Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts.

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

For more detailed information:
Rafrex LLC - RFID Solutions
Embedded Wireless Sensors Tony Arous Vincent Yu. Recap  RFID– Radio Frequency Identification  Sensors help to easily keep track of various information.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.
Beyond the Barcode RFIDs Radio Frequency Identification.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Sensors and Their Uses in Hospitals
Unit 5 BANKING –Banking Basics
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
RFID tagging Stephanie Allen, Gina Calcaterra, Michael Gray, Rahul Nair, Sumit Pahwa, Edward Robertson MGT 6772.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
Presented by Allyson Medina, RN
MICROCHIP IMPLANT NEGATIVE SIDES OF RADIO FREQUENCY IDENTIFICATION CHIPS.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
IPM Asset Solutions: Where Innovation Meets Experience.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
CS556 Idris Khames. What is RFID? RFID stands for radio frequency identification. It is one of automated systems which used to collect data The beginning.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
What is Anorexia? C.N.N.S. The Bracelet A Treatment for Anorexia Without the Fear of Pain.
Technology in Health Care By: Brook Niles.  An electronic medical record is a digital and portable version of the current paper file system that would.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Copyright © 2007 Wavetrend (US) Inc. 1 A World Leader in the Deployment of Active RFID (Radio Frequency Identification) Solutions.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium, 2006 * Presented by Justin Miller.
RFID. A Technology That Changes Everything John Davis.
ECE 497 Capstone Design.
Have you ever lost a pet? It wont happen to you, right? By Zaida A. Rendon.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Describe direct data entry and associated devices, e. g
An overview Adam McCullough – Group 10. Computers are unparalleled problem solvers. The fact that they are growing smaller, cheaper, and requiring less.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Radio Frequency Identification (RFID)
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Mark Gaynor and Bryan Duepner  Mark Gaynor, PhD – Saint Louis University School of Public Health, St. Louis, MO Associate Professor, Department of Health.
EDGE™ Final Project Plan Presentation P09001 – RFID Reader & Active Tag Philip Davenport (Industrial and Systems Engineering)
RTLS systems rev this is now slide 1do not print it to pdf things to do (check off when complete): add revision date to cover page remove triangles.
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
Patient Radio-Frequency Identification Ankle Bands December 5, 2011 Biomedical Device Innovation Fall 2011.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Intelligent parking system based on RFID
DISPENSE.
Presented by: BeeLinda L. Temple CPhT
Point of Use Dispensing
Designing a Production Plan
Apple Pay Research on NFC and the security threat
Internet of Things (IoT)
canada research chair in ethics, law & technology
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Embedded Wireless Sensors Tony Arous Vincent Yu

Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts Chemical CompositionChemical Composition  Each application requires a different type of sensor

Possible Uses on Humans  Identification  Security  Tracking  Monitoring vital signs  Diabetes monitoring  Medical purposes

Identification  Use of RFID (radio frequency identification)  Currently in use in form of ID cards  Possibility of insertion into the body 11 millimeter RFID tags below the right tricep11 millimeter RFID tags below the right tricep

RFID Background  A scanner is used which activates the grain sized sensor which sends identification  Sensor will send a unique ID to identify the person  Low-cost solution: about 5 cents each

Uses of RFID  ATM Scans the sensor for identification instead of card and passcodeScans the sensor for identification instead of card and passcode  Vending Machines Will not need changeWill not need change By scanning the sensor, will be able to bill you laterBy scanning the sensor, will be able to bill you later

Uses in Security  Customizing the scanners, specific areas can be off limits to people without sensors or with sensors restricted to the area  Certain devices can be customized so that only a person with correct sensor may use it

Tracking  Sensors can be implanted and when someone passes by a scanner they can be tracked  Can be used to track patients with Alzheimer’s disease  Track prisoners who escape

Monitoring Vital Signs  Sensors can be modified to be able to monitor vital signs  The sensor will continuously be collecting data, and when a scanner is in range, transmit the data to it

Diabetes Monitor  Instead of drawing blood to monitor glucose level, a sensor can be used to deliver the data to a patient

Medical Purposes  Use of sensors for hearing impaired and vision impaired patients  Not RFID

Additional Medical Purposes  No technology exists for monitoring: Oxygen LevelsOxygen Levels ElectrolytesElectrolytes  Levels are restricted to a very small window Potassium: 3 to 5.5 mEq/LPotassium: 3 to 5.5 mEq/L 1 in 5 hospitalized patients have low potassium1 in 5 hospitalized patients have low potassium 14% of patients in doctors’ offices14% of patients in doctors’ offices

Other Applications  Embedded in various items Product inventory: WalMartProduct inventory: WalMart MoneyMoney

Problems to Overcome  Energy Changing batteries in embedded tags will require too much time and moneyChanging batteries in embedded tags will require too much time and money  Signal Issues Signal failures, range of use, connection to other protocolsSignal failures, range of use, connection to other protocols  Security Must be able to trust the scanners and limit access to specific users/resourcesMust be able to trust the scanners and limit access to specific users/resources

More Problems to Overcome  Disruption RFID systems can be easily jammedRFID systems can be easily jammed Share frequency with Wi-Fi and cell phone networksShare frequency with Wi-Fi and cell phone networks  Bombardment Active RFID tags can be attacked continuously so that the battery dies very quicklyActive RFID tags can be attacked continuously so that the battery dies very quickly  Collision With the high expected usage of RFID, both reader and tag collisions will become commonWith the high expected usage of RFID, both reader and tag collisions will become common

Energy Problems  Current RFID tags use 2 different battery technologies 1. Active:Battery-powered Strong signals Long range1. Active:Battery-powered Strong signals Long range 2. Passive:No battery Weak signals Very short range2. Passive:No battery Weak signals Very short range

Energy Problems  Longest range on record: 12 billion miles Drawback is very short battery lifeDrawback is very short battery life  Need to develop a method to offer reasonable range with “infinite” battery  Methods to combat bombardment

Security Problems  A more secure system is needed, especially with the movement into skin-embedded sensors  Must limit what people have access to vital, secret information  Current RFID tags can be read at any time with no notification

Security Problems  Unique ID for every individual item in stores ID’s will then be tied to credit cardsID’s will then be tied to credit cards Security problems if tags are stolen, lost or removed from the productsSecurity problems if tags are stolen, lost or removed from the products  An effective method of destroying stored information after some time is needed

Preliminary Resolutions  Battery life: Rechargeable via wireless technologyRechargeable via wireless technology  Signal range: Use of repeaters to relay signalUse of repeaters to relay signal Amplified signal may be permitted if batteries can be recharged easily and cost-effectivelyAmplified signal may be permitted if batteries can be recharged easily and cost-effectively  Security: Setup infrastructure with limited accessSetup infrastructure with limited access

References  VeriChip:  VeriChip:  CNN Money:  CNN Money:  Technovelgy:  Technovelgy: