Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19923
標題: RFID結合資訊系統防碰撞改善
Anti-Collision Improvements for Integrated RFID Information Systems
作者: 張世勳
Chang, Shih-Hsun
關鍵字: RFID
RFID
避免碰撞
Anti-Collision
出版社: 資訊科學與工程學系所
引用: [1] R. Weinstein, “RFID: A technical overview and its application to the enterprise,” IT Professional, Vol. 7, No. 3, pp.27-33, 2005. [2] S. E. Sarma, S. A. Weis, and D.W. Engels, ”Radio-frequency identification systems,” in CHES ''02, Springer-Verlag, 2002. LNCS no. 2523, pp. 454-469. [3] R. Damith and C. Peter, “Security in Low Cost RFID”, Technical ReportAdelaide-AUTOID-WP-HARDWARE-027, Adelaide Auto-ID Center, 2006 [4] A. B. Jeng, L. C. Chang, and T. E. Wei, “Survey and Remedy of the Technologies for RFID Tags against counterfeiting”, International Conference on Machine Learning and Cybernetics 2009 (ICMLC 2009), China, July, 2009 [5] 鄭博仁, 張立中, 魏得恩, “已知RFID標籤防偽技術的缺失與改善”, 2009資訊管理學術與實務研討會, 台北, 6月, 2009 [6] K. Finkenzeller, RFID Handbook: Fundamentals and Application in Contactless Smart cards and Identification 2nd edition. John Wiley & Sons, 2003. [7] D. Shih, P. Sun, D. Yen and S. Huang, “Taxonomy and Survey of RFID Anti-collision protocols”, Computer and communications, vol.29, pp. 2150–2166,2006. [8] Z. Tang, Y. He, “Research of Multi-access and Anti-collision Protocols in RFID Systems”, IEEE International Workshop on Anti-counterfeiting, Security, Identification, 2007. [9] MIT Auto-ID Center, “Draft protocol specification for a 900 MHz Class 0 Radio Frequency Identification Tag,” http://auto-id.mit.edu, February 2003. [10]B. Feng, J. Li, J. Guo and Z.-H. Ding, “ID-Binary Tree Stack Anti-collision Algorithm for RFID,” In Proceedings of the 11th IEEE Symposium on 65 Computers and Communications (ISCC’06), 2006. [11]C. Law, K. Lee and K. Siu, “Efficient Memoryless Protocol for Tag Identification,” In Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, ACM, pages 75-84, 2000. [12]J. Choi, D. Lee and H. Lee, “Query Tree-Based Reservation for Efficient RFID Tag Anti-Collision,” IEEE Common. Lett., vol. 11, no. 1, pp.85-87, 2007. [13] EPC TM , “Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz,” Version 1.1.0, 2007. [14]J. Myung and W. Lee, “Adaptive Splitting Protocols for RFID Tag Collision Arbitration," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 6, June 2007. [15]D. Lee, K. Kim and W. Lee, Q+- Algorithm: An Enhanced RFID Tag Collision Arbitration Algorithm," Springer-Verlag: Lecture Notes in Computer Science, 2007. [16]J. Myung and W. Lee, “Adaptive Binary Splitting for Efficient RFID Tag Anti-collision,” IEEE Commun. Lett., vol.10, no.3, pp.144–146, 2006. [17]J. Park, M. Chung and T.-J. Lee, “Identification of RFID Tags in Framed-Slotted ALOHA with Tag Estimation and Binary Splitting,” ICCE''06, 2006. [18]W. Chen and S. Horng, P. Fan, “An Enhanced Anti-collision Algorithm in RFID Based on Counter and Stack,” Systems and Networks Communications on ICSNC, 2007. [19]K. Ali, H. Hassanein and A. Taha, “RFID Anti-collision Protocol for Dense Passive Tag Environments,” 32nd IEEE Conference on Local Computer Networks, 2007. [20]H. Cho, W. Lee, and Y. Baek, “LDFSA: A Learning-Based Dynamic Framed 66 Slotted ALOHA for Collision Arbitration in Active RFID Systems” Springer-Verlag, GPC 2007, LNCS 4459, pp. 655-665, Berlin Heidelberg, 2007 [21]S. H. Choi and C. H. Poon, An RFID-based Anti-counterfeiting System, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_12, 19 Feb. 2008. [22]Juels, A. Strengthening EPC Tags Against Cloning. in ACM Workshop on Wireless Security (WiSe). 2005. [23]Duc et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. in The 2006 Symposium on Cryptography and Information Security. 2006. Hiroshima, Japan. [24]P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, LNCS, San Jose, USA, February 13-17 2006. Springer Verlag. [25]W. J. Yoon, S. H. Chung, S. J. Lee, and Y. S. Moon, “Design and Implementation of an Active RFID System for Fast Tag Collection”, Seventh International Conference on Computer and Information Technology, Department of Computer Engineering, Pusan National University, Busan, Republic of Korea 67 [26]S. H. Choi and C. H. Poon, “An RFID-based Anti-counterfeiting System”, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_12, 19 February, 2008.
摘要: 無線射頻辨識系統(Radio Frequency Identification:RFID)一直被廣泛的應用和不斷的發展,而且已經擴展到人們的生活上的個個角落,舉凡像是悠遊卡、eTag高速公路計費系統、物流管理都能看到RFID的身影,而RFID就是一種內建無線通訊技術的晶片,可以在晶片中儲存資料,像是產品的序號、生產日期、產品規格明細等。而現今晶片的體積也越來越小,可儲存的資料也越來越大,可以直接內嵌到產品裡上,或是附於辨識的產品上面,以不需要任何接觸的方式進行快速和大量的讀取儲存在晶片裡面的資料。和傳統的條碼(Barcode)系統相較起來,提供具有更高效率與彈性,提高物品的進出的效率和準確度,並增加倉儲管理的便利性。RIFD利用無線電波方式進行資料傳輸,在無線傳輸的環境中,當讀取器同時接收數個電子標籤回應的訊息,會造成碰撞(collision)而無法辦識的情況。因此避免碰撞(Anti-collision)的機制,就是要如何成功讓每一個標籤能夠分批的與讀取器進行通訊。 資訊系統一直是公司發展不可獲缺的角色,整合所有公司的資源和作業流程提供完整、即時、正確的資料。因此導入RFID系統和企業內部系統整合的話,將可以呈現出更正確、更迅速的資料,也提供更方便的工作程序。但是在防碰撞的機制中,所未知的變數包含標籤的數量、標籤的UID值,因此如果可以更準確的預測需辨識的標籤的數量,縮小標籤UID需辨識的範圍的話,這樣就可以減少碰撞的情況發生。
Radio frequency identification (RFID) has been broadly applied and continuously developed. RFID is a type of chip with built-in wireless communication technology. Direct contact is not required to rapidly read and store significant amounts of data within the chip. In a wireless transmission environment, when the reader simultaneously receives response information from several electronic tags, collision occurs and identification is impossible. Therefore, the primary algorithms used for anti-collision mechanisms are tree-base and aloha-base types. These enable each tag to successfully communicate with the reader in batches. Information systems are essential to company development. Therefore, the unknown variables for introducing and integrating RFID systems within an internal enterprise system include the number of tags and the UID value of the tags. Thus, accurately predicting the number of tags that must be recognized or identified and reducing the range of tag UID that must be identified can reduce the occurrence of collisions.
URI: http://hdl.handle.net/11455/19923
其他識別: U0005-1308201222242800
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-1308201222242800
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.