Sensor System Technology Conversion for Real/Logical World ...


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • また、今年2006年5月より小山・那須工場で当該部品の出荷・入荷に おいて『一括検品』を実現することができました。  写真のようにリフター(台車)に積んだ20ケほどのダンボールに貼った タグ付リライタブルシートを、ゲートを通過するだけで読取ることができました。  ・検品精度が良くなる   ・データと現品、伝票との突合せ作業などの負荷が大幅に 減少するとともに  ・配送先などをタグに書込みミスを防止できるようになりました 尚、ゲートの通過は日常 作業者の通り過ぎる通常のスピードであり 特別な意識をすることがありません
  • センサーネットワーク自体の説明 問題の説明 解決法の説明(有線) 日々増加 人の手では管理は不可能  自動的にネットワークを構築する技術が必要 では、センサーネットワークとはどのようなものなのかを、技術的な側面から見てみましょう。 まず、様々な状態や状況を検知するためのセンサーが必要です。 次に、センサーに通信機能をもたせるために、通信ノードという装置を使います。 通信ノードはセンサーの種類によらず、共通のものです。 センサーは、通信ノードと対になるだけで、ネットワークにつながることになります。 また、「通信ノード」はセンサーとサーバをつなぐための中継地点にもなります。 この際つくられるネットワークは、通信経路を予め決めておくのではありません。周りにある通信ノードを見つけて、自動的に作られます。これを「アドホックネットワーク」といいます。 最後に、センサーの情報を蓄積し、活用するアプリケーションが必要です。 受取った情報を適切に処理し、わかりやすく利用者に提供していくことになります。 それでは、このセンサーネットワークによって情報が伝えられる様子を実際にご覧いただきましょう。
  • Sensor System Technology Conversion for Real/Logical World ...

    1. 1. Sensor System Technology Conversion for Real/Logical World Conjunction October 26, 2006 Tsuneo Katsuyama Fujitsu Laboratories
    2. 2. <ul><li>Activity on RFID systems (current) </li></ul>
    3. 3. FUJITSU RFID Total Solutions RFID Tags   Business Solution   RFID Support Services   ・ Work Analysis ・ Systems Integration Support ・ Tag Printing ・ Making Manuals/Training ・ Operational Support Asset Management Product Management/Warehouse Management Logistics/Retail/Library Management Rental Product Management   RFID Middleware     Readers, Writers, RFID Printers  
    4. 4. UHF RFID Technologies FRAM Based Tag LSI   Low Power, High speed memory access 256/1KByte memory   Use for data carrier Long range type Reader/Writers The world smallest R/W for handheld terminal Waterproof Rewritable sheet Soft laundry CD/DVD For metal surface CF interface Tags corresponding to applications
    5. 5. RFID tags for various applications Linen Tags Paper Label Tags/PET Flexible software-molding linen tags Durability performance to the bend or the impact on daily cleaning process Batch processing (reading) of linen goods ■ Flexibility ■ Waterproof ■ Resistance to chemicals Ultraslim Metal Compatible Tags Rewritable Sheets Compared with normal metal compatible tags, the ultraslim tags are less than 2mm thick ■ Successfully develop the technologies necessary for sticking a tag to the metal surface ■ Successfully develop to trim down on tags less than 2mm ■ Distance of signals about 1 m Resin Tags ■ Refastenable on palettes, plates ■ Operational cost reduction for reusing ■ It is possible not only to read but also to take a visible confirm ■ Paper label type ■ Plastic card type ■ Heat-resisting ■ Pressure-proof
    6. 6. ・ The batch reading and writing can be done just in getting past a security gate with palletized products (Operation) started on May 24, 2006 <ul><li>【 Effects 】 </li></ul><ul><li>Improve the accuracy of inspection goods </li></ul><ul><li>Reduce the workload (Data input for inspection goods, and other related operations) </li></ul><ul><li>Prevent mistakes for delivery (Data input; address of receivers, and inventory locations) </li></ul>The product’s carton case is clearly labeled UHF-band RFID tagged rewritable-sheet (on front to back/side to side). It has the technology available for the batch reading and writing. (After the starting of formal operation, reading error->None!) Application case in Fujitsu   SCM of Oyama Works and Nasu Works
    7. 7. 2. Technology for the Next Stage
    8. 8. Direction Current RFID Systems Next Generation Systems Integration into the ICT systems for daily services Real world - Logical world conjunction Easy-to-use the advanced technology in the actual fields Fit to physical environment/Operation skill/… Sophisticated functions for good services Networking/System integration sensors, business systems,… Creating new application area (Tracing, Real-time management, ..)
