• Title/Summary/Keyword: radio frequency identification (RFID)

Search Result 766, Processing Time 0.033 seconds

A study on the Anti-Collision of RFID system using Instruction Code Sufficiency (명령 코드 충족 알고리즘을 이용한 무선인식 시스뎀의 데이터 충돌 방지에 관한 연구)

  • 강민수;이동선;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6B
    • /
    • pp.544-552
    • /
    • 2003
  • This paper suggests an instruction code sufficiency algorithm preventing data collision when multiple transponders attempt to connect in the radio frequency identification system. Conventional time domain procedure generates unconditional collision. On the other hand, this algorithm prevents data collision by transmitting data when it meets instruction code. When multiple transponders are transmitting data coincidently, they exploit desired data with using difference of arrival time generated by recognition distance, respectively. As a result of simulation, utilizing the wireless recognition system, adopting the suggested algorithm, operating in 13.56MHz frequency band, it verify that there is Anti-collision and data loss by ensuring transmission time difference of one bit by adopting this algorithm.

A Study on Factors for Adopting of RFID Application Technology (RFID 응용 기술의 도입에 미치는 영향 요인에 관한 연구)

  • Park, Cha-Gil;Yi, Seon-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1018-1029
    • /
    • 2008
  • Recently, RFID(Radio Frequency Identification) application technology is the core of ubiquitous technology. this research examines the factors for adopting the RFID application technology together with factors for adopting the related information system such as ERP, SCM, EDI by researching relevant literature. this research attempts to derive the factors for adopting RFID application technology by using the Delphi Method. The factors for adopting the information technology of the above-mentioned three areas totaled 116 adoption factors. Based on these 116 adoption factors, the factors for adopting RFID application technology were to be derived. A total of 27 adoption factors were derived in the first Delphi investigation. Of the total 27 adoption factors, final 9 adoption factors could be derived by conducting frequency analysis and relative importance analysis. In other words, 9 adoption factors that were derived last were found to be the cost related to tag, relationship with customer firms, compatibility of technology, information technology-based structure, trust and coordination between business firms, intensity of competition within the industry, the standardization of RFID technology, the top management's support and participation degree of client companies. When business firms try to adopt RFID application technology afterwards, concrete and close examination from this point of view was found to be necessary.

An Empirical Study on the Factors Affecting RFID Adoption Stage with Organizational Resources (조직의 자원을 고려한 RFID 도입단계별 영향요인에 관한 실증연구)

  • Jang, Sung-Hee;Lee, Dong-Man
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.125-150
    • /
    • 2009
  • RFID(Radio Frequency IDentification) is a wireless frequency of recognition technology that can be used to recognize, trace, and identify people, things, and animals using radio frequency(RF). RFID will bring about many changes in manufacturing and distributions, among other areas. In accordance with the increasing importance of RFID techniques, great advancement has been made in RFID studies. Initially, the RFID research started as a research literature or case study. Recently, empirical research has floated on the surface for announcement. But most of the existing researches on RFID adoption have been restricted to a dichotomous measure of 'adoption vs. non-adoption' or adoption intention. In short, RFID research is still at an initial stage, mainly focusing on the research of the RFID performance, integration, and its usage has been considered dismissive. The purpose of this study is to investigate which factors are important for the RFID adoption and implementation with organizational resources. In this study, the organizational resources are classified into either finance resources or IT knowledge resources. A research model and four hypotheses are set up to identify the relationships among these variables based on the investigations of such theories as technological innovations, adoption stage, and organizational resources. In order to conduct this study, a survey was carried out from September 27, 2008 until October 23, 2008. The questionnaire was completed by 143 managers and workers from physical distribution and manufacturing companies related to the RFID in South Korea. 37 out of 180 surveys, which turned out unfit for the study, were discarded and the remaining 143(adoption stage 89, implementation stage 54) were used for the empirical study. The statistics were analyzed using Excel 2003 and SPSS 12.0. The results of the analysis are as follows. First, the adoption stage shows that perceived benefits, standardization, perceived cost savings, environmental uncertainty, and pressures from rival firms have significant effects on the intent of the RFID adoption. Further, the implementation stage shows that perceived benefits, standardization, environmental uncertainty, pressures from rival firms, inter-organizational cooperation, and inter-organizational trust have significant effects on the extent of the RFID use. In contrast, inter-organizational cooperation and inter-organizational trust did not show much impact on the intent of RFID adoption while perceived cost savings did not significantly affect the extent of RFID use. Second, in the adoption stage, financial issues had adverse effect on both inter-organizational cooperation and the intent against the RFID adoption. IT knowledge resources also had a deterring effect on both perceived cost savings and the extent of the RFID adoption. Third, in the implementation stage, finance resources had a moderate effect on environmental uncertainty and extent of RFID use while IT knowledge resources had also a moderate effect on perceived cost savings and the extent of the RFID use. Limitations and future research issues can be summarized as follows. First, it is difficult to say that the sample is large enough to be representative of the population. Second, because the sample of this study was conducted among manufacturers only, it may be limited in analyzing fully the effect on the industry as a whole. Third, in consideration of the fact that the organizational resources in the RFID study require a great deal of researches, this research may deem insufficient to fulfill the purpose that it initially set out to achieve. Future studies using performance research are, therefore, needed to help better understand the organizational level of the RFID adoption and implementation.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

The Optimized Detection Range of RFID-based Positioning System using k-Nearest Neighbor Algorithm

  • Kim, Jung-Hwan;Heo, Joon;Han, Soo-Hee;Kim, Sang-Min
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.297-302
    • /
    • 2008
  • The positioning technology for a moving object is an important and essential component of ubiquitous computing environment and applications, for which Radio Frequency Identification(RFID) has been considered as a core technology. RFID-based positioning system calculates the position of moving object based on k-nearest neighbor(k-nn) algorithm using detected k-tags which have known coordinates and kcan be determined according to the detection range of RFID system. In this paper, RFID-based positioning system determines the position of moving object not using weight factor which depends on received signal strength but assuming that tags within the detection range always operate and have same weight value. Because the latter system is much more economical than the former one. The geometries of tags were determined with considerations in huge buildings like office buildings, shopping malls and warehouses, so they were determined as the line in I-Dimensional space, the square in 2-Dimensional space. In 1-Dimensional space, the optimal detection range is determined as 125% of the tag spacing distance through the analytical and numerical approach. Here, the analytical approach means a mathematical proof and the numerical approach means a simulation using matlab. But the analytical approach is very difficult in 2-Dimensional space, so through the numerical approach, the optimal detection range is determined as 134% of the tag spacing distance in 2-Dimensional space. This result can be used as a fundamental study for designing RFID-based positioning system.

  • PDF

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

Application of a REID-Based Monitoring System for the Concrete Pour Process (RFID를 응용한 콘크리트 타설 모니터링 시스템의 적용방안)

  • Moon, Sung-Woo;Hong, Seung-Moon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2007
  • A ubiquitous environment in construction should be developed integrating hardware and software systems. The objective of this paper is to study the feasibility of applying the RFID technology to the concrete pour process, and improve the effectiveness of data exchange A pilot system of u-CPS (Ubiquitous Concrete Pour System) has been developed to test the feasibility. The pilot can automatically generate the data for concrete pour work such as departure time, arrival time, concrete pour time. Construction managers can keep track of the progress of concrete pour work using the information. A case study was done for a building construction using the pilot system, the result of which demonstrated that the RFID-base system can help improve the effectiveness of data communication during the concrete pour process.

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.

Miniaturization of Circular Loop Antenna Using Meander Line for RFID Tag Applications (미앤더 라인을 이용한 RFID 태그용 원형 루프 안테나의 소형화)

  • Ryu, Hong-Kyun;Woo, Jong-Myung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.6 s.121
    • /
    • pp.591-601
    • /
    • 2007
  • In this paper, the miniaturized radio frequency identification(RFID) tag antennas used in UHF band$(908.5{\sim}914MHz)$ are designed and fabricated by using the circular loop antenna(CLA). Miniaturization of CLA was possible to transform the structure of circular loop into the structure of meander line. In the case of double meander line CLA is reduced up to 83% compared with the general type CLA. The $S_{11}$, -10 dB bandwidth, and gain of double meander line CLA were -11.9 dB, 12 MHz(1.3%), and -1.18 dBd. Also, a small half-wavelength CLA using double meander line is designed and fabricated for flat snack bag coated aluminum. The antenna is reduced up to 92.1% except ground. It shows the $S_{11}$ of -16.5 dB, -10 dB bandwidth of 48 MHz(5%) and gain of -0.58 dBd. The radiation pattern shows omni-directional pattern in z-y plane(x-axis pol.). Through this result, we can confirm that miniaturized type CLAs using meander lines are suitable for miniaturized RFIB tag antennas with the UHF band.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF