580 likes | 659 Views
Explore the world of RFID (Radio Frequency Identification) technology, its components, applications, and internal workings. Learn about RFID tags, readers, communication channels, frequencies, and applications in various industries like manufacturing, retail, security, and more. Dive into the smart applications of RFID technology like smart groceries and smart cabinets. Understand how RFID revolutionizes tracking, monitoring, and inventory management processes.
E N D
Outline • RFID Overview • RFID Technology Internals • RFID Applications • RFID Issues • RFID Case study
What is RFID? • RFID = Radio Frequency IDentification • Uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track.. • Does not require physical sight or contact between reader/scanner and the tagged item. • Attempts to provide unique identification and backend integration that allows for wide range of applications.
RFID System Components • Tag • Chip • Antenna • Reader • RF Module (Transmitter and Receiver) • Control Unit • Antenna • Several Interfaces (RS 232, USB, etc.) • Host Computer • Middleware
Antenna Power Supply Memory Cells Control Logic (Finite State machine) Tx Modulator Rx Demodulator Tag Integrated Circuit (IC) RFID Tag Structure(General)
RFID Tags – Smart Lables A paper labelwith RFID inside An antenna, printed, etched or stamped ... … and a chip attached to it … on a substrate e.g. a plastic foil ...
RFID Tag Types • Passive Tags • Operational power from reader radiated power • Active Tags • Operational power provided by battery(built into tag)
RFID Readers • Functions: • Remotely power tags • Establish a bidirectional data link • Communicate with networked server(s) • Can read 100-300 tags per second • Readers can be at a fixed point such as • Entrance/exit • Point of sale • Readers can also be mobile/hand-held
RFID Readers - Anatomy Digital Signal Processor (DSP) Network Processor Power Supply 13.56MHz Radio 915MHz Radio
Information Acquiring Methods • Inductive Coupling • For getting data from proximity card – passive tags • Propagation Coupling • For reading tags working in a larger distance
Inductive Coupling • Based on the stored data, the micro chip of the tag controls the switching on and off of a load resistance which will influence the voltage in the reader’s antenna. • Then the reader can detect the voltage changes in its own antenna.
Inductive Coupling • The electro-magnetic field from the reader penetrates the coil of the tag in a shorter distance. • By induction, a voltage is generated in the tag’s antenna coil. • This voltage is rectified and servers as the power of the tag.
IC or microprocessor RFID Tag Transceiver Tag Reader antenna antenna Inductive Coupling Inductive Coupling - shorter distance
Propagation Coupling • Basic Principle: • The electromagnetic waves are reflected by objects with dimensions greater than around half the wavelength of the wave.
Propagation Coupling • A small portion of the electromagnetic power of the reader reaches the tag. • This power can be also used as the power supply for the tag (passive tag). • Based on the stored data, the micro chip alters the load connected to the tag’s antenna and then changes the reflection characteristics of the antenna. • Then the reflected RF energy arrives at the reader’s antenna.
RFID Tag Transceiver Tag Reader antenna Propagation Coupling Propagation Coupling – longer distance IC or microprocessor antenna
Data Transfer • Amplitude Shift Keying (ASK) • Changing the amplitude of the radio wave based on the digital (binary ) data • Frequency Shift Keying (FSK) • Switching between two different frequencies based on the digital (binary) data • Phase Shift Keying (PSK) • Changing the phase on the transition between a 0 to 1 or 1 to 0
RFID Communications Reader Antenna Power from RF field Commands from reader Reader Tag->Reader Responses Tags RFID Communication Channel
Power • Cost • Bandwidth • Line of Sight • Lifespan • Range Frequency RFID Frequency Trade-Offs
RFID Application • Manufacturing and Processing • Inventory and production process monitoring • Warehouse order fulfillment • Supply Chain Management • Inventory tracking systems • Logistics management • Retail • Inventory control and customer insight • Auto checkout with reverse logistics
RFID Application • Security • Access control • Counterfeiting and Theft control/prevention • Location Tracking • Traffic movement control and parking management • Wildlife/Livestock monitoring and tracking
RFID Application – Smart Groceries • Add an RFID tag to all items in the grocery • As the cart leaves the store, it passes through an RFID transceiver. • The cart is rung up in seconds.
RFID Application – Smart Cabinet • Tagged item is removed from or placed in “Smart Cabinet” Reader antennas placed under each shelf • “Smart Cabinet” periodically interrogates to assess inventory • Server/Database is updated to reflect item’s disposition • Designated individuals are notified regarding items that need attention (cabinet and shelf location, action required) Passiveread/write tags affixed to caps of containers
RFID Application – Smart Fridge • Recognizes what’s been put in it • Recognizes when things are removed • Creates automatic shopping lists • Notifies you when things are past their expiration • Shows you the recipes that most closely match what is available
More Smart Applications • “Smart” products • Clothing, appliances, CDs, etc. tagged for store returns • “Smart” paper • Airline tickets that indicate your location in the airport • “Smart” currency • Anti-counterfeiting and tracking. • “Smart” people? “Smart” planet? …
Reader Collisions • It occurs when the coverage area of one reader overlaps with that of another reader. • The RF fields of two or more readers may overlap and interfere. Tag Reader 1 Reader 2
Reader Collisions • TDMA based solutions: • Program the reader to read at fractionally different times • Assign different time slots to nearby readers • Other solutions?
Tag Collisions • It occurs when multiple tags are in range of the reader. All the tags will be activated and respond at the same time. • Signal interference may occur. • It is difficult to distinguish between the tags. Tag1 Tag2 Tag4 Reader Tag3
Security Issues - Eavesdrop Reader Tag Eavesdropper Backward Channel Range Forward Channel Range
Other Security Issues • Forge valid tags • Attack the RFID infrastructure • Wiping out inventory data • Interrupting the normal reading
RFID Case Study • TRF7960A EVM • ISO/IEC 14443 • Demo
TRF7960A EVM • TRF7960A Evaluation Module • Texas Instrument • Multiple protocol RFID reader • For RFID study and research • Build RFID applications • $101
TRF7960A EVM • Features • Support ISO 15683, 14443 A&B, Tag-it protocol • Has an on-board PCB antenna • Has an interface for testing • Provides a Windows based host UI • Provides a USB interface • Provides source codes & detailed docs
TRF7960A EVM • RF Test Interface • Use SMA connector • For reader testing • External amplifier or antenna • Should remove one specific resistor
ISO 14443 • ISO/IEC 14443 • Proximity integrated circuit cards • Four parts • Physical characteristics • Frequency & Power & Signal interface • Initialization & Anticollision • Transmission protocols • Communication interface • Type A • Type B