Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using Smart Cards and RFID in Embedded Systems

Similar presentations


Presentation on theme: "Using Smart Cards and RFID in Embedded Systems"— Presentation transcript:

1 Using Smart Cards and RFID in Embedded Systems
Group members: FRANK, Daniel IM, Jae Hyoun KESAVAN, Kannan MINNHAGEN, Gustav

2 Speaker: Jae Hyoun Im Introduction market Social Issues
_____________________________________________________ Content by Kannan Kesavan: Tags Readers Frequencies

3 Introduction - RFID Four main elements: Tags, Readers, Antennas, and Network Systems

4 RFID – basic principles

5 RFID

6 the market, the public, ... "the difference between successful and shunned RFID applications turns on delivery of clear, tangible value to the average customer." * "Make the perceived (and real) risk acceptable through convenience, variety and lower prices." * 3 ways of providing value to the customer * peace of mind consumer convenience improved service rejected projects embraced projects tesco EZ Link benetton EZ Pass metro toll-payment systems * Bruce Eckfeldt COMMUNICATIONS OF THE ACM September 2005/Vol. 48, No. 9

7 social issue - “they can see you, but you can see them.” *
"the core of the RFID debate is not about RF technology at all. it revolves around opposing viewpoints on political evolution and free societies" * con: advanced technologies become tools for oppressing human freedoms "in this light, the progression from wire-tapping to tracing internet users by IP address to tracking indiviuals with RF technology is a continuous and slippery slope towards lost anonymity and overnment control" * pro: most oppressive governments and least free societies are those with the least technological sophistication. "Technology is inherently liberating; information flows with less resistance. despite individual opportunities for abuse with new technologies, on balance they essentially defend people from oppression rather than the other way around." * * Aaron Weiss September 2003

8 Tags Types Functionality Memory Capacity: - Passive
- Semi-active/semi-passive - Active Functionality - Read only (factory programmed) - Read/writeable (fully) - Partly programmable Memory - EPROM's ( Writes) - FRAM: 100 times less power consumption and 1000 faster than EEPROM - Static RAM (active RFID only) Capacity: - 1 Bit up to Kbytes

9 Frequencies - Low frequency : 125-134KHz - High frequency : 13.56 MHz
- UHF : 868MHz/ MHz - Microwaves : 2.4GHz/5.8GHz

10 Reader Reader devices can be invisibly embedded Walls Door ways
Floor tiles Carpeting Floor mats Vehicles Roads Side walks Counters Shelving Furniture's Consumer products Printers Copiers Vacuum cleaners Hand held devises, e.g. cell phones

11 Next speaker: Gustav Minnhagen
Health issues Active tags Solar tags

12 Health issues Big commotion about hand phones being safe or not
Are the electromagnetic waves from the RFID readers hazardous to humans? No tests available

13 Health issues Can radio frequency waves cause cancer?
Are there other biological effects that can be caused from radio frequency energy?

14 Active tags compared to passive tags
Longer range Encryption Better noise immunity Higher data transmission More memory Reader: lower power

15 Active tags compared to passive tags
But… More expensive Bigger size Shorter life length Heavier

16 Active tags For more stationary solutions Can be put into hand phones

17 Active tags – Uses Freight Road tolls Assembly line Etc…

18 Solar tags Infrared Clear path Works fine close to metal No batteries
Encryption Faster communication than RFID Credit card sized Same uses as active tags

19 Next speaker: Daniel Frank
Reliability Security Designing an Embedded System using RFID: Selection Criteria of an RFID system Competitive technologies Benefits of RFID Issues of RFID

20 Reliability 16-bit CRC Checksum used
Solutions which support ECC or other Error correcting techniques are available Collision Prevention Typical error rate: 0% - 5% Case Study: reading 21 tags failed, out of more than 18,000 => reliability > 99,8%

21 Security and Privacy Digital Signature Transponder (DST) from Texas Instruments (TI) used to secure authentication: newer-generation automobiles electronic payment systems Security key data: unpublished, proprietary cipher symmetric-key 40 Bit Key => NOT SECURE AT ALL ! 64 Bit = 18,446,744,073,709,551,616 possibilities

22 Security – State of the Art
Only symmetric encryption Triple DES encryption possible Takes 2-3 seconds for one read (including encryption) 96 Bit encryption (EM Microelectronic) 20 – 40 Tags per second can be red Whitepapers of AES-128 implementation on RFID

23 Selection Criteria of an RFID system
How often will the tag be read or written to? How important is the accuracy of the data that is being stored in the tag? What is the distance needed between the tag and the antenna? In which environment will the system be used? How much data has to be transferred at each location? Is the system central or de-centralized control? From: WILL THE SYSTEM HAVE A COMMUNICATIONS NETWORK WHICH INCLUDES ALL AREAS THAT WOULD-NEED ID TYPE INFORMATION? IS THE SYSTEM CENTRAL OR DE-CENTRALIZED CONTROL? If you have centralized control and the system is networked, then a read only system would be the most economical to use and provide the fastest data throughput. If a decentralized system, without a network, is being used, then the choice is to go with a read/write system and allow the tag to carry the data. HOW MUCH DATA IS TO BE TRANSFERRED AT EACH LOCATION? HOW OFTEN WILL THE TAG BE READ OR WRITTEN TO? If a read/write system is being used and the requirements are to transfer large amounts of data at each location, then a passive tag system should be chosen. If only a few bytes are transferred and the frequency of reading or writing is low, then either an active or passive system can be used. HOW IMPORTANT IS THE ACCURACY OF THE DATA THAT IS BEING STORED IN THE TAG? If the data being used is for non critical operations, then some error or "no reads" can be tolerated. If the data is being used as part of the process, then zero error must be maintained and the tags must be read and/or written to, each and every time. The selection of an RFID vendor regarding accuracy is a subjective area and will require the most investigation. The best way to ensure the RFID system does what is expected, is to install a trial system. References from other users in similar environments are also very helpful. WHAT IS THE DISTANCE NEEDED BETWEEN THE TAG AND THE ANTENNA? The distance from which a tag can be read or written, (distance between the tag and antenna) is determined by a number of factors. Some of these factors include; is the system active or passive, at what frequency does the system transmit, what is the specific technology being utilized to transmit data, will there be metal in the immediate area, what are the temperature ranges the system will operate in, will there be other equipment in the area producing radio frequency signals, how much humidity is in the air and other environmental considerations. It must be noted that not all systems are affected by these conditions and some systems are not affected by any of the conditions.

24 Competitive technologies
Bar Code Labels nearly for free Established High reliability Magnetic stripe card Cheaper than RFID label Chip Cards Video screening Technology is adapted to the labels

25 Benefits of RFID No electrical contact
No line of sight needed Tags can be embedded in objects, need to be identified Fitting for challenging circumstances operating temperature range: -40° to +85°C Remarkable speed (typical: <120 ms)

26 Issues Different Systems which are not compatible
Different Systems can disturb each other No world-wide standard No tag disable standard Much more expensive than a barcode Vulnerable (DOS)

27 Thank you four your attention
Smart Cards and RFID in Embedded Systems


Download ppt "Using Smart Cards and RFID in Embedded Systems"

Similar presentations


Ads by Google