Documente Academic
Documente Profesional
Documente Cultură
Mara Victoria Bueno Delgado, PhD Assistant Professor Department of Information Technologies and Communications Technical University of Cartagena, Spain
Contents
What is RFID? How does RFID work? RFID: a bit of history Research topics on RFID To summarize
What is RFID?
Contactless keys
Lock/unlock cars
Passive HF tags
Applications
Active tags
Standards
(1) Price 2009 (2) LF/HF tags, UHF 0.30 /u. Price 2009
6
HF Fixed
HF Portable
UHF Fixed
UHF Portable
Active Readers
7
Im here!
10
11
Im here!
Im here!
12
13
1940-1950....1950-1960.....1960-1970.....1970-1980.....1980-1990.....1990-2000.....2000-2010
1948-Harry Stockman, Communication by means of reflected power (Proc. of the Institute of Radio Engineers)
Every country focused on different applications (LF and HF): USA: access control and transport . Europe: industrial application and animal control. Japan: FeliCa card (contactless payment)
15
In this decade(I)
2000-2004
Advances in communications, microelectronics, antennas design Huge decrease in the cost of the technology No global standards:
A massive RFID implementation started around the world!!!: Everyone wanted to be RFID developer, RFID supplier, RFID consumer. Auto-ID consortium was created to put in order the chaos that was appearing on RFID world. Auto-ID was formed by hundreds of companies focused on RFID, universities and research centers (MIT, U. Cambridge, U. Adelaide, U. Keio, U. Fundan, U. St. Gallen)
16
CHAOS!!!
Hundreds of proprietary communication protocols for RFID at different operating frequencies (UHF, LF, HF), different product data codes, etc. Applications: passports, libraries, hospitals, museums, traceability, airports
In this decade(II)
At the end of 2004 AutoID + ISO
Global standardization of active RFID: ISO 18000-7 Global standardization of passive RFID
LF: ISO 18000-2 HF: ISO 18000-3 UHF: EPCglobal class-1 Gen-2 standard (ISO-18000-6)
EPCglobal Network standard (middleware for global interconnection) Unique data format: Electronic Product Code (EPC)
17
In this decade(III)
2005- RFID tracking as a replacement of barcodes
Wal-Mart required its top 100 suppliers to apply RFID labels to all shipments After that, other companies followed the same steps: DoD in US, Target, Tesco, Metro Group, etc. RFID Data Quantity Writable Dirt Influence, sight Obstruction Up to Kbytes Read only, WORM, R/W No effect Barcodes 1 to 100 bits Read only Very high
Degradation/wear
Unauthorized copying Read speed Read distance Data format standards Quality standards Cost
none
Encryption prevented ms 0.50m, 1 m, 10m, 100m Few No, inmature From 0.05
Susceptible
Susceptible s 10 cm Many Yes Inexpensive
18
Currently (I)
We are imagining a world where everything is tagged with RFID: clothes, food, medicines, mobiles, laptops, humans
19
Currently (II)
Many applications are emerging for managing millions of tags in the world, developing Intelligent Human Environment
Smart appliances
RFID Washing machine RFID Refrigerator
Healthcare applications
Patient safety (identification and medication administration) NFC for access control, e-ticket, payment, car parking Human implants to lock/unlock the house, car, laptop, collect medical data, etc.
20
Mobile applications
22
23
A.T. Mobashsher et al., A novel High-Gain Dual-Band antenna for RFID Reader Applications, IEEE Antennas and Wireless Propagation Letters, vol.9, pp. 653-656, 2010. T. Deleruyelle et al., Dual band mono-chip HF-UHF tag antenna, Proc. of IEEE International Symposium on Antennas and Propagation Society, pp. 1-4, 2010. P. Iliev et al., Near field/Far field RFID tag antenna. Proc. of 4th European Conference on Antennas and Propagation, pp. 1-4, 2010. G.J. Owen et al., On The Effect of Mutual Coupling on LF and UHF Tags Implemented in Dual Frequency RFID Applications. Proc. of IEEE International Symposium on Antennas and Propagation, pp. 1-4, 2009.
A. Amin et al., Design and characterization of Efficient Flexible UHF RFID tag Antennas. Proc. of 3rd European Conference on Antennas and Propagation, pp. 2784-2786, 2009.
M. Martinez-Moreno et al., Dipole antenna design for UHF RFID tags. Proc. of International Conference on Electrical, Communications and Computers, pp. 220-224, 2009.
