Vous êtes sur la page 1sur 23

Institute for Technical Informatics

www.ITI.TUGraz.at

Field Strength Scaling in NFC


NFC-DynFS: A way to realize dynamic field strength scaling
during communication
Manuel Menghin1, Norbert Druml1, Christian Steger1, Reinhold Weiss1,
Holger Bock2, Josef Haid2
1 Institute for Technical Informatics, Graz University of Technology, Austria
2 Infineon Technologies Austria AG, Design Center Graz, Austria

Manuel Menghin

2013-02-05
1

Institute for Technical Informatics

Outline

www.ITI.TUGraz.at

Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook

Manuel Menghin

2013-02-05
2

Introduction META[:SEC:] [1/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

Vision of the META[:SEC:]1 project:


Unoptimized

State of the Art

Smart Card

Challenges
Cost Pressure
Security Requirements

RF Interface

IF Security
Field Strength Scaling

Reader

Power Shortage
System Complexity
Mobility

Software

META[:SEC:]

Chip

Power & Fault


Aware

RF Interface

Line-powered

Battery-powered

META[:SEC:] : Mobile Energy-efficient Trustworthy Authentication Systems with Elliptic Curve based SECurity, funded by the Austrian
Federal Ministry for Transport, Innovation, and Technology under the FIT-IT contract FFG 829586. The META[:SEC:] consortium consists
of TU-Graz, Infineon Technologies Austria AG and Enso Detego GmbH.

Manuel Menghin

2013-02-05
3

Introduction Target system [2/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

Target system: mobile NFC-System


Mobile RFID-Reader and one passive transponder

mp Target System and general problem description

Mobile RFID-Reader (e.g., Smart Phone)

Battery

CPU

Crypto Core

0..* Transponder(s) (e.g., Smart Card)

RF-Interface
(HF-RFID)

Reader-IC
(HF-RFID)

RFID communication
(data transfer and
power transfer)

CPU or
Statemachine

Crypto Core

Peripherals (e.g. ISO/IEC 7816)

Use case
Reading digital business cards (reading data >1k)
Manuel Menghin

2013-02-05
4

Introduction Problem / Motivation [3/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

Resource constraint mobile reader


Battery powered (limited energy)
Transfers power to transponder (smart card)
Saving energy means considering the whole system

Manuel Menghin

2013-02-05
5

Introduction Problem / Motivation [4/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

Common countermeasures
Component based power optimization (power efficient chips)
Crypto Cores in hardware

Goal: System based power optimization


Considering the whole system,
including the communication channel

Peripherals

MEM

ARM

Battery

Crypto

Manuel Menghin

Mobile
Reader
Reader
IC

Smart Card/
RFID Tag
SC Chip

Power optimizations
Fault analyses
Power aware security analyses

2013-02-05
6

Introduction Approach [5/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

H-Field commonly static


Required H-Field is dynamic
Distance
Current operation (e.g. reading)
Wastage of energy when H-Field is too high

Currently: Scale H-Field to save energy [MenM2012]


Problem: Does not scale H-Field during communication
Power Awareness
Static H-Field

H-Field [H]

Adapted H-Field
Required H-Field

idle

executing

idle

Time [s]
Manuel Menghin

2013-02-05
7

Introduction Approach [6/6]

Institute for Technical Informatics


www.ITI.TUGraz.at

Contribution of this publication


NFC-DynFS method to save energy
Dynamic field strength scaling during communication
Increase of flexibility
Include the behavior of the user
Adapt the magnetic field to the power consumption of the transponder
NFC-DynFS method to avoid an undersupply
Adapting the magnetic field strength to avoid an undersupply

Manuel Menghin

2013-02-05
8

Institute for Technical Informatics


www.ITI.TUGraz.at

Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook

Manuel Menghin

2013-02-05
9

Related work

Institute for Technical Informatics


www.ITI.TUGraz.at

Power optimization and management


Observer Controller [Benini2000]
System based abstraction
Control loop

[Benini2000]

Power transfer between reader and transponder


Technique: Power stepping [Xu2011]
Altering field strength to detect transponders
Technique: Distance bounding [Clulow2006]
Measuring the response time for security issues

