370 likes | 666 Views
RFID Network. Building an Internet of Things. Liang Dong leondong@sjtu.edu.cn. Introduction RFID. RFID Network Architecture. RFID Security & Privacy. RFID Applications. Contents. Introduction RFID. Contents. What will the world be if all object can “talk”?. Automatic Identification.
E N D
RFID Network Building an Internet of Things Liang Dong leondong@sjtu.edu.cn
Introduction RFID RFID Network Architecture RFID Security & Privacy RFID Applications Contents Company Name
Introduction RFID Contents Company Name
What will the world be if all object can “talk”? Company Name
Automatic Identification Real World Virtual World What is Automatic Identification 011011100010101010111010101110101011010001011101010001001010101000011101010101010101010000011101111110110111010010101110101011 Company Name
What is Automatic Identification • Various forms of Automatic Identification • Biometric (e.g. Retinal Scans) • Optical Character Recognition (OCR) • Voice Recognition • Bar Codes( e.g. Uniform Product Codes) • Radio Frequency Identification (RFID) Company Name
What is RFID • Radio Frequency Identification • Describes any system of identification wherein an electronic device that uses radio frequency or magnetic field variations to communicate is attached to an item. Company Name
RFID: Item Management RFID: Access Control Animal ID RFID & I.C. Cards RFID: Toll Roads & Item Management Microwave EAS Data Terminal Cell Phone Low Freq. EAS Mid. Freq. EAS TV Data Modem Radio Toys Garage Door FM AM CB 300 GHz 2.45 GHz 10 MHz 10 kHz 100 kHz 1 MHz 100 MHz 1000 MHz LF HF UHF Microwave RFID Frequency Company Name
What’s wrong with Bar-code • Barcode is prevalent in commercial world. • However, there are shortcomings of bar codes • Line-of-sight • One-at-a-time • Manual handling • Limited range • Limited data Company Name
Radio Frequency Identification • Radio Frequency Identification offer the potential to eliminate these shortcomings • Non-line-of-sight • 100(s) at a time • Automatic handling • Several meter • 50 bits -Kbits Company Name
What are some of the potential issues associated with the creation of an “Internet of things”? Company Name
Example: Supply Chain Company Name
RFID Network Architecture Contents Company Name
RFID Network Architecture • The RFID Network Architecture is composed of four fundamental elements: • Electronic Product Code (EPC) • Hardware System (RFID tags and readers) • RFID middleware • Object Name Service (ONS) Company Name
Electronic Product Code • Numerous identification coding standards exist: • Universal Product Code (UPC) • International Standard Book Number (ISBN) • IP Address • MAC Address • EPC aims to uniquely identify physical objects over the world Company Name
Electronic Product Code • Standard EPC is 96 bit • EPC is comprised of four distinct numbers • Version • Domain Manager Number (P&G, Pepsi) • Object Class Number (Pepsi Cola) • Serial Number Company Name
Hardware--Reader and Tag Company Name
RFID Tag Company Name
Chip of RFID Tag Company Name
RFID Tag Company Name
RFID Reader • Passive tags must have radio transmitters somewhere to power them • It's the reader's role to know how to talk to tags, how to create low-level data from reads, and how to send these data to middleware Company Name
RFID Reader Chip Energy Tag Data Normally a very weak reply is obtained Some application illustrations will be given shortly Company Name
Reader and Tag Collision • Two collision-related issues: • Reader Collision – Interference caused by an overlap in reader signals • Tag Collision – Interference caused when more than one tag responds to a signal at the same time Company Name
RFID Middleware • In order to reduce network traffic, modular components of RFID Middleware will be used to process, filter, and digest events. Company Name
Object Naming Service (ONS) • Since only the EPC is stored on an item’s tag, computer systems need a way of matching the EPC to information about the item • ONS is an automated networking service similar to Domain Name Service (DNS) and built over top of the DNS framework Company Name
RFID Application Contents Company Name
Networking the Physical World ONS RF Tag Middleware Networked TagReaders Company Name
Register 1.2.3.4 is in Database A ONS Finding Where can I find information of 1.2.3.4 Send 1.2.3.4 Receive 1.2.3.4 RFID Network:Trace and Track ONS ONS return: Database A Retailer Database Verify Receiving Information A B Manufacture Database A Middleware Middleware Company Name
RFID Security and Privacy Contents Company Name
RFID Bill of Rights for consumer • The right of the consumer • to know what items possess RFID tags • to remove or deactivate the RFID tag once a product is purchased • to know where, when, and why an RFID tag is being read • to know what information is being stored inside an RFID tag Company Name
Vulnerability • Tag • Data on the tag is stored unencrypted • Without physical supervision, anyone on the premises with physical access to tags can remove a tag or switch one tag with another • Reader • The data traffic from tag to reader is not encrypted • Readers do not authenticate the tags Company Name
Possible Countermeasures • Tag • Using rewritable tags only where appropriate • With proper access control (physical or encryption) • Reader • Communication between readers and tags can be encrypted. • Readers should require proper authentication and authorization to allow access to their services Company Name
Resource • http://www.epcglobalinc.org/Official Organization of EPC standards • MIT Auto-ID lab http://autoid.mit.edu/CS/ • Garfinkel, Simson. "The Trouble with RFID." http://www.thenation.com/doc/20040216/garfinkel/. • Gagne, Martin. "Identity-Based Encryption: A Survey. "RSA Laboratories CryptoBytes 6, no.1 (2003): 1019. • Palmer, Mark. "Seven Principles of Effective RFID Data Management." Enterprise Systems Journal, 3 August 2004, http://www.esj.com/enterprise/article.aspx?EditorialsID=1076. • Sozo, Inoue and Hiroto Yasuura. "RFID Privacy Using User-Controllable Uniqueness." Kyushu University, 1 November 2003. Company Name
www.themegallery.com Thank You !