25
26
27
R. Hosaka, An analysis for electrical noise of electric bulb shaped fluorescent tube to maintain security level of medical use RFID tag. Proc. of World Congress on Medical Physics and Biomedical Engineering, vol.1 25/12, pp 217-220, 2009. R. Hosaka, An analysis of PLC noise level for risk management of medical use RFID system. Proc. of 4th European Conference of the International Federation for Medical and Biological Engineering, vol. 22, pp. 21030-1033, 2008. W. Hong, R. Kan, S. Li, Electromagnetic compatibility of UHF-RFID to GSM. Proc. of International Symposium on Electromagnetic Compatibility, pp. 63-66, 2008.
To decide how to configure/set RFID system for minimizing impairments caused by interferences
G. Ibrahim, A. Plytage, UHF RFID Systems; Their Susceptibility to Backscattered Signals Induced by Electronic Ballast Driven Fluorescent Lamps. IEEE Transactions on Antennas and Propagation, vol. 58, n. 7, pp. 2473-2478, 2010. D. Arnaud-Cormos, T. Letertre, A. Diet, A. Azoulay, Electromagnetic Environment of RFID systems. Proc. of 37th European Microwave Conference, pp. 1652-1655, 2007. 28
Tags
Attached to liquids (absorption), Attached to metals (reflection) Harsh environment (placed in freezers) Close to human bodies
29
Most of incident energy is absorbed by water!!!... I have not enough energy to generate a response!!
ABSORPTION!!!!
30
Most of incident energy is reflected by metal!!! I have not enough energy to generate a response!!
REFLECTION!!!!
31
D.D. Arumugam, D.W. Engels, M.H. Mickle, Specific absorption rates in muscle tissues for passive UHF RFID tag backscatter. Proc .of Radio and Wireless Symposium, pp. 445-448, 2009. J. Singh, E. Olsen, K. Vorst, K. Tripp, RFID Tag Readability Issues with Palletized Loads of Consumer Goods. Journal of Packaging Technology and Science, vol. 22 (8), pp. 431-441, 2009. V. Derbek, C. Steger, R. Weiss, J. Preishuber, M. Pistauer, A UHF RFID measurement and evaluation test system, Elektrotechnik & Informationstechnik, vol. 124, no. 11 pp. 384390, 2007.
S.K- Kuo et al., Analysis and design of an UHF RFID metal tag using magnetic composite material as substrate. Progress in Electromagnetic Research, vol. 24, pp. 49-62, 2010. G.H. Hwang et al., UHF RFID metal tag applying to license plate using metal shielding and watertight methods. Journal on Smart Sensing and Intelligent Systems, vol.2 (4), pp. 549-563, 2009. R. Harish et al., Conformal RFID antenna design suitable for human monitoring and metallic platforms. Prof of 4th European Conference on Antennas and Propagation, pp. 1-5, 2010. 32
Tags
Attached to liquids (absorption), attached to metals (reflection) Harsh environment (freezer) Close to Human bodies
Communication
Tag-to-tag collisions Reader-to-reader collisions
33
Tags
Attached to liquids (absorption), attached to metals (reflection) Harsh environment (freezer) Close to Human bodies
Communication
Tag-to-tag collisions Reader-to-reader collisions
34
Im here!
Im here! Im here!
Im here!!
COLLISION!
Anti-collision/Identification protocol
35
36
Me!
A
Me!
37
M.V. Bueno-Delgado et al., Analysis of DFSA Anti-collision protocols in passive RFID environments. 35th IEEE Conference of the Industrial Electronics Society, 2009.
38
M.V. Bueno-Delgado et al., On the Optimal frame-length Configuration on real passive RFID systems. Journal of Network and Computer Applications. In press (doi:10.1007/s00779-006-0111-6) 2010.
J. Vales-Alonso et al., Analysis of Tag Loss Ratio in dynamic RFID systems. Journal of RF Technologies. In press (doi:10.3233/RFT-2010-005) 2010. M.V. Bueno et al., Estimation of the Tag Population with physical layer collision recovery. Proc. of 3rd International EURASIP Workshop on RFID Technology. 2010. C. Angerer et al., Recovering from collisions in Multiple Tag RFID Environments. Proc. of 3rd IEEE International Conference on Industrial Technologies, 2010.
