Download presentation
Presentation is loading. Please wait.
Published byEaster Eunice Wilkins Modified over 9 years ago
1
Embedded Wireless Sensors Tony Arous Vincent Yu
2
Introduction Sensors help to easily keep track of various information PeoplePeople ProductsProducts Chemical CompositionChemical Composition Each application requires a different type of sensor
3
Possible Uses on Humans Identification Security Tracking Monitoring vital signs Diabetes monitoring Medical purposes
4
Identification Use of RFID (radio frequency identification) Currently in use in form of ID cards Possibility of insertion into the body 11 millimeter RFID tags below the right tricep11 millimeter RFID tags below the right tricep
5
RFID Background A scanner is used which activates the grain sized sensor which sends identification Sensor will send a unique ID to identify the person Low-cost solution: about 5 cents each
6
Uses of RFID ATM Scans the sensor for identification instead of card and passcodeScans the sensor for identification instead of card and passcode Vending Machines Will not need changeWill not need change By scanning the sensor, will be able to bill you laterBy scanning the sensor, will be able to bill you later
7
Uses in Security Customizing the scanners, specific areas can be off limits to people without sensors or with sensors restricted to the area Certain devices can be customized so that only a person with correct sensor may use it
8
Tracking Sensors can be implanted and when someone passes by a scanner they can be tracked Can be used to track patients with Alzheimer’s disease Track prisoners who escape
9
Monitoring Vital Signs Sensors can be modified to be able to monitor vital signs The sensor will continuously be collecting data, and when a scanner is in range, transmit the data to it
10
Diabetes Monitor Instead of drawing blood to monitor glucose level, a sensor can be used to deliver the data to a patient
11
Medical Purposes Use of sensors for hearing impaired and vision impaired patients Not RFID
12
Additional Medical Purposes No technology exists for monitoring: Oxygen LevelsOxygen Levels ElectrolytesElectrolytes Levels are restricted to a very small window Potassium: 3 to 5.5 mEq/LPotassium: 3 to 5.5 mEq/L 1 in 5 hospitalized patients have low potassium1 in 5 hospitalized patients have low potassium 14% of patients in doctors’ offices14% of patients in doctors’ offices
13
Other Applications Embedded in various items Product inventory: WalMartProduct inventory: WalMart MoneyMoney
14
Problems to Overcome Energy Changing batteries in embedded tags will require too much time and moneyChanging batteries in embedded tags will require too much time and money Signal Issues Signal failures, range of use, connection to other protocolsSignal failures, range of use, connection to other protocols Security Must be able to trust the scanners and limit access to specific users/resourcesMust be able to trust the scanners and limit access to specific users/resources
15
More Problems to Overcome Disruption RFID systems can be easily jammedRFID systems can be easily jammed Share frequency with Wi-Fi and cell phone networksShare frequency with Wi-Fi and cell phone networks Bombardment Active RFID tags can be attacked continuously so that the battery dies very quicklyActive RFID tags can be attacked continuously so that the battery dies very quickly Collision With the high expected usage of RFID, both reader and tag collisions will become commonWith the high expected usage of RFID, both reader and tag collisions will become common
16
Energy Problems Current RFID tags use 2 different battery technologies 1. Active:Battery-powered Strong signals Long range1. Active:Battery-powered Strong signals Long range 2. Passive:No battery Weak signals Very short range2. Passive:No battery Weak signals Very short range
17
Energy Problems Longest range on record: 12 billion miles Drawback is very short battery lifeDrawback is very short battery life Need to develop a method to offer reasonable range with “infinite” battery Methods to combat bombardment
18
Security Problems A more secure system is needed, especially with the movement into skin-embedded sensors Must limit what people have access to vital, secret information Current RFID tags can be read at any time with no notification
19
Security Problems Unique ID for every individual item in stores ID’s will then be tied to credit cardsID’s will then be tied to credit cards Security problems if tags are stolen, lost or removed from the productsSecurity problems if tags are stolen, lost or removed from the products An effective method of destroying stored information after some time is needed
20
Preliminary Resolutions Battery life: Rechargeable via wireless technologyRechargeable via wireless technology Signal range: Use of repeaters to relay signalUse of repeaters to relay signal Amplified signal may be permitted if batteries can be recharged easily and cost-effectivelyAmplified signal may be permitted if batteries can be recharged easily and cost-effectively Security: Setup infrastructure with limited accessSetup infrastructure with limited access
21
References VeriChip: VeriChip: CNN Money: CNN Money: Technovelgy: Technovelgy:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.