Radio Frequency Identification (RFID)

advertisement
Radio Frequency Identification
(RFID)
Presenter: Dusan Stevanovic
April 3, 2007
Introduction
RFID are systems that transmit identity (in
the form of a unique serial number) of an
object or person wirelessly, using radio
waves.
RFID is a subset of Auto-ID technologies such
as barcodes, optical card readers and some
biometric technologies
Next wave: Allows objects to be connected to
the Internet
Introduction
Basic RFID technology consists of
a reader and RFID tag
Reader is a device that has one
or more antennas that emit radio
waves and receive signals back
from the tag
RFID tag consists of a microchip
attached to a radio antenna
mounted on an underlying layer
Introduction
Perceived Advantages of RFID:
Non-line-of-sight (possibly built into or placed
inside containers)
Long range
Many tags read out at once
Robust (not as fragile as a printed bar code)
Gives a path from simple identification of objects
to locating objects
Almost as cheap as a printed bar code! (Almost….)
Outline
Brief history of RFID technology
How RFID technology works and description
of different types of RFIDs
RFID Standards
RFID Business Applications
Privacy and Security Issues in RFID
History of RFID technology
First application to identify planes in World
War II using radar
60’s - Electronic article surveillance (EAS)
used to identify whether an item has been
paid or not using a 1-bit tag
80’s first automated toll payment systems
History of RFID technology
Early 90’s – IBM developed UHF RFID
systems with better range (up to 20 feet
under good conditions) and faster data
transfer
Auto-ID Center established at MIT in 1999
Developed first low-cost RFID applications
Developed 2 air interface protocols and
Electronic Product Code (EPC) numbering
scheme
EPC technology is to be adopted by
retailers such as Wal-Mart and Target
How RFID technology works?
Active vs. Passive tags
2 main categories of RFID systems: passive and active tags
Active RFID systems:
Active tags have their own transmitter and power source
Write-once or rewritable
Broadcast a signal to transmit the data stored on the microchip using a
power source (battery, sunlight)
Operate at 455 MHz, 2.45 GHz, or 5.8 GHz
Long read range of 20 meters to 100 meters
Expensive – 10$ – 50$ per tag
Passive RFID systems:
Do not have a transmitter or power source
Write-once or rewritable
Reflect back radio waves coming from the reader antenna
Operate at LF, HF and UHF
Short read range of few centimeters to 10 meters
Cheap – 20¢ – 40¢ per tag
How RFID technology works?
Semi-Passive (Active) tags
Semi-Passive RFID tags
Use a battery to run the chip’s circuitry,
but communicate by drawing power from
the reader
Usually sleep until they are woken up by a
signal from the reader, which conserves
battery life
Write-once or re-writable
How RFID technology works?
Inductive Coupling in Passive tags
Used in low and high
frequency tags
A coil in the reader
antenna and a coil in
the tag antenna form an
electromagnetic field
Tag draws power from
the field, uses power to
run its circuitry and
changes the electric
load on the antenna
Tags pass information
by releasing energy
from the capacitor to
the tag coils in varying
strengths over time,
which affects the radio
frequency emitted by
the tag.
The reader antenna
senses the change in
the magnetic field and
converts these changes
into the ones and zeros
that computers
understand.
How RFID technology works?
Backscatter in Passive tags
Also called Propagation coupling
Used by UHF passive systems
No electromagnetic field is formed
Instead, the tag gathers energy from the reader antenna, and the
microchip uses the energy to change the load on the antenna and
reflect back an altered signal.
Modulation is accomplished by varying RF input impedance between 2
different states
To send data from the tag to the reader, the amplitude, phase or
frequency shift keying is applied
How RFID technology works?
Factors affecting Performance
Inductive coupling has a reader field of smaller size than
Backscattering method
Backscattering is harder to control, because waves travel longer
distances and can be received by the wrong tags
Low frequency tags are ideal for applications where tag needs to be
read through material or water at close range
Usually operate in 124 KHz – 135 KHz
High and Ultra-High frequency tags offer farther read range but do
not penetrate water or materials as well
How RFID technology works?
Factors affecting Performance
Detuning the antenna
With backscatter, the antenna is tuned to receive waves of
particular frequency
When an antenna is placed on an object or product packaging that
is not "RF friendly," the antenna can be detuned
Signal attenuation (Path Loss)
A tag’s reflected signal decreases as the inverse fourth power of
the distance between tag and reader
In other words, the signal emitted by the reader attenuates natural
with distance, and the signal reflected by a passive tag attenuates
at a much faster rate.
RFID Standards
Several RFID standards exist:
Identification, coding of unique item identifiers, or other data on the RF tag
Data and system protocols, effectively the middleware of an RFID system
The air interface, that is, the wireless communication between the reader
and the tag
Defines anti-collision schemes between a reader and tags such as pure
and slotted ALOHA
Defines network layers in RFID systems
Application support, which provides advice about how to implement the
technology
Examples:
ISO 14443 (for contact-less systems), ISO 15693 (for vicinity systems, such
as ID badges), and ISO 18000 (to specify the air interface for a variety of
RFID applications).
