Presentation is loading. Please wait.

Presentation is loading. Please wait.

Radio Frequency Identification

Similar presentations


Presentation on theme: "Radio Frequency Identification"— Presentation transcript:

1 Radio Frequency Identification
Spring 2005 Semester CMPE 297 Research Presentation By RESCUE team Ashwin Venkatesh Gautham Mudra Srikanth Narayan Tsegu Yonas

2 Agenda What is RFID ? Components of RFID RFID Tags & Readers
How does RFID work ? Applications of RFID Next-Generation RFID Security issues Advantages Cost Structure Conclusion Q & A

3 What is RFID ? RFID is a technology which allows an object or person to be identified at a distance, using radio waves to energize and communicate with some form of tag or card. RFID is an Automated Data Collection (ADC) technology that uses radio-frequency waves to transfer data between a reader and a movable item for identification, categorization, tracking, etc. RFID is fast & reliable, and does not require physical sight or contact between reader/scanner and the tagged item.

4 Components of RFID Transponder/Tag
- Contains uniquely identifiable data about the item with RFID tag. Antenna - Transmits Radio Frequency signals between Tag & RFID Reader. Transceiver Receives Radio Frequency signals from RFID devices, and reads & passes data to the host for processing. Contains a decoder to interpret the data.

5 (Communicates with the RFID Reader)
Components of an RFID System Host Computer Host Memory Space Antenna Customer-Specific Application Software Application Program Interface (API) Application Program Interface (API) RFID API Software (Communicates with the RFID Reader) Reader

6 Types of RFID Tags Active Tag transmits radio signal
Battery powered memory, radio & circuitry High Read Range (300 feet) Passive Tag reflects radio signal from reader Reader powered Shorter Read Range (4 inches - 15 feet)

7 What is a “Dumb Reader” ? No intelligence besides reading and forwarding data Little or no filtering of data Floods the network with data Cheap, Single protocol/frequency 1011 0110 1 Applications 0001 1 RFID Middleware 1100 Tagged Assets 1 1010 Rely on middleware to perform the bulk of filtering Readers 1 1111 RFID Middleware could become point of failure; need robust middleware. 1 1101 0010 0101

8 What is a “Smart Reader” ?
Smart Reader Management and Provisioning Central Management Server Firmware/Business logic upgrades S Reader Coordination High-Level Filtering/Aggregation S Applications S Tagged Assets S Built-in low-level filtering Smart Readers Dynamic config and updates Reduces network traffic by sending only relevant data Multiple protocol/Frequency

9 Interface to host computer (RS485, RS232/422, ethernet, 802.11, etc)
How does RFID work ? RFID reader tag B9.23AE1F.345C4D012 antenna Interface to host computer (RS485, RS232/422, ethernet, , etc) 1- The Reader sends an interrogation command, radiated by the antennas 2- The tag responds to the reader’s command by sending its tag identifier 3- The reader communicates the ID read to the host computer. ID: B9.23AE1F.345C4D012

10 Applications of RFID Electronic toll collection
Item management for retail, health care, etc Access control Railway & car identification and tracking Asset identification & tracking Animal identification

11 Portal Applications

12 Handheld Application Categories
Batch Wireless Fixed Station

13 Next-Generation RFID Use of Gen 2 and UHF standards.
Faster read rates (up to 1500 tags / second). Will be the defacto standard in retail sector (E.g. self-scanning ability, use of scan-it-yourself aisles, etc). Reduced level of interference even with multiple tags. Tags can be re-written multiple times. Increased security – password protection, encryption, authentication, etc in RFID systems. Contributors – Impinj Inc., Qualcomm, Unilever, UPS, etc.

14 Security Issues RFID poses security concerns where consumers are exposed. Scanner or sniffer can read entire data of purchase in supply-chain. Strong magnetic field can read valuable “badge” data leading to potential manipulation ability. Current RFID tags do not have enough computing power for performing encryption & imposing security. Too many reads or tags can cause conflicts.

15 Advantages of RFID No contact requirement Fast read/write capability
Real-time response More durable than bar code Detection over distances

16 Cost Structure

17 Conclusion RFID must be more secure & restrictive.
Excellent platform for RF research, to build new systems. Must encourage & support “Zombie” RFID tags. Newer standards are emerging such as UHF, Gen 2, etc. Standards will provide a more sophisticated outlook to RFID. Enriching learning experience – by RESCUE team.

18 Q & A


Download ppt "Radio Frequency Identification"

Similar presentations


Ads by Google