Manuel Menghin

2013-02-05
10

Institute for Technical Informatics


www.ITI.TUGraz.at

Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook

Manuel Menghin

2013-02-05
11

Institute for Technical Informatics

Method - Approach [1/3]

www.ITI.TUGraz.at

Approach
Observer-Controller power-managment technique [Benini2000]
Observe
The physical relation factor
The current power consumption of the transponder
Control
The magnetic field strength
NFC-DynFS

Time

Smart
Phone

Pin

uses

Time

uses

Power
Consumption

Physical Relation
Factor

Field Strength

controls

Transponder
(Tag)

Power Transfer Channel


Reader
IC

Coil

Coil

Time

Power
Supply

Pout

Data Transmission Channel

Manuel Menghin

2013-02-05
12

Institute for Technical Informatics

Method - Idea [2/3]

www.ITI.TUGraz.at

Observe physical relation factor


Measure power transmission current during communication

Observe power consumption of transponder


Every operation is invoked by RFID-Reader and is observed

Control the H-Field


Use known threshold values according to operation and physical relation
factor
Thresholds for one operation

Transmission
current

Field strength gain (Rrel)= C


Field strength gain (Rrel)= B
Field strength gain (Rrel)= A

Thresholds for all operations


Operation C
Operation B
Operation A

Threshold current (ir)


Transponder
undersupplied

Acquire thresholds
for possible field
strength gains

Lookup table for control

Field strength Operation A Operation B


Threshold
Threshold
Gain (Rrel)
current (irthres) current (irthres)
x.xx
x.xx
A
x.xx
x.xx
B
x.xx
x.xx
C

Physical relation factor

Manuel Menghin

2013-02-05
13

Institute for Technical Informatics

Method - Deployment [3/3]

www.ITI.TUGraz.at

NFC-DynFS (deployment model)


Uses a command proxy to know the invoked operations
Senses changes of the physical relation factor on reader side
Controls the H-Field using the Reader-IC
deployment Architecture

Transponder

Reader

Hardware and Software


Functional Implementation (Reader)

Near Field
Communication

Hardware and Software


Functional Implemenation (Tag)

SendAPDU

ScaleMagneticFieldStrength

NFC-DynFS

FieldStrengthScaler

PowerPredictionUnit
+Event: Operation invoked

+Event: Change of physical


relation factor

PhysicalRelationSensingUnit

Manuel Menghin

2013-02-05
14

Institute for Technical Informatics


www.ITI.TUGraz.at

Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook

Manuel Menghin

2013-02-05
15

Experimental Results [1/4]

Institute for Technical Informatics


www.ITI.TUGraz.at

Measurement / Simulation Setup:


Simulation: SystemC + Android Emulator
Measurement: Android development board + attached reader

Manuel Menghin

2013-02-05
16

Institute for Technical Informatics

Experimental Results [2/4]

www.ITI.TUGraz.at

Case Study
Used for the simulation and measurement
Use case of reading a digital business card

/set numberOfRetries = 100


[no card detected &&
numberOfRetries == 0]

Detect Card

[card detected]
Read Business
Card (1 kB)
/wait 100 ms

[no card detected &&


numberOfRetries > 0]

Idle
/deactivate H-Field
/wait 100 ms
/numberOfRetries -uses

Three implementations:

NFC-DynFS

Simple field strength scaling

Without field strength scaling

Close Connection
/deactivate H-Field
/wait 100 ms

Manuel Menghin

2013-02-05
17

Experimental Results [3/4]

Institute for Technical Informatics


www.ITI.TUGraz.at

Simulation
Needed energy of the system [Norm.]
No field strength scaling
1.00
With simple field strength scaling
0,87
With NFC-DynFS
0.77

Manuel Menghin

2013-02-05
18

Experimental Results [4/4]

Institute for Technical Informatics


www.ITI.TUGraz.at

Measurement
Needed energy of the system [Norm.]
No field strength scaling
0.98
With simple field strength scaling
1.00
With NFC-DynFS
0.73

Manuel Menghin

2013-02-05
19

Institute for Technical Informatics


www.ITI.TUGraz.at

Outline
Introduction / Motivation
Related work
Method
Experimental Results
Conclusion / Outlook

