1 / 34

RFID Network

RFID Network. Building an Internet of Things. Liang Dong leondong@sjtu.edu.cn. Introduction RFID. RFID Network Architecture. RFID Security & Privacy. RFID Applications. Contents. Introduction RFID. Contents. What will the world be if all object can “talk”?. Automatic Identification.

heinz
Download Presentation

RFID Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFID Network Building an Internet of Things Liang Dong leondong@sjtu.edu.cn

  2. Introduction RFID RFID Network Architecture RFID Security & Privacy RFID Applications Contents Company Name

  3. Introduction RFID Contents Company Name

  4. What will the world be if all object can “talk”? Company Name

  5. Automatic Identification Real World Virtual World What is Automatic Identification 011011100010101010111010101110101011010001011101010001001010101000011101010101010101010000011101111110110111010010101110101011 Company Name

  6. What is Automatic Identification • Various forms of Automatic Identification • Biometric (e.g. Retinal Scans) • Optical Character Recognition (OCR) • Voice Recognition • Bar Codes( e.g. Uniform Product Codes) • Radio Frequency Identification (RFID) Company Name

  7. What is RFID • Radio Frequency Identification • Describes any system of identification wherein an electronic device that uses radio frequency or magnetic field variations to communicate is attached to an item. Company Name

  8. RFID: Item Management RFID: Access Control Animal ID RFID & I.C. Cards RFID: Toll Roads & Item Management Microwave EAS Data Terminal Cell Phone Low Freq. EAS Mid. Freq. EAS TV Data Modem Radio Toys Garage Door FM AM CB 300 GHz 2.45 GHz 10 MHz 10 kHz 100 kHz 1 MHz 100 MHz 1000 MHz LF HF UHF Microwave RFID Frequency Company Name

  9. What’s wrong with Bar-code • Barcode is prevalent in commercial world. • However, there are shortcomings of bar codes • Line-of-sight • One-at-a-time • Manual handling • Limited range • Limited data Company Name

  10. Radio Frequency Identification • Radio Frequency Identification offer the potential to eliminate these shortcomings • Non-line-of-sight • 100(s) at a time • Automatic handling • Several meter • 50 bits -Kbits Company Name

  11. What are some of the potential issues associated with the creation of an “Internet of things”? Company Name

  12. Example: Supply Chain Company Name

  13. RFID Network Architecture Contents Company Name

  14. RFID Network Architecture • The RFID Network Architecture is composed of four fundamental elements: • Electronic Product Code (EPC) • Hardware System (RFID tags and readers) • RFID middleware • Object Name Service (ONS) Company Name

  15. Electronic Product Code • Numerous identification coding standards exist: • Universal Product Code (UPC) • International Standard Book Number (ISBN) • IP Address • MAC Address • EPC aims to uniquely identify physical objects over the world Company Name

  16. Electronic Product Code • Standard EPC is 96 bit • EPC is comprised of four distinct numbers • Version • Domain Manager Number (P&G, Pepsi) • Object Class Number (Pepsi Cola) • Serial Number Company Name

  17. Hardware--Reader and Tag Company Name

  18. RFID Tag Company Name

  19. Chip of RFID Tag Company Name

  20. RFID Tag Company Name

  21. RFID Reader • Passive tags must have radio transmitters somewhere to power them • It's the reader's role to know how to talk to tags, how to create low-level data from reads, and how to send these data to middleware Company Name

  22. RFID Reader Chip Energy Tag Data Normally a very weak reply is obtained Some application illustrations will be given shortly Company Name

  23. Reader and Tag Collision • Two collision-related issues: • Reader Collision – Interference caused by an overlap in reader signals • Tag Collision – Interference caused when more than one tag responds to a signal at the same time Company Name

  24. RFID Middleware • In order to reduce network traffic, modular components of RFID Middleware will be used to process, filter, and digest events. Company Name

  25. Object Naming Service (ONS) • Since only the EPC is stored on an item’s tag, computer systems need a way of matching the EPC to information about the item • ONS is an automated networking service similar to Domain Name Service (DNS) and built over top of the DNS framework Company Name

  26. RFID Application Contents Company Name

  27. Networking the Physical World ONS RF Tag Middleware Networked TagReaders Company Name

  28. Register 1.2.3.4 is in Database A ONS Finding Where can I find information of 1.2.3.4 Send 1.2.3.4 Receive 1.2.3.4 RFID Network:Trace and Track ONS ONS return: Database A Retailer Database Verify Receiving Information A B Manufacture Database A Middleware Middleware Company Name

  29. RFID Security and Privacy Contents Company Name

  30. RFID Bill of Rights for consumer • The right of the consumer • to know what items possess RFID tags • to remove or deactivate the RFID tag once a product is purchased • to know where, when, and why an RFID tag is being read • to know what information is being stored inside an RFID tag Company Name

  31. Vulnerability • Tag • Data on the tag is stored unencrypted • Without physical supervision, anyone on the premises with physical access to tags can remove a tag or switch one tag with another • Reader • The data traffic from tag to reader is not encrypted • Readers do not authenticate the tags Company Name

  32. Possible Countermeasures • Tag • Using rewritable tags only where appropriate • With proper access control (physical or encryption) • Reader • Communication between readers and tags can be encrypted. • Readers should require proper authentication and authorization to allow access to their services Company Name

  33. Resource • http://www.epcglobalinc.org/Official Organization of EPC standards • MIT Auto-ID lab http://autoid.mit.edu/CS/ • Garfinkel, Simson. "The Trouble with RFID." http://www.thenation.com/doc/20040216/garfinkel/. • Gagne, Martin. "Identity-Based Encryption: A Survey. "RSA Laboratories CryptoBytes 6, no.1 (2003): 1019. • Palmer, Mark. "Seven Principles of Effective RFID Data Management." Enterprise Systems Journal, 3 August 2004, http://www.esj.com/enterprise/article.aspx?EditorialsID=1076. • Sozo, Inoue and Hiroto Yasuura. "RFID Privacy Using User-Controllable Uniqueness." Kyushu University, 1 November 2003. Company Name

  34. www.themegallery.com Thank You !

More Related