Académique Documents
Professionnel Documents
Culture Documents
Sridhar Iyer
IIT Bombay sri@it.iitb.ac.in www.it.iitb.ac.in/~sri
Outline
Overview of RFID
Reader-Tag; Potential applications
RFID 2005
IIT Bombay
Add consumer flexibility, courtesy of robotics, computers Customer window into final stage of manufacturing
5
RFID 2005
IIT Bombay
Effect on manufacturing
Need to ensure error-free, custom assembly Need inventory of components for the various customization options Critical Issues
Assembly process control Inventory management Supply chain integration Customer insight
What is RFID?
RFID = Radio Frequency IDentification. An ADC (Automated Data Collection) technology that:
uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track.. Is fast and does not require physical sight or contact between reader/scanner and the tagged item. Performs the operation using low cost components. Attempts to provide unique identification and backend integration that allows for wide range of applications.
Other ADC technologies: Bar codes, OCR. RFID 2005 IIT Bombay
RFID Reader
RFID Tag
RF Antenna
Network Workstation
RFID 2005
IIT Bombay
Ethernet
12
ONS Server Internet Product Information (PML Format)
Antenna Write data to RF tags Items with RF Tags RF Reader Antenna Read Manager Application Systems Trading Partner Systems
7
Tag/Item Relationship Database
EDI / XML
10 9
Tag Interfaces
RFID 2005
RFID Middleware
IIT Bombay
Other Systems
8
an antenna, printed, etched or stamped ... and a chip attached to it on a substrate e.g. a plastic foil ...
RFID 2005
IIT Bombay
Source: www.rfidprivacy.org
RFID 2005
IIT Bombay
Source: www.rfidprivacy.org
10
RFID tags
Tags can be attached to almost anything:
Items, cases or pallets of products, high value goods vehicles, assets, livestock or personnel
Passive Tags
Do not require power Draws from Interrogator Field Lower storage capacities (few bits to 1 KB) Shorter read ranges (4 inches to 15 feet) Usually Write-Once-Read-Many/Read-Only tags Cost around 25 cents to few dollars Battery powered Higher storage capacities (512 KB) Longer read range (300 feet) Typically can be re-written by RF Interrogators Cost around 50 to 250 dollars
IIT Bombay 11
Active Tags
RFID 2005
Memory Cells
RFID 2005
IIT Bombay
12
Read/Write
Tag data can be changed over time Part or all of the data section can be locked
RFID 2005 IIT Bombay 13
RFID readers
Reader functions:
Remotely power tags Establish a bidirectional data link Inventory tags, filter results Communicate with networked server(s) Can read 100-300 tags per second
RFID 2005
IIT Bombay
14
RFID 2005
IIT Bombay
Source: www.buyrfid.org
15
Reader anatomy
Digital Signal Processor (DSP)
Network Processor
Power Supply
RFID 2005
13.56MHz Radio
16
Assembly Line
Wireless
Handheld Applications
RFID 2005
RFID applications
Manufacturing and Processing
Inventory and production process monitoring Warehouse order fulfillment
Retail
Inventory control and customer insight Auto checkout with reverse logistics
Security
Access control Counterfeiting and Theft control/prevention
Location Tracking
RFID 2005
Traffic movement control and parking management Wildlife/Livestock monitoring and tracking
IIT Bombay
18
Smart groceries
Add an RFID tag to all items in the grocery. As the cart leaves the store, it passes through an RFID transceiver. The cart is rung up in seconds.
RFID 2005
IIT Bombay
19
Smart cabinet
Reader antennas placed under each shelf 1. Tagged item is removed from or placed in Smart Cabinet Smart Cabinet periodically interrogates to assess inventory Server/Database is updated to reflect items disposition Designated individuals are notified regarding items that need attention (cabinet and shelf location, action required)
2.
3.
RFID 2005
IIT Bombay
20
Smart fridge
Recognizes whats been put in it Recognizes when things are removed Creates automatic shopping lists Notifies you when things are past their expiration
Shows you the recipes that most closely match what is available
RFID 2005
IIT Bombay
21
RFID 2005
IIT Bombay
22
Smart products:
Clothing, appliances, CDs, etc. tagged for store returns.
Smart paper:
Airline tickets that indicate your location in the airport.
Smart currency:
Anti-counterfeiting and tracking.
Smart people ??