Manuel Menghin

2013-02-05
20

Conclusion / Outlook

Institute for Technical Informatics


www.ITI.TUGraz.at

Conclusion
NFC-DynFS improofs simple field strength scaling from [MenM2012]
Adaption to changing physical relation factor
26% lesser energy consumption in case study
NFC-DynFS avoids undersupply of the transponder
Adapts to the physical relation factor
Adapts to the current power consumption

Outlook
Field strength scaling for multiple transponders
Solve the issue to faster respond to physical relation factor changes
NFC-DynFS without needing threshold values of the system

Manuel Menghin

2013-02-05
21

Bibliography

Institute for Technical Informatics


www.ITI.TUGraz.at

[MenM2012] Menghin, M.; Druml, N.; Steger, C.; Wei, R.; Haid, J.; Holger, B. : The PTF-Determinator: A run-time method used to save energy in
NFC-Systems - in: 4th international EURASIP workshop on RFID technology. (2012), S. 92 98
[Benini2000] Luca Benini and Giovanni de Micheli. 2000. System-level power optimization: techniques and tools. ACM Trans. Des. Autom. Electron.
Syst. 5, 2 (April 2000)
[Xu2011] Xunteng Xu; Lin Gu; Jianping Wang; Guoliang Xing; Shing-Chi Cheung; , "Read More with Less: An Adaptive Approach to Energy-Efficient
RFID Systems," Selected Areas in Communications, IEEE Journal on , vol.29, no.8, pp.1684-1697, September 2011
[Clulow2006] Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. 2006. So near and yet so far: distance-bounding attacks in
wireless networks. In Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS'06)
[1] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. New York, NY, USA: John
Wiley & Sons, Inc., 2003.
[2] M. Roland, H. Witschnig, E. Merlin, and C. Saminger, Automatic impedance matching for 13.56 mhz nfc antennas, in Communication Systems,
Networks and Digital Signal Processing, 2008. CNSDSP 2008. 6th International Symposium on, july 2008, pp. 288 291.
[3] D. Cheng, Z. Wang, and Q. Zhou, Analysis of distance of rfid systems working under 13.56mhz, in Wireless Communications, Networking and
Mobile Computing, 2008. WiCOM 08. 4th International Conference on, oct. 2008, pp. 1 3.
[4] E. Rolf and V. Nilsson, Near Field Communication (NFC) for Mobile Phones, in Near Field Communication (NFC) for Mobile Phones, 2006, p. 25.
[5] E. Strommer, M. Jurvansuu, T. Tuikka, A. Ylisaukko-oja, H. Rapakko, and J. Vesterinen, Nfc-enabled wireless charging, in Near Field
communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36 41.
[6] C. Moser, L. Thiele, D. Brunelli, and L. Benini, Adaptive power management for environmentally powered systems, Computers, IEEE
Transactions on, vol. 59, no. 4, pp. 478 491, april 2010.
[7] C. Bachmann, A. Genser, C. Steger, R. Weiss, and J. Haid, Automated power characterization for run-time power emulation of soc designs, in
Digital System Design: Architectures, Methods and Tools (DSD), 2010 13th Euromicro Conference on, sept. 2010, pp. 587 594.
[8] T. Lohmann, M. Schneider, and C. Ruland, Analysis of power constraints for cryptographic algorithms in mid-cost rfid tags, in Smart Card
Research and Advanced Applications, ser. Lecture Notes in Computer Science, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Springer
Berlin / Heidelberg, 2006, vol. 3928, pp. 278288, 10.1007/1173344720.
[9] O. Unsal and I. Koren, System-level power-aware design techniques in real-time systems, Proceedings of the IEEE, vol. 91, no. 7, pp. 1055
1069, july 2003.
[10] S. Chatterjee, S. Roy, and S. Bandyopadhyay, Hop-efficient and poweroptimized routing strategy in a decentralized mesh network using
directional antenna, in Parallel and Distributed Computing, 2006. ISPDC 06. The Fifth International Symposium on, july 2006, pp. 155 160.

Manuel Menghin

2013-02-05
22

Institute for Technical Informatics


www.ITI.TUGraz.at

Thank you for your


Attention!

Manuel Menghin

2013-02-05
23

Vous aimerez peut-être aussi