RFID

1,901 views

Published on

RFID by Vipul Kalia @ null Pune Meet, September, 2010

Published in: Technology
  • Be the first to comment

RFID

  1. 3. What is RFID? <ul><li>R adio F requency Id entification: Identify physical objects through a radio interface. </li></ul><ul><li>Many different technologies called “RFID”. </li></ul><ul><li>Others types of auto-ID systems include: </li></ul><ul><ul><li>Optical barcodes </li></ul></ul><ul><ul><li>Radiological tracers </li></ul></ul><ul><ul><li>Chemical taggants </li></ul></ul>
  2. 5. RFID System <ul><li>Three Main Components: </li></ul><ul><li>Tags, or transponders, affixed to objects and carry identifying data. </li></ul><ul><li>Readers , or transceivers , read or write tag data and interface with back-end databases. </li></ul><ul><li>Back-end databases correlate data stored on tags with physical objects. </li></ul>
  3. 7. 6.857 Lecture - November 2, 2004 RFID Adhesive Labels 4 cm
  4. 8. 6.857 Lecture - November 2, 2004 An RFID “Smart Shelf” Reader
  5. 9. System Interface Reader 01.203D2A.916E8B.8719BAE03C Tag Database Reader Network Data Processing
  6. 10. RFID History <ul><li>Earliest Patent: John Logie Baird (1926) </li></ul><ul><li>“ Identify Friend or Foe” (IFF) systems developed by the British RAF to identify friendly aircraft. </li></ul><ul><li>Both sides secretly tracked their enemy’s IFF. </li></ul><ul><li>How do you identify yourself only to your friends? </li></ul>Don’t shoot! We’re British! Oh. We’re British too!
  7. 11. Related Military Applications <ul><li>IFF still used today for aircraft and missiles. Obviously classified. </li></ul><ul><li>Could envision an IFF system for soldiers. </li></ul><ul><li>Lots of military interest in pervasive networks of cheap, RFID-like sensors. </li></ul><ul><li>Monitoring pipelines, detecting biological agents, tracking munitions, etc. </li></ul>
  8. 12. Commercial Applications <ul><li>Early Applications: </li></ul><ul><ul><li>Tracking boxcars and shipping containers. </li></ul></ul><ul><ul><li>Cows: RFID ear tags. </li></ul></ul><ul><ul><li>Bulky, rugged, and expensive devices. </li></ul></ul><ul><li>The RFID Killer Application? </li></ul>
  9. 13. Supply-Chain Management (Not Gum) <ul><li>First Universal Product Code scanned was on a pack of Juicy Fruit gum in 1976. </li></ul><ul><li>Every day, over five billion barcodes are scanned around the world. </li></ul><ul><li>But barcodes are slow, need line of sight, physical alignment, and take up packaging “real estate”. </li></ul><ul><li>Over one billion RFID tags on the market. </li></ul><ul><li>Example: Gillette’s “shrinkage” problem. </li></ul>
  10. 14. Modern RFID Applications <ul><li>Supply-Chain Management </li></ul><ul><ul><li>Inventory Control </li></ul></ul><ul><ul><li>Logistics </li></ul></ul><ul><ul><li>Retail Check-Out </li></ul></ul><ul><li>Access Control: Company Cards </li></ul><ul><li>Payment Systems: Express WAY </li></ul><ul><li>Medical Records: New born Baby . </li></ul>
  11. 15. Weird Implementations of RFID
  12. 17. India and RFID Few Examples Transport industry The Minister of Road Transport and Highways, Government of India, launched a pilot project for radio frequency identification (RFID)-based vehicle tracking project on the Delhi-Jaipur highway of India. Under the project, 68 buses of Rajasthan State Road Transport Corporation (RSRTC) plying on the highway have been fitted with RFID tags and readers have been placed to track the vehicle movement along the highway, whereby their movement is being tracked, monitored and managed Apparel Tracking Using RFID –Pantaloons Pantaloon Retail (India) has piloted an RFID project at one its warehouses in Tarapur using 1,000 RFID tags. The company is starting from where it matters the most by implementing the technology at the warehouse. Ticketing More recently, NXP Semiconductors, SmartTags and Gemini Traze have collaborated to implement a “hands-free” RFID ticketing solution for a sporting event.
  13. 18. RFID Hacking Faradays CAGE (Shop Lifting) RFID based Identification theft RFID DOS attacks RFID based Virus attacks
  14. 19. Counter Measures Smart RFID tags with RSA Smart Readers Kill Switch
  15. 20. Thank you Twitter ID vipulk Quora ID vipulkalia If questions then

×