Radio Frequency Identification

Slides:



Advertisements
Similar presentations
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID in Indoor Location Sensing Sucharitha Saibaba Divya Gopinathan.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
Lecture Notes #7 Radio Frequency Identification (RFID)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Created by the Community for the Community Building a RFID solution in BTS 09.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
RFID Technology & It’s Uses Presented by: Ron Abdy 3 rd July 2013.
IWD2243 Wireless & Mobile Security
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Developing RFID Application In Supply Chain
The Most Widely Used Communication and Automation Technologies in the World By: Bikramjeet Waraich CEO, HBeonLabs 17 Feb 2012.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID Last Update Copyright Kenneth M. Chipps Ph.D.
RFID’s By Samuel and Sabra. What is an RFID? RFID’s are microchips RFID’s are microchips Antenna emits radio signals to read/write Antenna emits radio.
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
RFID Technology What is it? (And why should you care?)
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
RFID (RADIO FREQUENCY IDENTIFICATION)
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID (RADIO FREQUENCY IDENTIFICATION)
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Aviation RFID Solutions
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Shaun McGorry Executive Briefing July 9,  Radio-frequency identification (RFID): the use of an object (typically referred to as an RFID tag) applied.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
RFID in Education and Childcare By Analytica Overview What is RFID? RFID Components ARIES Software RFID Applications Selling RFID Summary Sales Power.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Unit 2 Technology Systems
Radio Frequency Identification composition - implementation – vision
By: Tarun Sharma Chinta Rahul SCSE VIT University
RADIO FREQUENCY IDENTIFICATION(RFID)
Radio Frequency Identification (RFID)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
Radio Frequency IDentification
RFID Technology & It’s Uses
RADIO FREQUENCY IDENTIFICATION
Team 7 Technical Presentation
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Radio Frequency Identification
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Radio Frequency Identification Spring 2005 Semester CMPE 297 Research Presentation By RESCUE team Ashwin Venkatesh Gautham Mudra Srikanth Narayan Tsegu Yonas

Agenda What is RFID ? Components of RFID RFID Tags & Readers How does RFID work ? Applications of RFID Next-Generation RFID Security issues Advantages Cost Structure Conclusion Q & A

What is RFID ? RFID is a technology which allows an object or person to be identified at a distance, using radio waves to energize and communicate with some form of tag or card. RFID is an Automated Data Collection (ADC) technology that uses radio-frequency waves to transfer data between a reader and a movable item for identification, categorization, tracking, etc. RFID is fast & reliable, and does not require physical sight or contact between reader/scanner and the tagged item.

Components of RFID Transponder/Tag - Contains uniquely identifiable data about the item with RFID tag. Antenna - Transmits Radio Frequency signals between Tag & RFID Reader. Transceiver Receives Radio Frequency signals from RFID devices, and reads & passes data to the host for processing. Contains a decoder to interpret the data.

(Communicates with the RFID Reader) Components of an RFID System Host Computer Host Memory Space Antenna Customer-Specific Application Software Application Program Interface (API) Application Program Interface (API) RFID API Software (Communicates with the RFID Reader) Reader

Types of RFID Tags Active Tag transmits radio signal Battery powered memory, radio & circuitry High Read Range (300 feet) Passive Tag reflects radio signal from reader Reader powered Shorter Read Range (4 inches - 15 feet)

What is a “Dumb Reader” ? No intelligence besides reading and forwarding data Little or no filtering of data Floods the network with data Cheap, Single protocol/frequency 1011 0110 1 Applications 0001 1 RFID Middleware 1100 Tagged Assets 1 1010 Rely on middleware to perform the bulk of filtering Readers 1 1111 RFID Middleware could become point of failure; need robust middleware. 1 1101 0010 0101

What is a “Smart Reader” ? Smart Reader Management and Provisioning Central Management Server Firmware/Business logic upgrades S Reader Coordination High-Level Filtering/Aggregation S Applications S Tagged Assets S Built-in low-level filtering Smart Readers Dynamic config and updates Reduces network traffic by sending only relevant data Multiple protocol/Frequency

Interface to host computer (RS485, RS232/422, ethernet, 802.11, etc) How does RFID work ? RFID reader tag 01.43200B9.23AE1F.345C4D012 antenna Interface to host computer (RS485, RS232/422, ethernet, 802.11, etc) 1- The Reader sends an interrogation command, radiated by the antennas 2- The tag responds to the reader’s command by sending its tag identifier 3- The reader communicates the ID read to the host computer. ID: 01.43200B9.23AE1F.345C4D012

Applications of RFID Electronic toll collection Item management for retail, health care, etc Access control Railway & car identification and tracking Asset identification & tracking Animal identification

Portal Applications

Handheld Application Categories Batch Wireless Fixed Station

Next-Generation RFID Use of Gen 2 and UHF standards. Faster read rates (up to 1500 tags / second). Will be the defacto standard in retail sector (E.g. self-scanning ability, use of scan-it-yourself aisles, etc). Reduced level of interference even with multiple tags. Tags can be re-written multiple times. Increased security – password protection, encryption, authentication, etc in RFID systems. Contributors – Impinj Inc., Qualcomm, Unilever, UPS, etc.

Security Issues RFID poses security concerns where consumers are exposed. Scanner or sniffer can read entire data of purchase in supply-chain. Strong magnetic field can read valuable “badge” data leading to potential manipulation ability. Current RFID tags do not have enough computing power for performing encryption & imposing security. Too many reads or tags can cause conflicts.

Advantages of RFID No contact requirement Fast read/write capability Real-time response More durable than bar code Detection over distances

Cost Structure

Conclusion RFID must be more secure & restrictive. Excellent platform for RF research, to build new systems. Must encourage & support “Zombie” RFID tags. Newer standards are emerging such as UHF, Gen 2, etc. Standards will provide a more sophisticated outlook to RFID. Enriching learning experience – by RESCUE team.

Q & A