DOI QR코드

DOI QR Code

A Direction-Decision RFID System with a Authentication

인증 기능을 갖는 방향 결정 자율이동 RFID 시스템

  • 박철민 (동서대학교 컴퓨터정보공학부) ;
  • 조형국 (동서대학교 컴퓨터정보공학부) ;
  • 이훈재 (동서대학교 컴퓨터정보공학부)
  • Published : 2008.06.30

Abstract

RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.

RFID은 다양한 응용이 가능하며, RFID 시스템의 기본적인 목적은 대상물의 인증이다. RFID 시스템은 태그의 인증 후에 시스템이 원하는 프로세스를 수행한다. 태그가 움직이는 대로 뒤따르는 RFID 전동 시스템은 응용 범위가 넓다. 예로서 쇼핑몰에서 카트가 자율적으로 인증된 고객의 뒤를 따르는 것이다. 고객이 직접 카트를 끌지 않고, 고객의 진행하는 방향을 인지하여 자율적으로 뒤를 따른다면 매우 편리할 것이다. 본 논문에서는 RFID를 이용하여 태그를 소지하고 있는 물체를 자율적으로 뒤따르는 방향결정 자율이동 RFID 시스템에 대해 연구하였다. 제안된 RFID 시스템은 태그, 리더 그리고 호스트 컴퓨터로 구성되며, 시스템을 구현하여 실험 및 분석하였다.

Keywords

References

  1. Chipcon Tech. Support, 'User Manual Rev. 2.0', Chip AS, (2004), www.chipcon.com
  2. Hwang-Hae Kyun, Sung-Jun Bae, 'I love ATMEGA128', Bok-Du Verlag, (2005)
  3. Duck-Yong Yun , 'AVR ATmega128 Master', (2004)
  4. Klaus Finkenzeller, ' RFID Handbook', John Wiley & Son, LTD, (1999)
  5. Jonathan Collins, 'FTC Asks RFID Users to Self- Regulate', RFID Journal, Mar. 10, (2005)
  6. E. Kaasinen, 'User Acceptance of MobileServices- Value. Ease of Use, Trust and Ease of Adoption,' doctoral dissertation, VTT 566, VTT Publication,(2005)
  7. Vinay Deolalikar, Malena Mesarina, John Recker, Salil Pradon,'Perturbative time and frequency allocations for RFID reader networks' (2006) USN
  8. Kyung-Hyup Lee, Yoon-Young An, Hee-Dong Park, You-Ze Cho,' A Data-centric Self-organization Schema for Energy-Efficient Wireless Sensor Networks' (2006) USN (USN 2006 in Seoul)
  9. Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim, 'MARP: Mobile Agent for RFID Privacy Protection', 7th Smart Card Research and Advanced Application IFIP Conference (CARDIS '06), Lecture Notes in Computer Science, vol.3928, pp.300-312, April 2006
  10. 'FIPA Agent Management Specification,' FIPA 2004 Specification, Foundation for Intelligent Physical Agents, March 2004.
  11. W. Jansen, T. Karygiannis, 'NIST Special Publication 800-19-Mobile Agent Security,
  12. W. Stalling, Cryptography and Network Security (4th edition), Prentice-Hall, 2006
  13. W. Trappe & L. Washington, Introduction to Cryptography with coding theory (2nd edition), Prentice-Hall, 2006
  14. NIST, 'Announcing the Advanced Encryption Standard (AES)', FIPS-197, Nov. 2001
  15. Daesung kwon, Jaesung Kim, Sangwoo Park, Soohak Sung, Yaekwon Sohn, Junghwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong, 'New Block Cipher: ARIA,' LNCS 2971 - ICISC2003, pp.432-445, Springer, 2004
  16. KISA, Development of SEED, the 128-bit block cipher standard, Oct, 1998. (http://www.kisa.or.kr)
  17. A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W.Millan, Sang-Jae Moon, L. Simpson, 'The LILI-II Keystream Generator,' LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002)
  18. Kevin Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon, 'Dragon: A Fast Word Based Stream Cipher,' LNCS (ICISC'2004)2004.12.2-12.3
  19. Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communications,' Signal Processing, Vol.82,No.2,pp.259-265, Feb, 2002 https://doi.org/10.1016/S0165-1684(01)00180-3
  20. Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, Aug. 1, 2002
  21. TTAS.KO-12.0011/R1, 'Hash Funtion Standard - part 2: Hash Function Algorithm Standard (HAS- 160),' Dec. 20, 2002. (http://www.tta.or.kr)
  22. R.C.Joshi and Shashikala Tapaswi, 'Frame Sliced Parallel Signature Files for Fast Colored Image Retrieval', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.5-9, 2007
  23. Sanjay Raghani, Durga Toshniwal and R. C. Joshi, 'Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.10-21, 2007