Documente Academic
Documente Profesional
Documente Cultură
SEED
RFID
RFID
INTRODUCTION
Almost every product in the market has a barcode printed on it.
Barcodes are machine-readable parallel bars that store binary information,
revealing information about the product. Thus, it acts as the product
fingerprint. As we go to the supermarket to buy things, the checkout person
runs our selection over the scanner to scan the barcode, theres an audible
beep, and we are told how much money we owe.
But the days of barcode are numbered. The reason is that a
technology called radiofrequency identification (RFID) is catching on RFID
tags are being used by corporations to track people and products in just
about
every
industry.
They
transform
everyday
objects
like
cargo
containers, car keys, and even clothes on the rack at a shopping mall into
mini nodes on a network. Databases then record the location and status of
these network nodes to determine product movements.
RFID
A lot of developments are taking place in RFID technology that will change
the course of the industry, particularly in the supply chain area.
RFID
TRANSPONDER
A tag is any device or label that identifies the host to which it is
attached. It typically does not hinder the operation of the host or adversely
affect its appearance.
The word transponder is derived from the words transmitter and
responder. The tag responds to a transmitted or communicated request for
the data it carries.
ANALOG CIRCUITRY
DATA TRANSFER
POWER SUPPLY
EEPROM
DIGITAL CIRCUITRY
ROM
CONTROL LOGIC
SECURITY LOGIC
RAM
INTERNAL
LOGIC/MICROPROCESOR
RFID
the
transponder response.
The transponder
antenna
senses
the
interrogating field and serves as the means for transmitting the transponder
response for interrogation.]
RFID
CLASSIFICATION OF TAGS
On the basis of the presence of battery, tags can be classified into
active or passive tags.
Active tags are powered by an internal battery and are generally
read/write devices. They contain a cell having a high power to weight ratio
and are capable of operating over a temperature range of -50 to +70 degree
Celsius. Active tags have a finite life time. A suitable cell coupled to suitable
low power circuitry can ensure functionality of ten or more years depending
on operating temperatures, read/write cycles and usage. They have greater
size and increased cost compared to passive tags.
Passive tags operate without an internal battery source, deriving the
power to operate from the field generated by the reader. They are hence
lighter than active tags and have greater life time. They have shorter read
ranges compared to active tags. They are also constrained in their ability to
store data and perform well in electromagnetically noisy environments.
RFID tags can also be classified on the basis of coupling into
inductively and capacitively coupled tags.
RFID
RFID
UCC/EAN can be applied to data stored in tags. Tags are basically used to
carry
1.identifiers, in which a numeric or alphanumeric string is stored for
identification purposes or as an access key to data stored in a computer or
information management system.
2. Portable data files in which information is organized for communication.
Tags can be obtained that can store single bits to kilobits. The single bit
devices are used for surveillance purposes. Retail electronic article
surveillance (EAS) is the typical application which activates an alarm in the
interrogating field. They can also be used for counting applications.
RFID
linked to carrier frequency. The higher the frequency, the higher the
transfer rates. Depending on the memory, the tag contains data that can be
read-only; write once read many (WORM) or read /write. Read-only tags are
low capacity devices programmed at source usually with an identification
number. WORM devices are user programmable devices. Read/write devices
are also user programmable but allow the user to change data stored in a
tag. Portable programmers may also be present that allows in-field
programming of the tag while attached to the item being identified or
accompanied.
READER/INTERROGATOR
The
reader/interrogators
can
differ
considerably
in
complexity
RFID
referred to as Hands Down Polling. A more secure, but slower tag polling
technique is called Hands Up Polling which involves the interrogator
looking for tags with specific identities and interrogating them, in turn. A
further approach uses multiple readers, multiplexed into one interrogator
but results in cost increase.
RFID
the
phenomenon
is
called
multi-path
attenuation.
At
higher
The power within the tag is generally much less than that from the
reader, requiring sensitive detection capability within the reader to handle
the return signals. In some systems, the reader constitutes a receiver and is
separate from the interrogation source or transmitter, particularly if the uplink (from transmitter to tag) carrier is different from the down-link (from
tag to reader).
100-500mW power are values quoted for RFID systems, whereas the
actual values should be confirmed with the appropriate regulatory
authorities in the countries where the technology is being applied. The form
RFID
RFID SYSTEM
An RFID system consists of RFID tags, a means of reading or
interrogating the tags and a means of communicating the data to a host
computer or information management system. The system will also include
a facility for entering or programming data into tags, if it is not done at the
source by the manufacturer. There may also be present antennas for
communication between the ag and the reader.
ANTENNA
READER
RF MODULE
TRANSPONDER (TAG)
CONTROL
MODULE
HOST
COMPUTER
RFID
The reader sends out a radio frequency wave to the tag and the tag
broadcasts back its stored data to the reader. The system has two antennas,
one for the tag and the other on the reader. The data collected from the tag
can either be sent directly to a host computer through standard interfaces
or it can be stored in a portable reader and later updated to the computer
for data processing. The automatic reading and direct use of tag data is
called automatic data capture.[8]
When the tag which is battery free, is to be read, the reader sends out a
power pulse to the antenna lasting for about 50ms.The magnetic field
generated is collected by the antenna in the transponder that is tuned to the
same frequency. This received energy is rectified and stored on a capacitor
within the transponder. When the power pulse has finished, the transponder
immediately transmits back its data, using the energy stored within its
capacitor as its power source. The data is picked up by the receiving
antenna and decoded by the reader unit. Once all the data has been
transmitted, the storage capacitor is discharged resetting the transponder
to make it ready for the next read cycle. The period between transmission
pulses is called sync time and lasts between 20ms and 50ms depending on
the system set up.
RFID
SYSTEM PERFORMANCE
Reading
distance:
The
actual
reading
distance
depends
on
the
RFID
The orientation in line with a ferrite antenna produces the largest read
ranges from 2mm glass transponder.
Reading speed: Many applications require that that transponder must
remain in the reading range. Since a standard stationary reader completes
one cycle in abut 120ms, transponders must remain in the boundaries of a
readout pattern for at least that amount of time.
IMMOBILIZER SYSTEM
Immobilizers are the security systems in automobiles. The latest
generation of RFID transponders called crypto transponders can be used as
the chief part of immobilizers.
RFID
RFID
Cryptographic Background
From the cryptographic point of view, the problem of immobilization
consists of two different tasks, the identification of the driver and proving
his identity, the authentication. Several cryptographic means are applicable
for driver authentication.
Knowledge
The authentication is based on the knowledge of a secret, for example
a password or PIN (Personal Identification Number) that has to be
presented to proof the identity. For automotive applications any method
using a keyboard is unacceptable for most of the users. In addition the level
of security is unacceptable.
Biometrics
Biological attributes, such as fingerprints, voice, and retinal or face
patterns could theoretically be used for authentication of the driver.
However, the technical effort for such systems is still high compared to keybased immobilizers and not acceptable for automotive applications. In
addition, the problem of renting a car to someone else and emergency use
of a vehicle becomes a critical issue.
Possession
Student Empowerment and Education Development (SEED)
www.seed-india.org
0512-2589004, 9450736060
RFID
RFID
Various
security
systems
using
RFID
transponders
the
most
commonly
have
been
Code
Systems
are
used.
During
delivered
unprogrammed.
Programming
is
done
by
the
user.
RFID
RFID
RFID
Fig.
4. Crypto Transponder System
The response R is a function of the encryption key Ke , the challenge
RAND and the cryptographic algorithm Fc. R=f(Fc, RAND, Ke ).
The response is returned to the transceiver using Frequency Shift Keying
(FSK).
The security system calculates the expected response using the same
algorithm and the same encryption key and compares the response received
from the transponder to the calculated one. The calculation of the expected
response can be done simultaneously to the communication between
Student Empowerment and Education Development (SEED)
www.seed-india.org
0512-2589004, 9450736060
RFID
RFID
than
50ms.
