SlideShare a Scribd company logo
1 of 42
RFID- Radio Frequency
Identification
SEMINAR
PRESENTED BY
SAILAJITH LAL.L
Introduction
• Works on the principle of bi-directional radio
frequency communication.
• An Alternative for barcode and optical
technologies.
• Automatic Identification.
Object
• To carry data in suitable transponder
(Tag) and to retrieve the data by machine
readable means satisfy particular
application need.
• Communicating the data between the tag
and reader
What is RFID?
• Stands for Radio Frequency Identification
• Uses radio waves for identification
• One form of Automatic Identification
• Provides unique identification an object.
RFID – What is it?
• Radio Frequency Identification Device
• Holds a small amount of unique data – a
serial number or other unique attribute of
the item
• The data can be read from a distance – no
contact or even line of sight necessary
Working of RFID
A RFID system has three parts:
• A transponder – the radio frequency tag- that
has been programmed with information.
• A scanning antenna
• A transceiver with a decoder to interpret the
data
Block Diagram
Micro
processor
Modulation/
Demodulati
on
antenna
energy
data
TAG
RFID System
Modulation
• The process of superimposing the data up
on a carrier wave for its transfer between
the communicating components through
the separating medium- air.
• Amplitude shift keying - ASK
• Frequency shift keying - FSK
• Phase shift keying - PSK
Encoding
• The various encoding algorithm methods
select on the basis of
• Cost of implementation
• Band width
Wireless communication
• The data communication is wireless and
the types of RFID based on
communication pattern are
• Inductive coupling
• Propagation Coupling.
Inductive coupling
• Operate on the principle of resonance.
• Inductive coupled TAGS are passive.
• Single micro chip and large area coil
function as antenna.
• Operate at low and medium frequencies.
Inductive Coupling
Inductive coupling
Propagation Coupling
• It use electric field propagation properties of
radio signal to convey energy and data to TAG
and data from the TAG.
• Propagation coupled TAGS may be either passive
( no battery) or active ( battery powered).
• TAGS can be programmed by the reader.
• Used at high frequencies and increased range.
Propagation Coupling
Carrier frequency
• The radio frequency communication channels is
on the basis of frequency allocation and is
generally controlled by govt. with different part
of the electromagnetic spectrum being assigned
to different purpose.
• For RFID, frequency ranges are generally
classified as Low, Medium and High.
Data transfer rate and
bandwidth
• The rate of data transfer between the TAG and
READER is influenced by the frequency of carrier
wave used to carry the data .
• The higher the frequency, higher the data
transfer rate.
• The bandwidth available within the frequency
spectrum needs to be at least twice the bit rate
required for the application.
Frequency Bands
Frequency
Band
Characteristic
s
Typical
Application
Low
100-500 KHz
Inter mediate
10-15 MHz
High
850-950 MHz
2.4-5.8 GHz
Short to medium read
range, low reading
speed
Short to medium read
range, potentially
inexpensive, medium
reading speed
Long read range,
line of site required,
expensive
Access control
Animal identification
Inventory control
Access control
Smart Cards
Rail road car
monitoring, toll
collection systems
Transponder / TAG
• Derived from Transmitter / Responder.
• It responds to a transmitted request for data, by
the READER .
• They are fabricated as low power integrated
circuits suitable data transfer and power
generation ( for passive TAG )
• The TAGS are distinguished entirely by the
manner in which the device derives its power.
Tag is a device used to transmit information such as a
serial number to the reader in a contact less manner
Classified as :
Passive – energy from reader
Active - battery
Semi-passive – battery and energy from reader
RFID Tag
Types of RF Tags
• Active Tags
• Passive Tags
• Semi Passive RF Tags
• The first function of the reader is to activate the TAG
in the reading volume by creating an electromagnetic
field.
Active RFID Tags
• Battery Powered tags
• More expensive
• Shorter life span
Passive RFID Tags
• Tag contains antenna and
a small data chip
• Tag is powered by the
electromagnetic field
generated in doorways,
reflecting back a weak
signal containing data
RFID Tag Attributes
Active RFID Passive RFID
Tag Power Source Internal to tag Energy transferred using
RF from reader
Tag Battery Yes No
Availability of Power Continuous Only in field of reader
Required signal strength
to Tag
Very Low Very High
Range Up to 100m Up to 3-5m, usually less
Range and Power Levels of RFID
The range that can be achieved in an RFID
system is essentially determined by:
• The power available at the reader/interrogator
to communicate with the tag(s)
• The power available within the tag to respond
• The environmental condition and structures,
the former being more significant at higher
frequencies including signal to noise ratio.
How far can a passive tag be read?
Assume distance limited by power available to run the tag’s circuits.
 
meters
in
distance
MHz)
(915
frequency
meters/s
10
3
(meters)
wavelength
dBi)
(1
gain
antenna
tag
dBi)
(6
gain
antenna
reader
watt)
(1
power
nsmit
reader tra
needed)
W
(100
tag
to
available
power
4
8
2
2
2










