SlideShare a Scribd company logo
RFID: Technology and Applications
By: Sweta Dargad
Assistant Professor
ITM Universe
The Wave of the Future
Outline
• History of RFID
• Types & Systems
• Current Uses
• Future Applications
• Controversies
What is RFID?
• A technology that employs a microchip with
an antenna that broadcasts its unique
identifier and location to receivers.
• Employs a microchip called a smart tag,
broadcasts unique 96-bit identifier to receiver.
• Receiver relays the data to a computer.
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
RFID vs. Bar Codes
• Does not require human to manually pass
item
over scanner.
• More accurate inventory count.
• Can be incorporated into product, person,
animal.
• Can track each individual item.
History of RFID
• 1939
– IFF Transponder: Identification, friend or foe
(IFF) is an identification system designed for
command and control. It enables military and
national (civilian air traffic control)
interrogation systems to identify aircraft,
vehicles or forces as friendly and to determine
their bearing and range from the interrogator
– Used by allies in WWII
• 1945
– Leon Theremin made “The Thing”, also known
as listening device
– Espionage tool for Soviet Union
History cont.
• 1973
– Claims U.S. patent was first true ancestor
• 1980
– Retail
– Use of RFID in tracking and access applications
appeared
– Price, color, date of purchase
RFID Tags
• Contains two main parts:
– Silicon chips
– Antennas
• Components enable tags to receive and
respond to radio frequencies queries from
RFID transceivers.
• Three types:
– Passive
– Semi-Passive
– Active
RFID Tags cont.
• Passive
– Have no internal power supply
– Electrical current inducted in antenna by the incoming signal
proves power for integrated circuit in tag to power up and
transmit response
– Very Small, Limited Range, Unlimited Life
• Semi Passive
– Similar to passive tags, with the addition of a small battery
– Battery powers the integrated circuit
– Bigger, Longer Range, Limited Life
• Active
– Have their own internal power source
– Many operate at fixed intervals
– Also called beacons (broadcast own signal)
– Large ( coin), Much larger memories, Longer range
Tag block diagram
Antenna
Power Supply
Tx Modulator
Rx Demodulator
Control Logic
(Finite State
machine)
Memory
Cells
Tag Integrated Circuit (IC)
RFID readers
• Reader functions:
– Remotely power tags
– Establish a bidirectional data link
– Inventory tags, filter results
– Communicate with networked server(s)
– Can read 100-300 tags per second
• Readers (interrogators) can be at a fixed point such as
– Entrance/exit
– Point of sale
• Readers can also be mobile/hand-held
RFID System
 Objects equipped with RFID tag
 Tag contains transponder
with digital memory chip.
 Interrogator: an antenna
packaged with transceiver and
decoder.
 emits signal activating tag.
 Reader detects activation
signal, decodes the data on the
tag’s silicon chip.
 Data passed to host computer.
Growing Technology
• “Line of Sight” Technology
• RFID superior over Barcode
– Elements and accidents can disturb or damage
barcodes
• Best Buy, Wal-Mart, And Target began
implementation
– Efficient in ability to track & respond accordingly
Product Marketing – 75 years ago
You can have any
color,
as long as its black !
Product Marketing - Today
5
Add consumer
flexibility,
courtesy of
robotics,
computers …
Customer
window into
final stage of
manufacturing
Need to ensure error-free, custom assembly
Need inventory of components for the various customization
options
Critical Issues
Assembly process control
Inventory management
Supply chain integration
Customer insight
Effect on manufacturing
Applications of RFID
 Manufacturing and Processing
 Inventory and production process monitoring
 Warehouse order fulfillment
 Supply Chain Management
 Inventory tracking systems
 Logistics management
 Retail
 Inventory control and customer insight
 Auto checkout with reverse logistics
 Security
 Access control
 Counterfeiting and Theft control/prevention
 Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking
Current Uses
• Wal-Mart now requires its
suppliers to use RFID tags
on shipping crates and
pallets to improve
inventory management in
the supply chain.
• Fed Ex bought RFID-
enabled aircraft from
Airbus to reduce
maintenance time and
costs.
• Cattle and farm animals
are being tagged to
Smart groceries enhanced
Track products through their
entire lifetime.
Issues in Defense solved
• U.S. Department of Defense – to better track
goods along supply chain (logistics and
inventory).
• Electronic payment – credit card companies
moving to RFID-enabled cards to increase
efficiency and reduce time at point-of-sale for
customer, merchant, and card issuer.
Some more smart devices
• “Smart” appliances:
– Closets that advice on style depending on clothes available.
– Ovens that know recipes to cook pre-packaged food.
• “Smart” products:
– Clothing, appliances, CDs, etc. tagged for store returns.
• “Smart” paper:
– Airline tickets that indicate your location in the airport.
• “Smart” currency:
– Anti-counterfeiting and tracking.
• “Smart” people ??
The Future of RFID
 Medical
Drug Counterfeiting
Tracking & Tracing
Medical “Passports”
Foster Care System
Food Chain Precautions
 Shopping
Cashier-less check out
and payment
 Household Technology
Smart keys
Intelligent washing
machines
Monitoring refrigerators
Intelligent
ovens/microwaves
Controversy
• Privacy
– Consumer Rights
• Consumers should be informed if their products have
an RFID tag.
– Tracking of consumers (Profiling)
• RFID chips withstand dirt and scratches and can be
scanned from distances upward of 25 feet.
• Personal Information Leakage.
• Drawing the Line – Need for Legislation?
– Who Should Regulate?
Controversy cont.
• “Killing” of RFID Tags
– Tracking vs. the washing machine
– Options of killing after purchase
• Medical
– Implants/Personal Information
• Verichip is a tiny implantable chip that holds medical
records
• Bracelets to track infants in medical wards and elderly
in nursing homes.
– Used in animals for tracking.
Controversy cont.
• Medical
– Health Risks
• Hard to remove once implanted.
• Long term effects unknown.
• Religious
– Mark of the Beast, etc.
• The implanted RFID chip is certain to inflame Christian
fundamentalists, some of whom believe that such chips
are the Satanic “mark of the Beast” predicted in
Revelations 13:16 “And he causeth all, both small and
great, rich and poor, free and bond to receive a mark in
their right hand, or in their foreheads.”
RF effects of common materials
Communication protocols
ETSI EN 302 208 standard
• Shared operation in band 865.0 – 868.0 MHz at
transmit powers upto 2 W ERP.
– Operation in 10 sub-bands of 200 kHz.
– Power levels of 100 mW, 500 mW and 2 W ERP.
• Mandatory “listen before talk” and “look before leap”.
865.7MHz 867.5MHz
FT
865.1MHz 867.9MHz
100mW
867.7MHz865.5MHz
LT
FT
LT LT
FT
600kHz 600kHz600kHz
2W
FT
LT
500mW
865.0MHz 865.6MHz 867.6MHz 868.0MHz
Reader Collision Problem
• Reader-Reader Interference
• Reader-Tag Interference
Reader Collision and Hidden Terminal
• The passive tags are not able to take part in the collision
resolution or avoidance, as in other wireless systems
• Consider: RTS-CTS for hidden terminal problem in 802.11
– rfid: T is not able to send a CTS in response to an RTS from R
 In case multiple readers try to read
the same tag, the tag cannot
respond selectively to a particular
reader
TDMA based solution
• Assign different time slots and/or frequencies
to nearby readers
– Reduces to graph coloring problem (readers form
vertices)
• Only reader to reader interference
– Assign different operating frequencies
• Only multiple reader to tag interference
– Assign different time slots for operation
• Both types of interference
– First allot different time slots, then frequencies
Main Points
• Slowly becoming an industry standard
• Speeds up the supply chain process
• Easier to manage inventory
• Continually evolving
• Controversial technology
Questions for you….
• Define RFID technology?
• When was RFID introduced?
• What are two main reasons RFID is
controversial?
• Name the three types of RFID tags?
• How are they currently using RFID tags?
• How is RFID Technology expected to effect
households?
Questions?

More Related Content

What's hot

RFID Technology
RFID TechnologyRFID Technology
RFID Technology
Kshitij Varma
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
nn7046
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
Pravin Shinde
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
nikhilpatewar
 
RFID
RFIDRFID
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
bansarirajani
 
RFID
RFID RFID
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
ashtopustech
 
RFID
RFIDRFID
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
sathish sak
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
RFID
RFIDRFID
RFIDdont
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
ashish pal
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
Mouhanad Alkhaldi
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
afserfec56
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
Ravi Teja
 

What's hot (20)

RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
 
RFID
RFIDRFID
RFID
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
RFID
RFID RFID
RFID
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
RFID
RFIDRFID
RFID
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
RFID
RFIDRFID
RFID
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 

Viewers also liked

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
Mandar Jagtap
 
Acoustic wave form
Acoustic wave formAcoustic wave form
Acoustic wave form
Jay Kava
 
Acoustic transducers
Acoustic transducersAcoustic transducers
Acoustic transducers
Chathuranga Basnayaka
 
Surface Acoustic Wave Devices
Surface Acoustic Wave DevicesSurface Acoustic Wave Devices
Surface Acoustic Wave DevicesNitasha Goyal
 
Meriam bibile IMaRC2016
Meriam bibile IMaRC2016Meriam bibile IMaRC2016
Meriam bibile IMaRC2016
Meriam Anushani Bibile
 
