SlideShare a Scribd company logo
1 of 15
Internet of Things - 
Enabling Technologies 
RFID 
-By 
Swetha Kogatam 
SJSU ID : 009439339
RFID technology and its applications 
in Internet of Things (IoT) 
Authors : 
-Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; 
-School of Computer Science and Technology, Southwest University of 
Science and Technology, Mianyang, China; 
-School of Information Science and Technology, Southwest Jiaotong 
University, Chengdu, China 
Published in: Consumer Electronics, Communications 
and Networks (CECNet), 2012 2nd International Conference 
Date of Conference : 21-23 April 2012 
Conference Location : Yichang 
Publisher: IEEE
What is RFID ? 
Radio frequency identification system (RFID) is an 
automatic technology and aids machines or 
computers to identity objects, record metadata or 
control individual target through radio waves. 
The RFID technology was first appeared in 1945, as 
an espionage tool for the Soviet Union. 
Main Advantage: 
Is the automated identification and data capture 
that promises wholesale changes across a broad 
spectrum of business activities and aims to reduce 
the cost of the already used systems such as bar 
codes. 3
RFID consists of 
1. Tags (transmitters/ responders) : The tag is a microchip 
connected with an antenna, which can be attached to an 
object as the identifier of the object. 
2. Readers (transmitters 
/ receivers) : The RFID 
reader communicates 
with the RFID tag using 
radio waves.
RFID & IOT 
When the RFID readers abided by appropriate 
communication protocols are connected to the terminal 
of Internet, the readers distributed throughout the world 
can identify, track and monitor the objects attached with 
tags globally, automatically, and in real time, if needed. 
This is the so-called Internet of Things (IOT). 
IOT first became popular through the Auto-ID Center and 
related market analysts publications and RFID is often 
seen as a prerequisite for the IOT.
IOT ARCHITECTURE 
The IOT system architecture is 
generally divided into three 
layers: 
1. the perception layer, 
2. the network layer, 
3. the service layer (or 
application layer)
1. Perception layer is the information origin and the core layer of 
IOT. All kinds of information of the physical world used in IOT are 
perceived and collected in this layer 
Ex : wireless sensors network (WSN), tags and reader-writers etc. 
2. Network layer also called as transport layer, includes access 
network and core network, provides transparent data 
transmission capability. 
The information from perception layer can be sent to the 
upper layer using existing mobile communication network. 
3. Service layer also called application layer, includes data 
management sub-layer and application service sub-layer. 
 The data management sub-layer provides processing complex 
data and uncertain information
RFID System 
RFID systems are composed of three main components: 
1. RFID tags 
2. RFID reader 
3. Application 
system 
RFID tags have the following essential components in 
common: 
antenna, integrated circuit, printed circuit board 
8
RFID Tag 
Also known as transponders (transmitter/responder), are 
attached to the objects to count or identify. 
Tags could be either active or passive. 
The main responsibility of antenna of RFID tag is to transmit 
and receive radio waves for the purpose of communication. 
The antenna is also known as the coupling mechanism, which 
can transform the energy in the form of electromagnetic 
radiation. This is the way the tag and reader communicating 
each other. 
The integrated circuit (IC) is a packaged collection of discrete 
components that provide the brains for the tag and transmit 
the tag’s unique identifier (ID). 
The printed circuit board (PCB) is the material that holds the 
tag together. The circuit board may be rigid or flexible, and is 
composed of many different types of materials, depending on 
the type and purpose of the tag. 9
Tags are built to comply with a categorization called a class. 
EPCglobal has defined six classifications for RFID tags (0 to 5) 
Class 0/class 1: These classes provide the basic radio 
frequency (RF) passive capability. Class 0 is factory-programmed. 
Beyond class 0, including class 1, the tags are 
user-programmable. 
Class 2: Additional functionality is added, which includes 
encryption and read-write RF memory 
Class 3: Batteries are found on board that will power logic in 
the computer circuit. Class 3 provides longer range and 
broadband communications 
Class 4: Active tags are part of the definition of class 4 tags. 
Peer-to-peer communications and additional sensing arc also 
included. 
Class 5: Class 5 tags contain enough power to activate other 
tags and could be effectively classified as a reader
RFID Reader 
The reader is responsible for orchestrating the 
communication with any tags in its read range and then 
presenting the tags’ data to an application that can make 
use of the data. 
Main functions are to 
 activate the tags, 
 structure the communication sequence with the tag and 
 transfer data between the application software and tags 
Readers in all systems can be reduced to two 
fundamental functional blocks: 
1. Control system and 
2. High frequency (HF) interface 
11
HF interface performs the following functions : 
1.Generation of high frequency transmission power to activate 
the transponder and supply it with power; 
2.Modulation of the transmission signal to send data to the 
transponder; 
3.Reception and demodulation of HF signals transmitted by a 
transponder.
Control unit performs the following functions: 
1.Communication with the application software and the 
execution of commands from the application software; 
2.Signal coding and decoding. In more complex systems the 
following additional functions are available 
3.Execution of an anti-collision algorithm; 
4.Encryption and decryption of the data to be transferred 
between transponder and reader; 
5.Performance of authentication between transponder and 
reader. 
6.Control of the communication with a transponder 
Application system: 
Also called data processing system, can be an application 
or database, depending on the application 
Application software initiates all readers and tags 
activities 
13
Evolution of IOT 
The evolution of IOT is coinciding with that of RFID and sensor 
technologies. RFID technology is a very important and 
fundamental groundwork for IOT. 
14
CHALLENGES & CONCLUSION 
Collision Problems 
Security and Privacy Concerns 
Other Challenges 
Cost , Design & Integration into existing systems 
CONCLUSION 
• The IOT uses a variety of information sensing identification 
device and information processing equipment, such as RFID, 
WSN, GPRS, etc. combining with the Internet to form an 
extensive network in order to informationize and intelligentize 
the entities or objects. 
• This paper analyzes the applications and challenges of RFID 
technology, which is the important and foundational 
component of IOT. 
15

More Related Content

What's hot

Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt sutrishnakar1995
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisWriteMyThesis
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsDevanand Hariperumal
 
Emerging Technology: Internet of Things
Emerging Technology: Internet of ThingsEmerging Technology: Internet of Things
Emerging Technology: Internet of ThingsBartosz Petryński
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsShivam Kumar
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)FabMinds
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology pptijaranjani
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 

What's hot (20)

Iot architecture
Iot architectureIot architecture
Iot architecture
 
RFID
RFID RFID
RFID
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for Thesis
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
Emerging Technology: Internet of Things
Emerging Technology: Internet of ThingsEmerging Technology: Internet of Things
Emerging Technology: Internet of Things
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutions
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Rfid report
Rfid reportRfid report
Rfid report
 
Iot
IotIot
Iot
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 

Viewers also liked

IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...CPqD
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Kelly Stark
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ankur Pipara
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
Xirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysXirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysMarketing Team
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspkshc01
 

Viewers also liked (19)

IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Intro to IoT-23Sep2015
Intro to IoT-23Sep2015Intro to IoT-23Sep2015
Intro to IoT-23Sep2015
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Xirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysXirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSys
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Residential Solar PV Design
Residential Solar PV DesignResidential Solar PV Design
Residential Solar PV Design
 

Similar to Internet of Things and its Enabling Technologies - RFID

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsmramesh chatty
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 

Similar to Internet of Things and its Enabling Technologies - RFID (20)

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Rfid3
Rfid3Rfid3
Rfid3
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Internet of Things and its Enabling Technologies - RFID

