• 제목/요약/키워드: mobile RFID networks

검색결과 29건 처리시간 0.026초

RFID 기반 문화재 복원용 임목 이력 정보 시스템의 설계 및 구현 (Design and Implementation of RFID based Tree History Information System for Cultural Heritage Restoration)

  • 김삼근;문일환;박재표
    • 한국통신학회논문지
    • /
    • 제35권9B호
    • /
    • pp.1360-1368
    • /
    • 2010
  • 최근 RFID 기술이 발전함에 따라 그 부가가치가 부각되고 있는 문화재 복원용 임목(금강송) 또는 보호수 등의 주요 임목에 대한 이력 및 위치 정보를 전자적으로 관리할 수 있는 서비스에 대한 요구가 증가하고 있다. 하지만 기존의 주요 임목 정보 관리 체계는 대상 임목의 이력 정보를 도면과 문서대장을 이원화하여 수기 중심으로 관리하거나, 또는 임목 정보를 한정된 PDA의 저장소에 데이터 파일 형태로 보관하여 내부업무로 컴퓨터에 입력 및 계산을 통하여 자료화하는 구조로 관리되어 왔다. 이러한 관리 구조는 대상 임목의 이력 및 위치 정보를 파악하는데 확장성과 범위성 측면에서 많은 어려움을 내포하고 있다. 본 논문에서는 RFID 기반의 문화재 복원용 임목 이력 정보 시스템을 설계 및 구현하였다. 제안 시스템의 특징으로는 문화재 복원용 임목 위치 및 이력 정보를 기존의 수기 중심의 시스템보다 체계적이고 효과적으로 관리할 수 있게 지원해주는 것이며, 또한 서비스 대상의 임목정보를 제공 및 관리할 수 있도록 무선인터넷 또는 무선 랜을 이용한 모바일 RFID 서비스를 구현하여 업무 프로세스를 개선하는 것이다. 제안한 시스템의 특징을 구현을 통하여 확인하였다.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs

  • Ko, Doo-Hyun;Kim, Bum-Jin;An, Sun-Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권5호
    • /
    • pp.776-796
    • /
    • 2010
  • Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In integrated RFID-WSNs, the reader collision is one of the critical problems. Above all, due to the absence of universally applicable anti-collision protocols and the channel capture phenomenon, the medium access control protocols in integrated RFID-WSNs suffer from reader collision and starvation problems. In this paper, we propose an efficient MAC protocol, called EMP, to avoid the above problems in integrated RFID-WSNs. EMP is a CSMA-based MAC protocol which is compatible with sensor networks operating on integrated nodes which consist of an RFID reader and a senor node. EMP resolves not only the reader collision problem, but also the starvation problem using a power control mechanism. To verify the performance of EMP, we compared it with other anti-reader collision MAC protocols using simulations. As a result, the performance of EMP showed improvements in throughput, system efficiency, and energy consumption compared to the single data channel protocols (CSMA/CA, Pulse, and DiCa) in dense deployment environments.

유비쿼터스 인터페이스 기술에 대한 고찰 (A Study on the Ubiquitous Interface Technologies)

  • 이현재;오창헌
    • 디지털융복합연구
    • /
    • 제4권1호
    • /
    • pp.31-41
    • /
    • 2006
  • This article introduces developing trends of an 'Ubiquitous Interface' as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. 'Ubiquitous Interface' is a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These 'Ubiquitous Interface' able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended current technologies are RFID, NFC, Multi-mode mobile terminal, UMA mobile terminal and Wearable computer as a future ubiquitous interface. These technologies are have to have flexibility and multiple physical communication channels for seamless service hand over and serve easy connection at huge USN to user. Also, they have to must have flexible software structure. Finally, through the 'Ubiquitous Interface', we will be experience of seamless communication and realize a real liberty of communication.

  • PDF

사물인터넷 디바이스의 폐기 처리 정보를 활용한 객체 식별자, 모바일 RFID 및 QR 코드 구현 (Implementation of Object Identifier, Mobile RFID and QR Code Exploiting End-of-Life Treatment Information of Internet of Things Devices)

  • 서정욱
    • 한국정보통신학회논문지
    • /
    • 제24권3호
    • /
    • pp.441-447
    • /
    • 2020
  • 전 세계적으로 매년 약 5천만 톤의 전기 및 전자 폐기물이 발생하고 있는 상황에서 사물인터넷 디바이스가 2025년 약 750억 개에 달할 것으로 예상하고 있다. 그러나 사물인터넷 디바이스의 폐기 처리에 필요한 식별 기법에 대한 연구는 미미하다. 본 논문에서는 이러한 문제를 해결하기 위해 사물인터넷 디바이스의 재활용 가능률과 재생 가능률, 각 부품의 재활용률 및 재생률 등의 EoLT(End-of-Life Treatment) 정보를 포함한 식별자를 제안하며, 객체 식별자, 모바일 RFID 및 QR 코드로 구현한다. 구현된 객체 식별자와 모바일 RFID는 통신 네트워크를 통해 원격 서버와 연동하여 사용될 수 있고, 구현된 QR 코드는 스마트폰 앱을 통해 간단히 사용될 수 있다.

모바일 RFID 네트워크에서 세션기반 서비스 실행 모델 (An Service Execution Model based on Service Session for Mobile RFID Networks)

  • 한민규;홍진표;손상목
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2008년도 한국컴퓨터종합학술대회논문집 Vol.35 No.1 (D)
    • /
    • pp.196-201
    • /
    • 2008
  • 국내에서 추진하고 있는 모바일 RFID 네트워크 서비스는 국외에서 진행하는 단순 물품의 정보에 한정되는 RFID 서비스보다 진보된 서비스이다. 이는 단순히 사물에 대한 정보 서비스가 아니라 핸드폰을 가지고 있는 사람은 모두 대상이 되는 확장성 있는 서비스를 요구한다. 이에 따라 단순 물품에 한정되는 서비스 모델은 모바일 RFID 네트워크 서비스 모델로써 사용될 수 없으며, 개인화된 정보제공을 위한 서비스 모델이 필요하다. 이에 본 논문에서는 모바일 RFID 네트워크에서 핸드폰에 RFID 태그와 리더가 장착된 환경을 가정하여 개인화된 정보제공을 위한 서비스 모델에 따라 서비스에 대한 구성과 그 실행 모델을 제시한다.

  • PDF

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

유비쿼터스 인터페이스 기술의 개발 동향 (Developing Trend of an Ubiquitous Interface Technologies)

  • 이현재;오창헌
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2005년도 추계학술대회
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.