RFID: Past, Present, and Future
RFID: Past, Present, and FutureRFID: Past, Present, and Future
RFID: Past, Present, and Future
Sean Robinson
 

Viewers also liked (6)

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Acoustic wave form
Acoustic wave formAcoustic wave form
Acoustic wave form
 
Acoustic transducers
Acoustic transducersAcoustic transducers
Acoustic transducers
 
Surface Acoustic Wave Devices
Surface Acoustic Wave DevicesSurface Acoustic Wave Devices
Surface Acoustic Wave Devices
 
Meriam bibile IMaRC2016
Meriam bibile IMaRC2016Meriam bibile IMaRC2016
Meriam bibile IMaRC2016
 
RFID: Past, Present, and Future
RFID: Past, Present, and FutureRFID: Past, Present, and Future
RFID: Past, Present, and Future
 

Similar to Applications of RFID technology

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Rifd
RifdRifd
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
Techvilla
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
tigertsang
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationarionslideshare
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
David Zhang
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
rajeshplacherikunnel
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
Saba651353
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
Arunkumar Kubasad
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
Hui Tin Yan
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
Akash Maurya
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
liuyingxi971017
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
Loin Huang
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
cairo university
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
ckmsara
 

Similar to Applications of RFID technology (20)

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rifd
RifdRifd
Rifd
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
13251503 pss7
13251503 pss713251503 pss7
13251503 pss7
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 

More from sweta dargad

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
sweta dargad
 
Stacks
StacksStacks
Stacks
sweta dargad
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
sweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
sweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 
All about snmp
All about snmpAll about snmp
All about snmp
sweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 
Cacti
CactiCacti

More from sweta dargad (11)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Applications of RFID technology