  • 1. Internet of Things - Enabling Technologies RFID -By Swetha Kogatam SJSU ID : 009439339
  • 2. RFID technology and its applications in Internet of Things (IoT) Authors : -Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; -School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China; -School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China Published in: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference Date of Conference : 21-23 April 2012 Conference Location : Yichang Publisher: IEEE
  • 3. What is RFID ? Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identity objects, record metadata or control individual target through radio waves. The RFID technology was first appeared in 1945, as an espionage tool for the Soviet Union. Main Advantage: Is the automated identification and data capture that promises wholesale changes across a broad spectrum of business activities and aims to reduce the cost of the already used systems such as bar codes. 3
  • 4. RFID consists of 1. Tags (transmitters/ responders) : The tag is a microchip connected with an antenna, which can be attached to an object as the identifier of the object. 2. Readers (transmitters / receivers) : The RFID reader communicates with the RFID tag using radio waves.
  • 5. RFID & IOT When the RFID readers abided by appropriate communication protocols are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). IOT first became popular through the Auto-ID Center and related market analysts publications and RFID is often seen as a prerequisite for the IOT.
  • 6. IOT ARCHITECTURE The IOT system architecture is generally divided into three layers: 1. the perception layer, 2. the network layer, 3. the service layer (or application layer)
  • 7. 1. Perception layer is the information origin and the core layer of IOT. All kinds of information of the physical world used in IOT are perceived and collected in this layer Ex : wireless sensors network (WSN), tags and reader-writers etc. 2. Network layer also called as transport layer, includes access network and core network, provides transparent data transmission capability. The information from perception layer can be sent to the upper layer using existing mobile communication network. 3. Service layer also called application layer, includes data management sub-layer and application service sub-layer.  The data management sub-layer provides processing complex data and uncertain information
  • 8. RFID System RFID systems are composed of three main components: 1. RFID tags 2. RFID reader 3. Application system RFID tags have the following essential components in common: antenna, integrated circuit, printed circuit board 8
  • 9. RFID Tag Also known as transponders (transmitter/responder), are attached to the objects to count or identify. Tags could be either active or passive. The main responsibility of antenna of RFID tag is to transmit and receive radio waves for the purpose of communication. The antenna is also known as the coupling mechanism, which can transform the energy in the form of electromagnetic radiation. This is the way the tag and reader communicating each other. The integrated circuit (IC) is a packaged collection of discrete components that provide the brains for the tag and transmit the tag’s unique identifier (ID). The printed circuit board (PCB) is the material that holds the tag together. The circuit board may be rigid or flexible, and is composed of many different types of materials, depending on the type and purpose of the tag. 9
  • 10. Tags are built to comply with a categorization called a class. EPCglobal has defined six classifications for RFID tags (0 to 5) Class 0/class 1: These classes provide the basic radio frequency (RF) passive capability. Class 0 is factory-programmed. Beyond class 0, including class 1, the tags are user-programmable. Class 2: Additional functionality is added, which includes encryption and read-write RF memory Class 3: Batteries are found on board that will power logic in the computer circuit. Class 3 provides longer range and broadband communications Class 4: Active tags are part of the definition of class 4 tags. Peer-to-peer communications and additional sensing arc also included. Class 5: Class 5 tags contain enough power to activate other tags and could be effectively classified as a reader
  • 11. RFID Reader The reader is responsible for orchestrating the communication with any tags in its read range and then presenting the tags’ data to an application that can make use of the data. Main functions are to  activate the tags,  structure the communication sequence with the tag and  transfer data between the application software and tags Readers in all systems can be reduced to two fundamental functional blocks: 1. Control system and 2. High frequency (HF) interface 11
  • 12. HF interface performs the following functions : 1.Generation of high frequency transmission power to activate the transponder and supply it with power; 2.Modulation of the transmission signal to send data to the transponder; 3.Reception and demodulation of HF signals transmitted by a transponder.
  • 13. Control unit performs the following functions: 1.Communication with the application software and the execution of commands from the application software; 2.Signal coding and decoding. In more complex systems the following additional functions are available 3.Execution of an anti-collision algorithm; 4.Encryption and decryption of the data to be transferred between transponder and reader; 5.Performance of authentication between transponder and reader. 6.Control of the communication with a transponder Application system: Also called data processing system, can be an application or database, depending on the application Application software initiates all readers and tags activities 13
  • 14. Evolution of IOT The evolution of IOT is coinciding with that of RFID and sensor technologies. RFID technology is a very important and fundamental groundwork for IOT. 14
  • 15. CHALLENGES & CONCLUSION Collision Problems Security and Privacy Concerns Other Challenges Cost , Design & Integration into existing systems CONCLUSION • The IOT uses a variety of information sensing identification device and information processing equipment, such as RFID, WSN, GPRS, etc. combining with the Internet to form an extensive network in order to informationize and intelligentize the entities or objects. • This paper analyzes the applications and challenges of RFID technology, which is the important and foundational component of IOT. 15