SlideShare a Scribd company logo
1 of 43
Download to read offline
An introduction to RFID



 Miguel.Pardal@IST .utl.pt

         June 7th 2010
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
RFID tags
RFID antennas and readers
Other RF technologies




How stuff works                           PWKits
RFID in action




                 [Roussos06]
Radio
• ISM radio bands
  – Frequencies differ in world regions
     • Europe, Americas, and Asia


• LF/HF RFID or UHF RFID?
  – Operating principles are different
  – Near-field far-field boundary
     • Lambda / 2 PI
Near-field RFID
• LF (Low Frequency): [30 .. 300] kHz
• HF (High Frequency): [3 ..30] MHz

• Inductive coupling
• Load modulation
Shower Analogy
Far-field RFID
• UHF(Ultra-High Frequency): [300..3 000] MHz
• MW (Microwaves): [2,5 .. 5,8 GHz]

• Wave coupling
• Backscatter
Lighthouse Analogy
Range




        Credits: C. Floerkemeier, MIT
Tag components




        Credits: Rafsec OY, [Sarma01]
Manufacturing trade-off

• Cost

• Range                Pick 2

• Functionality
Tag categories
• Passive or battery-less
   – Use only power provided by the RFID reader’s signal
   – Smaller, more flexible
   – $ 0.20

• Semi-passive or battery-assisted
   – Use a battery to boost response signal
   – $5

• Active or battery-powered
   – Have additional processing capabilities and autonomy because they
     have more power e.g. sensors
   – Longer range
   – $ 30
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Business applications
• Track & Trace
   – Monitor physical goods and keep history

• Industries:
   –   Warehousing
   –   Maintenance
   –   Pharmaceuticals
   –   Medical Devices
   –   Agriculture
   –   Food
   –   Retailing
   –   Defense

                                               Credits: Sybase.pt
Software Layers
Architecture Framework
RFID middleware is easy…
• All readers
• Read all tags
• At all times




                           Credits: Carlos Perdigão, IST
NOT
         RFID middleware is easy…
   • All readers
cannot
   • Read all tags
   • At all times




                                Credits: Carlos Perdigão, IST
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
NOT
         RFID middleware is easy…
   • All readers
cannot
   • Read all tags
   • At all times




                                Credits: Carlos Perdigão, IST
Why




      Credits: Christian Floerkemeier, MIT
Subscribe, Configure, Notify, Publish




                                   [Floerkemeier07a]
Simulation




             Credits: Carlos Perdigão,
                                   IST
Experimental setup




                     Credits: Nova Ahmed,
                              Georgia Tech
Trials




         Credits: Schuitema supermarkets,
                              RFID Journal
NOT
            RFID security is easy…
   • All readers
should not
   • Read all tags
   • At all times




                                 Credits: Metro Group, RFID Journal
Threats




          [Garfinkel05]
Security
• Privacy
   – Misbehaving readers, well-behaving tags

• Authentication
   – Well-behaving readers, misbehaving tags

• Infrastructure security
   – Network
   – Servers
      • ONS, EPCIS
Conclusions
• RFID is a set of technologies
   – No “one-size-fit-all” tag and reader
• All readers cannot and read all tags at all times
   – RFID middleware challenges
• All readers should not read all tags at all times
   – RFID security challenges


• RFID allows things and places in the physical world to
  automatically generate data
   – An Internet of Things
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Internet of Things @ IST
Completed
• Nuno Rodrigues
  – RFID Logistics integration with Navision ERP



• Guilherme Pereira
  – Open-source RFID track and trace
Ongoing

• Ricardo Carapeto
  – Segurança de bagagens inteligentes


• Pedro Ferreira
  – Interface EPCIS para BizTalk


• Carlos Perdigão
  – Rede federada de rastreio de bens
Ongoing

• Miguel Pardal
  – Scalable and secure Discovery services
Proposals
• RFID Toys
  – Sistema de controlo de armazém robótico




• RFID Virtual Lab
  – Simulador RFID
Miguel.Pardal@IST .utl.pt

More Related Content

Viewers also liked

Tecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesTecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesMiguel Pardal
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFIDMiguel Pardal
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Miguel Pardal
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainMiguel Pardal
 
Cost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsCost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsMiguel Pardal
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of thingsMiguel Pardal
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classMiguel Pardal
 

Viewers also liked (7)

Tecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesTecnologia de segurança para Web Services
Tecnologia de segurança para Web Services
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chain
 