RFID 2005
IIT Bombay
23
Outline
Overview of RFID
Reader-Tag; Potential applications
RFID communications
Reader Antenna
RFID communication
Host manages Reader(s) and issues Commands Reader and tag communicate via RF signal Carrier signal generated by the reader Carrier signal sent out through the antennas Carrier signal hits tag(s) Tag receives and modifies carrier signal
sends back modulated signal (Passive Backscatter also referred to as field disturbance device)
Antennas receive the modulated signal and send them to the Reader Reader decodes the data Results returned to the host application
RFID 2005 IIT Bombay 27
IC or microprocessor
RFID Tag
antenna
RFID 2005
IIT Bombay
28
IC or microprocessor
RFID Tag
antenna
RFID 2005
IIT Bombay
29
Operational frequencies
F requency R anges T ypical M ax R ead R ange (P assive T ags) T P er ag ow Source D R ata ate A bility to read near m etal or w et surfaces L F 125 K z H
Shortest 1 -12
H F 13.56 M z H
Short 2 -24 G enerally passive tags only, using inductive or capacitive coupling M oderate
U F H 868 - 915 M z H
M edium 1 -10 A ctive tags w ith integral battery or passive tags using capacitive storage, E-field coupling Fast
B etter A ccess C ontrol & Security Identifying w idgets through m anufacturing processes or in harsh environm ents R anch anim al identification Em ployee ID s
M oderate
Poor
W orse
A pplications
H ighw toll Tags ay Identification of private vehicle fleets in/out of a yard or facility A sset tracking
RFID 2005
IIT Bombay
30
Tag
Q: If a reader transmits Pr watts, how much power Pt does the tag receive at a separation distance d? A: It dependsUHF (915MHz) : Far field propagation : Pt 1/d2 HF (13.56MHz) : Inductive coupling : Pt 1/d6
RFID 2005 IIT Bombay 31
1. 2. 3. 4. 5. 6.
Reader transmitter power Pr (Govt. limited) Reader receiver sensitivity Sr Reader antenna gain Gr (Govt. limited) Tag antenna gain Gt (Size limited) Power required at tag Pt (Silicon process limited) Tag modulator efficiency Et
RFID 2005
IIT Bombay
32
Implications
Since Pt 1/d2 , doubling read range requires 4X the transmitter power. Larger antennas can help, but at the expense of larger physical size because G{t,r} Area. More advanced CMOS process technology will help by reducing Pt. At large distances, reader sensitivity limitations dominate.
RFID 2005 IIT Bombay 33
34
Communication protocols
Listen before talk Mandatory listen time of >5 msec before each transmission Max 4 sec TX then re-listen for 100 msec Transmission from other Readers
865MHz
200KHz
867MHz
RFID 2005
IIT Bombay
35
8 6 5 .0 M H z
8 6 5 .6 M H z
8 6 7 .6 M H z
8 6 8 .0 M H z
100 m W FT LT FT LT
2 W FT LT
500 m W FT LT
600 kH z
8 6 5 .5 M H z
600 kH z
600 kH z
8 6 7 .7 M H z
8 6 5 .1 M H z
8 6 5 .7 M H z
8 6 7 .5 M H z
8 6 7 .9 M H z
RFID 2005
IIT Bombay
Source: www.etsi.org
36
RFID 2005
IIT Bombay
37
In case multiple readers try to read the same tag, the tag cannot respond selectively to a particular reader
RFID 2005 IIT Bombay 38
RFID 2005
IIT Bombay
41
Multiple Tags
When multiple tags are in range of the reader:
All the tags will be excited at the same time. Makes it very difficult to distinguish between the tags.
Deterministic:
Reader searches for specific tags.
