 연구)

  • Kim, Ji-seong;Kim, Yong-kab;Hoang, Geun-chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.85-90
    • /
    • 2017
  • Indoor location-based services have been developed based on the Internet of Things technologies which measure and analyze users who are moving in their daily lives. These various indoor positioning technologies require separate hardware and have several disadvantages, such as a communication protocol which becomes complicated. Based on the fact that a reduction in signal strength occurs according to the distance due to the physical characteristics of the transmitted signal, RSSI technology that uses the received signal strength of the wireless signal used in this paper measures the strength of the transmitted signal and the intensity of the attenuated received signal and then calculates the distance between a transmitter and a receiver, which requires no separate costs and makes to implement simple measurements. It was applied calculating the value for the average RSSI and the RSSI filtering feedback. Filtering is used to reduce the error of the RSSI values that are measured at long distance.It was confirmed that the RSSI values through the average filtering and the RSSI values measured by setting the coefficient value of the feedback filtering to 0.5 were ranged from -61 dBm to - 52.5 dBm, which shows irregular and high values decrease slightly as much as about -2 dBm to -6 dBm as compared to general measurements.