EPCglobal has developed widely accepted standards and one of them is EPC
standard, used for product identification
RFID Standards
RFID Standards
EPC Standard
A serial, EPC code, created by the Auto-ID Center, which will complement barcodes
EPCglobal has developed a Object Naming Service (ONS) system that is similar to the Domain Name
Service (DNS) used on the Internet.
ONS acts as a directory service for organizations wishing to look up product numbers (also known as
EPC numbers) on the Internet.
EPC has digits to identify the manufacturer, product category and the individual item.
Generation 1 EPC tags protected by an 8-bit password and no key-management, pure ALOHA
Generation 2 EPC tags require longer passwords and uses slotted ALOHA
RFID Standards
EPC™ Radio-Frequency Identity Protocols
Class-1 Generation-2 UHF RFID – January 2005
Protocol for Communications at 860 MHz – 960 MHz
Physical layer
Defines modulation between the reader and tag and vice versa
Defines which shift keying modulation should tags and readers support
Tag-identification layer
3 operations: Select, Inventory, Access
Select – selection of a specific Tag population
Inventory – identification of tags in a particular tag population
Access – communication with (reading from and/or writing to) a Tag after
Inventory command
Protocol (MAC) parameters for R->T and T->R
Data encoding
Data rates
Frame synchronization for Slotted-ALOHA
Frequency-hopping spread-spectrum in multiple reader environments
Channel width 500 kHz
Tag memory – reserved, EPC, TID memory to identify which commands tag
supports and user (rewritable) memory
defines formats of kill password, access password, EPC code
RFID Business Applications
RFID Network
RFID networks are usually deployed on top of Enterprise networks
Enterprise network: application servers, databases, switches, clients
RFID network: RFID readers, RFID client applications and
middleware
Network-centric design
RFID middleware between RFID readers and Enterprise/RFID applications
Middleware
Manages readers’ hardware
Process/Filters data from the readers
Between client applications and readers
Providing enterprise wide APIs on which end-users can build
software applications
RFID Business Applications
RFID Network
Piggyback Design
RFID network connected
directly to available ports
on edge switches
Pros: low-cost
Drawbacks: scalability
limited, vulnerable to high
traffic load
Dedicated Design
RFID readers connected
to the dedicated switches
Separated from enterprise
network
Pros: greater scalability
and resiliency, traffic load
handled by M/W
Drawbacks: more
expensive
RFID Business Applications
Supply chain management
RFID tags are used to track products throughout the
supply chain
Replacement for the bar code scanners
Efficiency
line-of-sight access to read the tag no longer
necessary
Simultaneous reading of multiple RFID tags
Read range of RFID is larger
Smart shelves
Placing RFID readers on store shelves
Automated just-in-time product shipments
RFID Business Applications
Mobile RFID
Mobile phone as RFID
reader
Integration of RFID and
wireless sensor network
infrastructure with mobile
communication and
wireless internet
Uses:
Making a reservation as
simple as holding the phone
close to advertising billboard
Purchasing movie tickets
Privacy/Security concerns
Privacy and Security Issues in
RFID
Unauthorized and anonymous readings of
tags
Privacy concerns including location tracking
and customer buying habits
Solutions: “kill switches”, sleeping tags,
tag passwords, encryption and tag blocking
Security concerns including credit card and
other ID information theft
Solutions: authenticate readers using ID
numbers stored in tags’ memory
References
1.
Roberti. Mark, 2007. What is RFID? [online]. Available from:
http://www.rfidjournal.com/article/articleview/1339/1/129/. [March 17th 2007].
2.
Roberti. Mark, 2007. The History of RFID Technology? [online]. Available from:
http://www.rfidjournal.com/article/articleview/1338/1/129/. [March 17th 2007].
3.
Roberti. Mark, 2007. The Basics of RFID Technology? [online]. Available from:
http://www.rfidjournal.com/article/articleview/1337/1/129/. [March 17th 2007].
4.
Landt, J. 2005. The History of RFID. IEEE POTENTIALS. 0278-6648. 8-12.
5.
6.
Weinstein, R., 2005. RFID: A Technical Overview and Its Application to the Enterprise. IT Pro. 1520-9202. 27-33.
Roussos, G., 2006. Enabling RFID in Retail. The 31st IEEE Conference on Local Computer Networks, Tampa, Florida –
November 14-17, 2006. IEEE Computer Society. 25-30.
7.
Phillips, T., Karygiannis, T., Kuhn, R., 2005. Security Standards for the RFID Market. Emerging Standards. IEEE
Computer Society. 1540-7993. 85-89.
8.
Lee, H., Kim, J., 2006. Privacy threats and issues in mobile RFID. Proceedings of the First International Conference on
Availability, Reliability and Security. Vienna, Austria – April 20-22, 2006. IEEE Computer Society.
9.
Zhao, Y.Z., Gan, O.P., 2006. Distributed Design of RFID Network for Large-Scale RFID Deployment. International IEEE
Conference on Industrial Informatics. Singapore – August 16-18, 2006. IEEE. 44-49.
10. EPC™ Radio-Frequency Identity Protocols. Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–
960 MHz Version 1.0.9 [online]. Available from:
http://www.epcglobalinc.org/standards/Class_1_Generation_2_UHF_Air_Interface_Protocol_Standard_Version_1.0.9.pd
f
Download