  • 1. RFID: Technology and Applications By: Sweta Dargad Assistant Professor ITM Universe The Wave of the Future
  • 2. Outline • History of RFID • Types & Systems • Current Uses • Future Applications • Controversies
  • 3. What is RFID? • A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers. • Employs a microchip called a smart tag, broadcasts unique 96-bit identifier to receiver. • Receiver relays the data to a computer. Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 4. RFID vs. Bar Codes • Does not require human to manually pass item over scanner. • More accurate inventory count. • Can be incorporated into product, person, animal. • Can track each individual item.
  • 5. History of RFID • 1939 – IFF Transponder: Identification, friend or foe (IFF) is an identification system designed for command and control. It enables military and national (civilian air traffic control) interrogation systems to identify aircraft, vehicles or forces as friendly and to determine their bearing and range from the interrogator – Used by allies in WWII • 1945 – Leon Theremin made “The Thing”, also known as listening device – Espionage tool for Soviet Union
  • 6. History cont. • 1973 – Claims U.S. patent was first true ancestor • 1980 – Retail – Use of RFID in tracking and access applications appeared – Price, color, date of purchase
  • 7. RFID Tags • Contains two main parts: – Silicon chips – Antennas • Components enable tags to receive and respond to radio frequencies queries from RFID transceivers. • Three types: – Passive – Semi-Passive – Active
  • 8. RFID Tags cont. • Passive – Have no internal power supply – Electrical current inducted in antenna by the incoming signal proves power for integrated circuit in tag to power up and transmit response – Very Small, Limited Range, Unlimited Life • Semi Passive – Similar to passive tags, with the addition of a small battery – Battery powers the integrated circuit – Bigger, Longer Range, Limited Life • Active – Have their own internal power source – Many operate at fixed intervals – Also called beacons (broadcast own signal) – Large ( coin), Much larger memories, Longer range
  • 9. Tag block diagram Antenna Power Supply Tx Modulator Rx Demodulator Control Logic (Finite State machine) Memory Cells Tag Integrated Circuit (IC)
  • 10. RFID readers • Reader functions: – Remotely power tags – Establish a bidirectional data link – Inventory tags, filter results – Communicate with networked server(s) – Can read 100-300 tags per second • Readers (interrogators) can be at a fixed point such as – Entrance/exit – Point of sale • Readers can also be mobile/hand-held
  • 11.
  • 12.
  • 13. RFID System  Objects equipped with RFID tag  Tag contains transponder with digital memory chip.  Interrogator: an antenna packaged with transceiver and decoder.  emits signal activating tag.  Reader detects activation signal, decodes the data on the tag’s silicon chip.  Data passed to host computer.
  • 14. Growing Technology • “Line of Sight” Technology • RFID superior over Barcode – Elements and accidents can disturb or damage barcodes • Best Buy, Wal-Mart, And Target began implementation – Efficient in ability to track & respond accordingly
  • 15. Product Marketing – 75 years ago You can have any color, as long as its black !
  • 16. Product Marketing - Today 5 Add consumer flexibility, courtesy of robotics, computers … Customer window into final stage of manufacturing
  • 17. Need to ensure error-free, custom assembly Need inventory of components for the various customization options Critical Issues Assembly process control Inventory management Supply chain integration Customer insight Effect on manufacturing
  • 18. Applications of RFID  Manufacturing and Processing  Inventory and production process monitoring  Warehouse order fulfillment  Supply Chain Management  Inventory tracking systems  Logistics management  Retail  Inventory control and customer insight  Auto checkout with reverse logistics  Security  Access control  Counterfeiting and Theft control/prevention  Location Tracking  Traffic movement control and parking management  Wildlife/Livestock monitoring and tracking
  • 19. Current Uses • Wal-Mart now requires its suppliers to use RFID tags on shipping crates and pallets to improve inventory management in the supply chain. • Fed Ex bought RFID- enabled aircraft from Airbus to reduce maintenance time and costs. • Cattle and farm animals are being tagged to
  • 20. Smart groceries enhanced Track products through their entire lifetime.
  • 21. Issues in Defense solved • U.S. Department of Defense – to better track goods along supply chain (logistics and inventory). • Electronic payment – credit card companies moving to RFID-enabled cards to increase efficiency and reduce time at point-of-sale for customer, merchant, and card issuer.
  • 22. Some more smart devices • “Smart” appliances: – Closets that advice on style depending on clothes available. – Ovens that know recipes to cook pre-packaged food. • “Smart” products: – Clothing, appliances, CDs, etc. tagged for store returns. • “Smart” paper: – Airline tickets that indicate your location in the airport. • “Smart” currency: – Anti-counterfeiting and tracking. • “Smart” people ??
  • 23. The Future of RFID  Medical Drug Counterfeiting Tracking & Tracing Medical “Passports” Foster Care System Food Chain Precautions  Shopping Cashier-less check out and payment  Household Technology Smart keys Intelligent washing machines Monitoring refrigerators Intelligent ovens/microwaves
  • 24. Controversy • Privacy – Consumer Rights • Consumers should be informed if their products have an RFID tag. – Tracking of consumers (Profiling) • RFID chips withstand dirt and scratches and can be scanned from distances upward of 25 feet. • Personal Information Leakage. • Drawing the Line – Need for Legislation? – Who Should Regulate?
  • 25. Controversy cont. • “Killing” of RFID Tags – Tracking vs. the washing machine – Options of killing after purchase • Medical – Implants/Personal Information • Verichip is a tiny implantable chip that holds medical records • Bracelets to track infants in medical wards and elderly in nursing homes. – Used in animals for tracking.
  • 26. Controversy cont. • Medical – Health Risks • Hard to remove once implanted. • Long term effects unknown. • Religious – Mark of the Beast, etc. • The implanted RFID chip is certain to inflame Christian fundamentalists, some of whom believe that such chips are the Satanic “mark of the Beast” predicted in Revelations 13:16 “And he causeth all, both small and great, rich and poor, free and bond to receive a mark in their right hand, or in their foreheads.”
  • 27. RF effects of common materials
  • 29. ETSI EN 302 208 standard • Shared operation in band 865.0 – 868.0 MHz at transmit powers upto 2 W ERP. – Operation in 10 sub-bands of 200 kHz. – Power levels of 100 mW, 500 mW and 2 W ERP. • Mandatory “listen before talk” and “look before leap”. 865.7MHz 867.5MHz FT 865.1MHz 867.9MHz 100mW 867.7MHz865.5MHz LT FT LT LT FT 600kHz 600kHz600kHz 2W FT LT 500mW 865.0MHz 865.6MHz 867.6MHz 868.0MHz
  • 30. Reader Collision Problem • Reader-Reader Interference • Reader-Tag Interference
  • 31. Reader Collision and Hidden Terminal • The passive tags are not able to take part in the collision resolution or avoidance, as in other wireless systems • Consider: RTS-CTS for hidden terminal problem in 802.11 – rfid: T is not able to send a CTS in response to an RTS from R  In case multiple readers try to read the same tag, the tag cannot respond selectively to a particular reader
  • 32. TDMA based solution • Assign different time slots and/or frequencies to nearby readers – Reduces to graph coloring problem (readers form vertices) • Only reader to reader interference – Assign different operating frequencies • Only multiple reader to tag interference – Assign different time slots for operation • Both types of interference – First allot different time slots, then frequencies
  • 33. Main Points • Slowly becoming an industry standard • Speeds up the supply chain process • Easier to manage inventory • Continually evolving • Controversial technology
  • 34. Questions for you…. • Define RFID technology? • When was RFID introduced? • What are two main reasons RFID is controversial? • Name the three types of RFID tags? • How are they currently using RFID tags? • How is RFID Technology expected to effect households?