Cost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsCost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systems
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of things
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 

Similar to An introduction to RFID

Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID
RFIDRFID
RFIDdont
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptxAdityaRaut39
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in librariesNabi Hasan
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification Suman Dey
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And ApplicationFishEyeBox
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentationblkirkwood
 

Similar to An introduction to RFID (20)

Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
RFID
RFIDRFID
RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptx
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 

More from Miguel Pardal

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Miguel Pardal
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Miguel Pardal
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)Miguel Pardal
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Miguel Pardal
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsMiguel Pardal
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasMiguel Pardal
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityMiguel Pardal
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Miguel Pardal
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsMiguel Pardal
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentationMiguel Pardal
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Miguel Pardal
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)Miguel Pardal
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10Miguel Pardal
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)Miguel Pardal
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginnersMiguel Pardal
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discoveryMiguel Pardal
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigaçãoMiguel Pardal
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentationMiguel Pardal
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesMiguel Pardal
 

More from Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentes
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

An introduction to RFID

  • 1. An introduction to RFID Miguel.Pardal@IST .utl.pt June 7th 2010
  • 2. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 3. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 6.
  • 7. Other RF technologies How stuff works PWKits
  • 8. RFID in action [Roussos06]
  • 9. Radio • ISM radio bands – Frequencies differ in world regions • Europe, Americas, and Asia • LF/HF RFID or UHF RFID? – Operating principles are different – Near-field far-field boundary • Lambda / 2 PI
  • 10. Near-field RFID • LF (Low Frequency): [30 .. 300] kHz • HF (High Frequency): [3 ..30] MHz • Inductive coupling • Load modulation
  • 12. Far-field RFID • UHF(Ultra-High Frequency): [300..3 000] MHz • MW (Microwaves): [2,5 .. 5,8 GHz] • Wave coupling • Backscatter
  • 14. Range Credits: C. Floerkemeier, MIT
  • 15. Tag components Credits: Rafsec OY, [Sarma01]
  • 16. Manufacturing trade-off • Cost • Range Pick 2 • Functionality
  • 17. Tag categories • Passive or battery-less – Use only power provided by the RFID reader’s signal – Smaller, more flexible – $ 0.20 • Semi-passive or battery-assisted – Use a battery to boost response signal – $5 • Active or battery-powered – Have additional processing capabilities and autonomy because they have more power e.g. sensors – Longer range – $ 30
  • 18. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 19. Business applications • Track & Trace – Monitor physical goods and keep history • Industries: – Warehousing – Maintenance – Pharmaceuticals – Medical Devices – Agriculture – Food – Retailing – Defense Credits: Sybase.pt
  • 22.
  • 23.
  • 24. RFID middleware is easy… • All readers • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 25. NOT RFID middleware is easy… • All readers cannot • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 26. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 27. NOT RFID middleware is easy… • All readers cannot • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 28. Why Credits: Christian Floerkemeier, MIT
  • 29. Subscribe, Configure, Notify, Publish [Floerkemeier07a]
  • 30. Simulation Credits: Carlos Perdigão, IST
  • 31. Experimental setup Credits: Nova Ahmed, Georgia Tech
  • 32. Trials Credits: Schuitema supermarkets, RFID Journal
  • 33. NOT RFID security is easy… • All readers should not • Read all tags • At all times Credits: Metro Group, RFID Journal
  • 34. Threats [Garfinkel05]
  • 35. Security • Privacy – Misbehaving readers, well-behaving tags • Authentication – Well-behaving readers, misbehaving tags • Infrastructure security – Network – Servers • ONS, EPCIS
  • 36. Conclusions • RFID is a set of technologies – No “one-size-fit-all” tag and reader • All readers cannot and read all tags at all times – RFID middleware challenges • All readers should not read all tags at all times – RFID security challenges • RFID allows things and places in the physical world to automatically generate data – An Internet of Things
  • 37. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 39. Completed • Nuno Rodrigues – RFID Logistics integration with Navision ERP • Guilherme Pereira – Open-source RFID track and trace
  • 40. Ongoing • Ricardo Carapeto – Segurança de bagagens inteligentes • Pedro Ferreira – Interface EPCIS para BizTalk • Carlos Perdigão – Rede federada de rastreio de bens
  • 41. Ongoing • Miguel Pardal – Scalable and secure Discovery services
  • 42. Proposals • RFID Toys – Sistema de controlo de armazém robótico • RFID Virtual Lab – Simulador RFID