Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Tags Reader Network Application Server DS NS CMD & Memory Access ID & User Mem.Data Middleware ID & Inform Access Pointed Inform & Status.
RFID Access Control System March, 2003 Softrónica.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Integrated Project – EC FP AspireRfid Solution Deployment Best Practices (beyond RFID Software and Middleware) ASPIRE Consortium Advanced Sensors.
RFID Group Progress Leader: Muhammad Salman Younas Team: Jawad Khalil Sheikh Saad Al-Shaalan Muhammad Al-Khamees.
Galaxy Inmarsat-C/GPS Trimble Navigation T. T Trimble Background Founded in 1978 by Charles R. Trimble Pioneered GPS technology Public corporation since.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Daniel E. Holcomb, Wayne P. Burleson and Kevin Fu
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
EPC Radio Frequency Identify Protocols Class1 Generation-2 UHF RFID 860 MHZ – 960 MHZ EPCglobal.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
1 Link Characteristics in Sensor Networks. 2 Why Such a Study? (in)validate whether the basic model used in design is accurate or not  Remember you have.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
Multidisciplinary Engineering Senior Design Project RFID Garage Door Entry System Preliminary Design Review Team Members: Kenneth Williams,
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
Lecture Notes #7 Radio Frequency Identification (RFID)
Confidential 1 Strategies for RFID Success. confidential 2 What is Driving RFID?
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
The physics of RFID Matt Reynolds Founding Partner ThingMagic LLC.
Chapter 11 - Reducing Interference in RFID Reader Networks
Diagnosing Wireless Packet Losses in : Separating Collision from Weak Signal Shravan Rayanchu, Arunesh Mishra, Dheeraj Agrawal, Sharad Saha, Suman.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network Dong-Hyun Ha Sejong University.
COEN 252 Computer Forensics
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
Wireless# Guide to Wireless Communications
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
RFID Technology Issues Interactive discussion. Intended to elicit comments and questions to lead towards White Paper outline.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
Overview of Research Activities Aylin Yener
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
RF Code Presentation To T-20 Standards Committee.
Practical Attacks on a Proximity Card Jonathan Westhues June
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
1. Physical Transmission Transmission Media Wire (guided) Coaxial cable Twisted Pair UTP STP Fiber Optic Wireless (unguided) Radio waves Microwave Infrared.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Dense Reader: Theory, Details & Experience Kevin Powell Symbol Technologies.
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
IS3220 Information Technology Infrastructure Security
Figure 2.1 Key Operational Parameters and Design Trade-off.
Korea University Ubiquitous LAB. Chapter 8. Design selection Ph.D Chang-Duk Jung.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
3506-D WEST LAKE CENTER DRIVE,
Microwave Communication Project
Chapter 5 – Design of Passive Tag RFID Readers
Chapter 6. Tag implementation
Radio Frequency Identification (RFID)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
Interference on the RFID Interrogation Range
Security in Networking
Mobile Agents.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Digital Communication Chapter 1: Introduction
ETSI update on Radio Frequency Identification
PLANNING A SECURE BASELINE INSTALLATION
Mobile Computing Lecture Materials By Bintang Eka Putera.
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic

Study objectives Problems with RFID systems from simple to complex We will focus mainly on long-range UHF systems Understand interference, sensitivity to orientation and environment, missed tags, unwanted reads 2

Problems in RFID system Consider the following situations with increasing levels of complexity: – One stationary reader and one stationary tag – One stationary reader and multiple stationary tags – Two stationary readers and one or more stationary tags – One mobile reader and several stationary tags – Large system with several mobile and stationary readers and many tags 3

4 Problems Read ranges Read rates Tag separation Interference Deployment of large RFID systems Analysis of data Software and integration Security

Problems – stationary systems One stationary reader and one stationary tag Problems Lack of well defined reading zone physical orientation of tags nature of the object the tag is placed on the environment 5

Read range Maximum distance between the tag and the antenna where the tag can be read by the reader. Blind spot is defined as the tag is in the reading range but unable to response Affected by the following parameters of reader and tag – Reader antenna gain – Tag antenna gain – Reader output power – Appropriate data coding scheme and modulation – Environment –... 6

Sensitivity to tag orientation

Problems – stationary systems 2 One stationary reader and multiple stationary tags Problems Previously introduced non-idealities Effect of collisions among tags Sensitive to proximity of other tags 8

Problems – stationary systems 3 Multiple stationary readers and one or more stationary tags Problems Previously introduced non-idealities Reader-to-reader interference Reader-to-tag interference Unwanted reads 9

10 RECEIVING AREA STORAGE AREA DOCK 1 R R R R Reader-to-Reader Interference Zone Reader-to-Tag Interference Zone Interrogation Zone LEGEND Reader Density From: Presentation by Reva Systems

11 Interference Reader to reader Dense-Reader Mode: readers can detect weak tags amongst many strong readers Reader to tag Typical tags are not selective => Susceptible to interference – From far-away readers – On channel or in different channels From: Presentation by Reva Systems

Problems – mobile readers One mobile reader and multiple stationary tags Problems Previously introduced non-idealities Missed tags Increased level of interference 12

Problems – complex RFID systems Multiple readers and many tags Complexity issues Software integration Networking Deployment Synchronization 13

14 Analysis of information Functionality of RFID system – Capture information. – Manage information. – Analyze information. – Access information. – Act on information and events. The amount of information is overwhelming – Example: major retail chain tagged all the items. If there are 10 billion items read every 5 minutes, they will generate 15 Terabytes of data per day.

15 Security Technical security is addressed in the Gen 2 protocol – Reader does not transmit electronic product code(EPC) – Tag memory can be locked Access is password protected 32-bit access password – “Kill”command can permanently disable the Tag Protected by 32-bit kill password BUT…Security really depends on us – How much information do we want exposed? – Public policy will decide the limits

Study questions 1.How can one carry the item through the portal without being detected? 2.What is the blind spot? 3.Why don’t RFID systems work reliably? 4.If we want to make sure that tags are read and deploy multiple redundant readers, what kind of problems will we introduce? 16