    9. 9. <ul><li>Easy-to-use in physical environments </li></ul>
    10. 10. Motivation <ul><li>To use advanced technology in actual environments </li></ul><ul><ul><li>Adjustability for daily changes in the fields </li></ul></ul><ul><ul><li>Optimization without any skill </li></ul></ul>System design fitting to each environment -> Simulation technology Skill-less tuning in the fields -> Measurement technology Basic wireless technology for small area analysis is important.
    11. 11. Wireless Technologies for RFID EM simulation Antenna design Link simulation Container yard Simulation model Electrical field distribution Dense R/W environment Modeling 3D directivity Upper antenna Lower antenna Reader Tag P1: R/W Tx P2: Tag Rx w/o error P3: Duplex communication △ :LBT ○ :Method 1 □ :Method 2 Number of channel Time probability(%) Simulation Engine
    12. 12. <ul><ul><li>Only RFID basic function is not enough for real applications. </li></ul></ul><ul><ul><li>Topics: Active tag technology for security </li></ul></ul>B. Sophisticated functions integrated into tags
    13. 13. Problem/solution of active tags <ul><li>It can be read radio signal regularly from active RFID tag using a cheaper reader device. </li></ul><ul><ul><li>Emission of radio wave becomes a threat because anyone can know existence of source from the remote place </li></ul></ul><ul><li>ID is tapped. </li></ul><ul><ul><li>Tracing behavior </li></ul></ul><ul><li>Spoofing by resend attack </li></ul><ul><ul><li>Spoofing by catching & resending radio signal </li></ul></ul><ul><li>It does not emit except when it is necessary, that is, it responds only when there is inquiry from a right reader device. </li></ul><ul><li>Additionally, it responds by the signal encrypted at random. </li></ul>Problem Solution
    14. 14. Secure RFID system <ul><li>< Cross certification flow > </li></ul>RFID tag Reader writer (R/W) (every time different value) Tag ID is encrypted with time information and responded. 1. 2. 3. 4. 5. OK! ID Key, Time, SysID 7. ID extraction NG! STOP !! Do not respond. Key, Time, SysID Encryption data 6. 8. ID requests command is encrypted with time information. Attestation 2 (decode and attestation of the tag) Attestation 1 (decode and attestation of the R/W)
    15. 15. Specification of the prototype <ul><li>Common specification </li></ul><ul><li>Reader writer specification </li></ul><ul><li>Tag specification </li></ul>fixed type USB dongle type tag 38.4kbps Transmission rate common key cryptosystem (DES) Security method 315MHz and slight wireless standard conforming Communication method About 10m Communication distance 2^128 or less piece Number of tag Content Item 100mmx80mmx25mm Size less than 0.5W Power consumption USB Bus Powered / DC5V AC Adaptor Power supply USB 、 LAN 、 WLAN Host I/F Content Item 77mmx25mmx8mm Size less than 0.5W Power consumption USB Bus Powered Power supply USB Host I/F Content Item 34mmx34mmx5mm(except Battery ) Size Around 1 year (CR2032, depend on the specification. ) Power consumption (battery life) Lithium button battery ( DC 3 V) Power supply Content Item
    16. 16. Comparison of RFID tag 1): UHF band RFID tag, 2): depends on specification (one operation per second is assumed), 3): The expectation. around 1 year 2 ) around 1 year 2 ) semipermanent (no battery) (Operate by the electromagnetic induction) Lifetime with sensor sensor NW intercommunication with sensor No Extendibility Tracking person (no restriction) Tracking person (restricted area) Distribution Inventory control of goods Application around $10 3 ) less than $10 3 ) less than $1 3 ) Cost ◎ Respond to inquiry from the authenticated reader ID encryption × Always emitting radio signal △ Respond to inquiry from the reader ID non-encryption Security ~ 10m > 10m ~ 4m 1) Comm. distance Secure RFID tag Active RFID tag Passive RFID tag
    17. 17. Applications Nurse call Call button Buzzer Tag Tag Reader Hospital Two-way and secure communication with a buzzer and button Searching Reader Packages with tags Blinking LED Location detection Two-way Communication with LED indication Temperature sensor Temperature controller Reader Multi-functional tag Packages with UHF passive tags Pallet Storage Management for distribution Two-way communication with sensing capability, and cooperation with the passive tags Get environment information Patient call Temperature control signal Warehouse
    18. 18. C. Networking the sensors/systems