RFID 2005 IIT Bombay 42
Several approaches
Tree algorithm Memoryless protocol Contactless protocol I-code protocol
RFID 2005
IIT Bombay
43
Tree Algorithm
Reader queries for tags Reader informs in case of collision and tags generates 0 or 1 randomly If 0 then tag retransmits on next query If 1 then tag becomes silent and starts incrementing its counter (which is initially zero) Counter incremented every time collision reported and decremented every time identification reported Tag remains silent till its counter becomes zero
RFID 2005 IIT Bombay 44
RFID 2005
IIT Bombay
45
Overheads
Requires random number generator Requires counter
RFID 2005 IIT Bombay 46
Memoryless Protocol
Assumption: tagID stored in k bit binary string Algorithm
Reader queries for prefix p In case of collision queries for p0 or p1
Time complexity
Running time O(n) Worst Case n*(k + 2 logn)
RFID 2005
IIT Bombay
47
RFID 2005
IIT Bombay
48
Contactless Protocol
Assumption: tagID stored in k bit binary string Algorithm
Reader queries for (i)th bit Reader informs in case of collision
Tags with (i)th bit 0 become silent and maintain counter Tags with (i)th bit 1 respond to next query for (i+1)th bit
RFID 2005
IIT Bombay
50
I-Code Protocol
Based on slotted ALOHA principle Algorithm
Reader provides time frame with N slots, N calculated for estimate n of tags Tags randomly choose a slot and transmit their information Responses possible for each slot are
Empty, no tag transmitted in this slot c0 Single response, identifying the tag c1 Multiple responses, collision ck
RFID 2005
IIT Bombay
51
I-Code Protocol
New estimate for n : lower bound
lb(N, c0, c1,ck) = c1 + 2ck Using estimate n, N calculated N becomes constant after some time Using this N calculate number of read cycles s to identify tags with a given level of accuracy
Outline
Overview of RFID
Reader-Tag; Potential applications
RFID middleware
RFID 2005
IIT Bombay
55
Graphical Dashboard
RFID 2005
IIT Bombay
12. Last three hour promotional offer alert on product X 11. Promotional offer alert
2. Log data
5. Four hours to close of retails stores and product X sales target for the day not met! 6. Notifications for approval of promotional offer on product X
8. Approval alert
7. Approval
RFID 2005
IIT Bombay
57
Source: Persistent Systems
RFID 2005
IIT Bombay
58
Source: Persistent Systems
RFID 2005
IIT Bombay
59
Source: Persistent Systems
Specify the layout for a reader and antenna setup by means of locations and junctions Ability to continuously modify/update the layout Provide access to reader and antenna configuration from visual layout
RFID 2005
IIT Bombay
60
Source: Persistent Systems
Site Definition
RFID 2005
IIT Bombay
61
Source: Persistent Systems
Floor Definition
Zone Definition
RFID 2005
IIT Bombay
62
Source: Persistent Systems
Location Definition
RFID 2005
IIT Bombay
63
Source: Persistent Systems
Remote monitoring and configuration of RF Sensor network elements Readers and Antennas
RFID 2005
IIT Bombay
64
Source: Persistent Systems
RFID 2005
IIT Bombay
65
Source: Persistent Systems
Reader definition
Reader and Antenna configuration and status view for specific reader Ability to remotely monitor and configure Reader and Antenna parameters
RFID 2005
IIT Bombay
66
Source: Persistent Systems
Sophisticated Query Processing Stream based event store for incessant, high performance querying
RFID 2005
IIT Bombay
67
Source: Persistent Systems
Ability to configure queries for continuous execution on event store Incorporates querying on PML information Programmable querying interfaces Provides data filtering abilities
RFID 2005
IIT Bombay
68
Source: Persistent Systems
Access configuration panels of specific queries View tabular and graphical outputs for all queries
RFID 2005
IIT Bombay
69
Source: Persistent Systems
RFID 2005
IIT Bombay
70
Source: Persistent Systems
Query definition
RFID 2005
IIT Bombay
71
Source: Persistent Systems
Query definition
RFID 2005
IIT Bombay
72
Source: Persistent Systems
RFID 2005
IIT Bombay
73
Source: Persistent Systems
Choose from multiple types of graphs Configuration panels for visualization effects Configuration panels for drilled down views
RFID 2005
IIT Bombay
74
Source: Persistent Systems
RFID 2005
IIT Bombay
75
Source: Persistent Systems
Access configuration panels of specific dashboard View tabular and graphical outputs for all dashboards
RFID 2005
IIT Bombay
76
Source: Persistent Systems
RFID 2005
IIT Bombay
77
Source: Persistent Systems
a
Configuration panel for notification
RFID 2005
IIT Bombay
78
Source: Persistent Systems
Notifications on Desktop
Notification Message instance
RFID 2005
IIT Bombay
79
Source: Persistent Systems
RFID 2005
IIT Bombay
80
Source: Persistent Systems
Ability to configure event generation for an emulated reader setup Specify movement and time intervals across various functional units
RFID 2005
IIT Bombay
81
Source: Persistent Systems
RFID 2005
IIT Bombay
Source: www.epcglobalinc.org
82
RFID 2005
IIT Bombay
83
ONS Servers
Directory for EPC information, similar to Internet DNS Uses the object manager number of the EPC to find out how to get more information about the product
RFID 2005 IIT Bombay 84
EPC compliant RFID tags are placed on products, cases or pallets during distribution or manufacturing
customer site
The product enters the supply chain with the EPC information attached
RFID 2005 IIT Bombay 85
EPC Tags
64 and 96 bit EPC tags have been defined 01 0000A21 00015E 000189DF0
Header EPC Manager Object Class Serial Number 8 35 bits 39 56 bits 8 Bits 60 95 bits
Allows for unique IDs for 268 million companies Each company can then have 16 million object classes Each object or SKU can have 68 billion serial numbers assigned to it
RFID 2005
IIT Bombay
86
Manufacturer
Retailer
RFID 2005
IIT Bombay
87
Retailer 47400 onsepc . . . 18559 1. EPC lifecycle begins when a Manufacturer tags the product
4th level
3rd level
2nd level
Top level
ds .
vnds .
verisign .
com com
RFID 2005
IIT Bombay
88
Manufacturer
Retailer
1. EPC lifecycle begins when a Manufacturer tags the product 2. Manufacturer records product information (e.g., manufacture date, expiration date, location) into EPC Information Service 3. EPC Information Service registers EPC knowledge with EPC Discovery Service RFID 2005 IIT Bombay 89
Manufacturer
Retailer
4. Manufacturer sends product to Retailer 5. Retailer records receipt of product into EPC-IS 6. Retailers EPC-IS then registers product knowledge with EPC Discovery Service
RFID 2005
IIT Bombay
90
Retailer Application
Manufacturer
Retailer
7. If Retailer requires product information, Root ONS is queried for location of Manufacturers Local ONS 8. Manufacturers Local ONS is queried for location of EPC-IS
RFID 2005
IIT Bombay
91
<10
milliseconds
Retailer Application
Manufacturer
Retailer
9. Retailer queries Manufacturer EPC-IS for desired product information (e.g., manufacture date, expiration date, etc.)
RFID 2005
IIT Bombay
92
Outline
Overview of RFID
Reader-Tag; Potential applications
Cumulative Value
Truck/Asset
RFID 2005
IIT Bombay
94
RFID 2005
95
Angle Tag
RFID 2005
IIT Bombay
96
Business Applications
System Integration and Solution Delivery Business Process Integration Solution Framework Network Setup RF aspects
Product ETL Catalog and Services Attribute Managemnt Legacy Data filtering Discovery Application Services Data Integration Reader Synchrocoordination Authorization / Authenticatn nization Framework Policy Management Event Monitoring Directory Services
Supply Chain Execution ERP Warehouse Management Store Management Distribution Management
RFID 2005
IIT Bombay
98
RFID 2005
IIT Bombay
99
Source: www.rfidprivacy.org
RFID 2005
IIT Bombay
100
Example:
Blocker blocks all identifiers with leading 1 bit Items in supermarket carry leading 0 bit On checkout, leading bit is flipped from 0 to 1
PIN required, as for kill operation
RFID 2005
IIT Bombay
101
1. Reader specifies which level it wants. 2. Tag specifies level of security, and/or amount of
energy needed. 3. Reader proceeds at that level of security. 4. Tag responds if and only if it gets energy and security required.
RFID 2005 IIT Bombay 102
No one-size-fits-all solution. Security hinges on the fact that in the real world, an adversary must have physical proximity to tags to interact with them.
IIT Bombay 103
RFID 2005
Outline
Overview of RFID
Reader-Tag; Potential applications
Tags and Readers Identifying Read Points Installation & RF Tuning RFID Middleware Connectors & Integration Process Changes Cross Supply-Chain View
RFID 2005 IIT Bombay 105
RFID Summary
Strengths
Advanced technology Easy to use High memory capacity Small size
Weaknesses
Lack of industry and application standards High cost per unit and high RFID system integration costs Weak market understanding of the benefits of RFID technology
Opportunities
Threats
Could replace the bar code Ethical threats concerning privacy End-user demand for RFID life Highly fragmented competitive systems is increasing Huge market potential in many environment businesses
RFID 2005
IIT Bombay
107
Some Links
http://www.epcglobalinc.com/ http://www.rfidjournal.com/ http://rfidprivacy.com/ http://www.rfidinc.com/ http://www.buyrfid.com/
Thank You
RFID 2005
IIT Bombay
108