Even
during
the
encryption
process,
the
current
Design Objectives
The Digital Signature Transponder was based on many established
circuit blocks and assembly techniques to ensure compatibility to existing
Student Empowerment and Education Development (SEED)
www.seed-india.org
0512-2589004, 9450736060
RFID
Low data processing effort for the encryption algorithm in the car
security system
Encryption
All encryption algorithms are theoretically breakable. An algorithm is
computationally secure if it cannot be broken within a reasonable amount of
Student Empowerment and Education Development (SEED)
www.seed-india.org
0512-2589004, 9450736060
RFID
to
interpretations.
Current
assumptions
for
attacks
against
The attacker will not spend more than five minutes in the vehicle
The key is not longer than ten days available for analysis
The key is not longer than ten days available for analysis
Dictionary attacks can be used if the key was available to the attacker
for a
certain period of time to build a dictionary of challenge response pairs. In
the vehicle, the attacker hopes for a challenge that is already in his
dictionary to reply with the correct response and start the engine.
Statistical calculations show that even if the key is available for 10
days and the dictionary is built at a rate of four responses per second, the
probability for a successful attack within five minutes in the car is only
0.47%. Taking into consideration that this effort has to be repeated for each
vehicle, it can be understood that this method is uneconomic for the thief.
RFID
authentication,
the
base
station
transmits
challenge
to
the
RFID
Transponder Antenna
The antenna consists of a coil and a capacitor for tuning the circuit to
the nominal carrier frequency of 125kHz.The coil has a ferrite core for
improving the distance of read, write and programming operations.
RFID
Clock extractor.
Field gap detector for data transmission from the base station to the
IC.
Controller
The controller has the following functions:
Power on reset
RFID
Bit Decoder
The bit decoder forms the signals needed for write operation and
decodes the received data bits in the write data stream
Modulator
The modulator consists of two data recorders. Manchester and
biphase modulation are possible.
HV Generator
RFID
RFID
RFID
RFID
APPLICATIONS
Principle areas of applications of RFID include:
1. Transportation
2. Manufacturing and processing.
3. Security.
Texas Instruments Radio Frequency Identification (TI-RFid) Systems
has introduced its new RFID tag for textile rental and dry cleaning
applications. TI-RFid tags provide more accurate identification and greater
accountability as well as improved handling through each stage of cleaning
and processing to final customer delivery.
RFID system allows booksellers to gain such information as the range
of books a shopper has browsed, the number of times a particular title was
picked up, and even the length of time spent flipping through pages.
Gillete ,Wal-Mart, and Tesco will install specially designed shelves that can
read RF waves emitted by microchips embedded in millions of their
products. The shelves can scan the contents of the shelves and, via
computer, alert store employees when supplies are running low or when
theft is detected.
RFID
ADVANTAGES
plastics,
RFID
DISADVANTAGES
Cost
RFID solutions cost much higher than the conventional barcodes. A
large fraction of its cost lies in the software infrastructure and the
enterprise application and integration
Lack of standardization.
Standardization has not been provided across many fronts, ranging
RFID
Long checkout lines at the grocery store are one of the biggest
complaints about the shopping experience. This is mainly due to the time
consuming use of UPC barcodes. These codes act as product fingerprints
made of machine-readable parallel bars that store binary data.
RFID
with
electronic
immobilizers
decreased
to
about
one-tenth
is
technology
that
uses
radio
signals
for
automatic
RFID
Contact Details :
STUDENT EMPOWERMENT AND EDUCATION DEVELOPMENT
(SEED)
www.seed-india.org
Regd. Office: 117/171-B, Q-Block, Sharda Nagar, Kanpur- 208025
Branch Office: 315-A, Awadhpuri, Kanpur- 208024
Email-id: seedindia.10@gmail.com
Student Empowerment and Education Development (SEED)
www.seed-india.org
0512-2589004, 9450736060
RFID
Website: www.seed-india.org