    19. 19. Sensor Network <ul><li>Carefully covered the entire target zone for monitoring </li></ul><ul><li>Quick auto-detection a problem such as natural phenomena, and small sign of changes (natural, business, …) </li></ul>Rate of Soil moisture Condition of soil excavation The inclination changes Water level changes Vibration Slope Implementation of the Sensor Network system just like wired net which can be set up easily and at low cost. intrusion by suspicious individuals Raising of water dangerous level Traffic jams Accidents Tunnel fire disasters
    20. 20. System model Management servers Backbone gateway Camera Temperature, stress, acceleration,… Video control Automatic path finding Power supply box Data Center Wireless ad-hoc Watcher/sensor sensor access notify Trifle network Ad hoc technology basis We focus on here! Storage of collected sensor data, analyze, reuse and notify to watcher Data center Highway network for collection of sensor data from trifle networks Backbone Fine grain network to connect between backbone and sensors Trifle network Collection of data and site watching Watcher/sensor
    21. 21. Wired sensor network: S-wire <ul><li>Technology for trifle network </li></ul><ul><li>Wired mesh net for sensor nodes </li></ul><ul><ul><li>Communication and remote power supply functions </li></ul></ul><ul><li>Each node has several joints to connect wire and sensor interface </li></ul><ul><li>Easy to deploy, configure and modify on the site </li></ul><ul><li>Security </li></ul><ul><ul><li>Encryption communication data </li></ul></ul><ul><ul><li>Detect cut cable quickly, and re-route </li></ul></ul>S-wire node joint sensor gateway wire Actuator Power supply box Serial Sensor interface
    22. 22. S-wire node 3cm 3cm 2.3cm
    23. 23. Sensor network system <ul><li>Fully distributed message transfer </li></ul><ul><ul><li>Ad-hoc routing </li></ul></ul><ul><ul><li>Self checking the adjacent nodes </li></ul></ul><ul><li>Remote power supply </li></ul>Node Water sensor Node Acceralation sensor Node Node Gateway Gateway Backbone network Self-managing architecture Node Water sensor Node Temperature Notify the results Server Node Motion sensor
    24. 24. Advantages <ul><li>High communication quality </li></ul><ul><ul><li>Independent from density of sensor nodes </li></ul></ul><ul><li>Good flexibility </li></ul><ul><ul><li>Re-route quickly in the case of disconnection of cables or destruction of nodes </li></ul></ul><ul><ul><li>Notify warnings when disconnection, destruction, and other errors </li></ul></ul><ul><ul><li>Load balancing in the case of traffic jam of sensor data </li></ul></ul><ul><ul><li>Easy to know the position of nodes: Relative logical position from gateways </li></ul></ul><ul><ul><li>Easy to deploy nodes: just connect with uniform nodes, just put sensor sheet or net </li></ul></ul><ul><li>Good maintenance condition </li></ul><ul><ul><li>No worry about power supply for each node </li></ul></ul><ul><li>Compact and cheap (no radio module/power unit, one chip configuration) </li></ul>
    25. 25. Ex : landslide watching system <ul><li>Paste sensor sheet to watching area </li></ul><ul><li>Watching condition, and notify abnormal events </li></ul>Forward sensor data with multi-hop S-wire sheet Watching application Soar, wind power Battery power Wireless LAN Multi-hop unit
    26. 26. 3. For the future
    27. 27. Sensor System Convergence Find by word of mouth, reputations Correlation Analysis Analysis Value-Added Processing (Semantic Interpretation) Complaints about the shortage of goods increase Structure Equation Modeling Buying process Reputations Sales cost Words Analysis Simulation/Optimization Management Semantic Structure task Sales Cost Scheduling Service Interaction Customize IT System/ User-centric ・・・ 09:00 inventory check 10:00 Time Discounting 12:00 Change a backup member 14:00 inventory check Service Area Deployment Store Manage Sales Store Promotion Planning Store Stock Planning Behavior Analysis Promotion Plan Work Structure Manuals Inside of the store POS Registers Operation Recorder Blog Hard Sensor Soft Sensor CGM Sensor Image Recognition ○○ / が / 、 / 品不足 / で / 買え / なか / った / ! Purchase Pattern Extraction Information Processing Language Processing Morphological Analysis (Japanese) ¥ Event Extraction Preprocessing Network Time Discounting (e.g. bargain goods ) Action Pattern Extraction Motion Vector Extraction Replenish stocks / Inventory check etc.. Commodity price Sensors 20% OFF!! Sales Log 12:13 Onion Buy3 12:13 Pork   1Pack 12:24 Milk   2Pack …
    28. 28. Conclusion <ul><li>Combine the technology + Create new technology </li></ul><ul><li>Make new common sense/literature </li></ul><ul><ul><li>Like GUI of Personal Computer </li></ul></ul><ul><li>Interface standard for integration </li></ul><ul><ul><li>Sensor data transfer – Event message, … </li></ul></ul><ul><ul><li>Middleware </li></ul></ul><ul><ul><li>… </li></ul></ul>Status of RFID related technology: Entrance of next stage