39
Tags
Attached to liquids (absorption), attached to metals (reflection) Harsh environment (freezer) Close to Human bodies
Communication
Tag-to-tag collisions Reader-to-reader collisions
40
Internet
Central Server EPCglobal Network
R1
R2
Tags
Mobile Reader
Fixed Reader
R3
41
R1
R2 R3
R1
R2 R3
44
Tags
Attached to liquids (absorption), attached to metals (reflection) Harsh environment (freezer) Close to Human bodies
Communication
Tag orientation, Tag-to-tag collisions, reader-to-reader collisions
Middleware
46
EPC Network
Manufacturer (Gillete)
Retailer (SUPERMARKET)
47
1
Manufacturer (Gillete) Retailer/SUPERMARKET
48
Syntax
4th level
3rd level
2nd level
Top level
1
Manufacturer
. ds . 18559
. vnds . 47400
. verisign
Retailer . onsepc
com
com
49
1
Manufacturer (Gillete)
Retailer (SUPERMARKET)
1. Manufacturer tags the product 2. Manufacturer records product information (e.g., manufacture date, expiration date, location) into EPC Information Service (Data Base) 3. EPC Information Service registers EPC knowledge with EPC Registry (Entity records traceability every EPC product in the world). 50
Manufacturer (Gillete)
Retailer (Supermarket)
4. Manufacturer sends product to Retailer 5. Retailer records receipt of product into EPC IS (Data Base) 6. Retailers EPC IS then registers product knowledge with EPC Discovery Service
51
Manufacturer (Gillete)
Retailer (Supermarket)
When the retailer reads a tag, it only reads EPC code, without any information. Retailer wants to know: who is the manufacturer??? What is the product??, what is the product expiration date??, etc
52
7 8
Manufacturer (Gillete)
Retailer (Supermarket)
7. Retailer must query to Root ONS. This entity answer a IP address to connect with the Manufacturers Local ONS 8. Manufacturers Local ONS is queried for location of EPC-IS
53
Manufacturer (Gillete)
Retailer (Supermarket)
9. Retailer queries Manufacturer EPC IS for desired product information (e.g., manufacture date, expiration date, etc.)
54
EPC Network
Retailer Application
Manufacturer (Gillete)
Retailer (Supermaket)
55
Tags
Attached to liquids (absorption), attached to metals (reflection) Harsh environment (freezer) Close to Human bodies
Communication
Tag orientation, Tag-to-tag collisions, reader-to-reader collisions
An attacker modifies the EPC number on tags or kills tags (tags disabled) in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue.
An attacker modifies a high-priced items EPC number to be the EPC number of a lower cost item.
58
Wig
model #4456
Replacement hip
medical part #459382
(cheap polyester)
B. Alomair, Privacy versus Scalability in radio frequency identification systems. Computer Communications Journal, vol. 33 (18), pp. 2155-2163, 2010. P. Peris-Lopez et al., Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks Journal, vol. 54(9), pp. 1502-1508, 2010. D. Han et al., Vulnerability of an RFID authentication protocol conforming EPCglobal Class-1 Gen-2 Standards. Journal of Computer, Standards and Interfaces, vol. 31(4), pp. 648-652, 2009. C-L. Chen et al., Conformation of EPCglobal Class-1 Gen-2 standards RFID system with mutual authentication and privacy protection. Journal of Engineering Applications of Artificial Intelligence, vol. 22 (8) pp. 1284-1291, 2009. 60
Batteries life: GOAL to minimize power consumption PHY layer: hardware design to reduce consumption MAC layer: to minimize collisions, to maximize time in sleep mode NET layer: efficient multi-hop mechanisms
62
H. Cho et al., Reader collision avoidance for multihop deployment of active RFID readers. IEICE Electron. Express, vol. 7, no. 18, pp.1396-1402, 2010 . J. Vales Alonso et al, On the optimal configuration of CSMA-MS algorithm. Proc. of 3rd International EURASIP Workshop on RFID Technology, 2010. M.V. Bueno Delgado et al., Analysis of the identification process in active RFID systems with Capture Effect assumption. Proc of 6th European Workshop on RFID Systems and Technologies, 2010. A. Palomo Lopez et al., CSMA-Multi Stage Anti-collision Protocol for Active RFID Systems. Proc. of 4th International Workshop on RFID Technology, Concepts, Applications, Challenges, 2010.
63
To summarize
For every application with RFID new challenges at different layers
Physical Layer
MAC Layer
Energy constraints in collisions (only active RFID) New middleware platforms for worldwide data interchange Applications for reader-tag interaction
Upper Layers
64
Thanks!
M Victoria Bueno Delgado, PhD
Assistant Professor Technical University of Cartagena mvictoria.bueno@upct.es http://ait.upct.es/~mvbueno
65