r
f
x
c
f
c
G
G
P
P
r
G
G
P
P
T
R
R
T
T
R
R
T




Electronic Product Code(EPC)
EPC Code
• 613.23000.123456.123456789 (96 bits)
• Header – defines data type (8 bits)
• EPC Manager – describes originator of EPC
(Product manufacturer) (34 bits)
• Object Class - Could describe the product
type (20 Bits)
• Serial Number – Unique ID for that
product item (34 Bits)
Supply Chain – Global Vision
RFID Uses
• Retail & Distribution
• Contact less Payment
• Keyless Entry
• Livestock Tagging
• Pharmaceuticals
• Logistics Assets (containers, trailers)
• Pet Identification
Animal Identification Standards
• International standard 134.2 kHz
– ISO 11784: “Radio-frequency identification of
animals” – code structure
– ISO 11785: “Radio-frequency identification of
animals” – Technical concept
– ISO 14223: “Radio-frequency identification of
animals” – Advanced transponders
• U.S. standard 125 kHz
• At these frequencies the RF can penetrate mud, blood,
and water
RFID Security and Privacy Threats
• Security threats to the RFID system
• Privacy threats by the RFID system
Security Threats to RFID
• A competitor or thief performs an unauthorized
inventory of a store by scanning tags with an
unauthorized reader to determine the types and
quantities of items leading to information disclosure.
• An attacker modifies the EPC number on tags ,
tampering data, in supply chain disrupting business
operations and causing a loss of revenue.
• An attacker modifies a high-priced item’s EPC
number to be the EPC number of a lower cost item.
Privacy Threats by RFID
• A bomb in a restaurant explodes when there are five or more
Americans with RFID-enabled passports detected.
• A fixed reader at any retail counter could identify the tags of a
person and show the similar products on the nearby screen to a
person to provide individualized marketing.
• A sufficiently powerful directed reader reads tags in your
house or car.
EPC vs.
UPC (Barcodes)
• Both are forms of Automatic identification technologies
• Universal Product Code (UPC) require line of sight and
manual scanning whereas EPC do not
• UPC require optical reader to read whereas EPC reader
reads via radio waves
• EPC tags possess a memory and can be written while
UPC do not
• EPC tags cost 5 cents, UPC tags cost 1/10 cent
Advantages of RFID
RFID systems offer a number of advantages over
current ID systems such as barcodes or magnetic
cards. These include;
• Hands Free Operation
• Write Ability
• Security
• No need for intrinsic energy source
• Adaptability
• Noncontact, non-line of sight nature of technology
Summary
• RFID will rapidly expand as the cost of tag
will reduce over time.
• Industry experts predict substantial growth in
material.
• RFID will be next technological wave for
automatic data capture industry
References
[1] 7th International IEEE conference on E-
Commerce Technology 2005
[2] The 2004 IEEE International Conference on
e-Technology, e-Commerce and e-Service
(EEE-04)
[3] Klaus Finkenzeller, RFID handbook, John
Wiley and Sons, 2001
[4] Materials from Internet
RFID RADIO FREQUENCY IDENTIFICATION ..PPT

More Related Content

Similar to RFID RADIO FREQUENCY IDENTIFICATION ..PPT

Similar to RFID RADIO FREQUENCY IDENTIFICATION ..PPT (20)

RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
 
13253751 pss7
13253751 pss713253751 pss7
13253751 pss7
 
14216213 pss7
14216213 pss714216213 pss7
14216213 pss7
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
15220737 pss7-ans
15220737 pss7-ans15220737 pss7-ans
15220737 pss7-ans
 
13251503 pss7
13251503 pss713251503 pss7
13251503 pss7
 
13212907 pss7
13212907 pss713212907 pss7
13212907 pss7
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
 
wireless technology
wireless technologywireless technology
wireless technology
 
Gps
GpsGps
Gps
 
Gps
GpsGps
Gps
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar Topic
 
RFID
RFIDRFID
RFID
 
ZKK Sdn Bhd
ZKK Sdn BhdZKK Sdn Bhd
ZKK Sdn Bhd
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

RFID RADIO FREQUENCY IDENTIFICATION ..PPT

  • 1.
  • 3. Introduction • Works on the principle of bi-directional radio frequency communication. • An Alternative for barcode and optical technologies. • Automatic Identification.
  • 4. Object • To carry data in suitable transponder (Tag) and to retrieve the data by machine readable means satisfy particular application need. • Communicating the data between the tag and reader
  • 5. What is RFID? • Stands for Radio Frequency Identification • Uses radio waves for identification • One form of Automatic Identification • Provides unique identification an object.
  • 6. RFID – What is it? • Radio Frequency Identification Device • Holds a small amount of unique data – a serial number or other unique attribute of the item • The data can be read from a distance – no contact or even line of sight necessary
  • 7. Working of RFID A RFID system has three parts: • A transponder – the radio frequency tag- that has been programmed with information. • A scanning antenna • A transceiver with a decoder to interpret the data
  • 10. Modulation • The process of superimposing the data up on a carrier wave for its transfer between the communicating components through the separating medium- air. • Amplitude shift keying - ASK • Frequency shift keying - FSK • Phase shift keying - PSK
  • 11. Encoding • The various encoding algorithm methods select on the basis of • Cost of implementation • Band width
  • 12. Wireless communication • The data communication is wireless and the types of RFID based on communication pattern are • Inductive coupling • Propagation Coupling.
  • 13. Inductive coupling • Operate on the principle of resonance. • Inductive coupled TAGS are passive. • Single micro chip and large area coil function as antenna. • Operate at low and medium frequencies.
  • 16. Propagation Coupling • It use electric field propagation properties of radio signal to convey energy and data to TAG and data from the TAG. • Propagation coupled TAGS may be either passive ( no battery) or active ( battery powered). • TAGS can be programmed by the reader. • Used at high frequencies and increased range.
  • 18.
  • 19. Carrier frequency • The radio frequency communication channels is on the basis of frequency allocation and is generally controlled by govt. with different part of the electromagnetic spectrum being assigned to different purpose. • For RFID, frequency ranges are generally classified as Low, Medium and High.
  • 20. Data transfer rate and bandwidth • The rate of data transfer between the TAG and READER is influenced by the frequency of carrier wave used to carry the data . • The higher the frequency, higher the data transfer rate. • The bandwidth available within the frequency spectrum needs to be at least twice the bit rate required for the application.
  • 21. Frequency Bands Frequency Band Characteristic s Typical Application Low 100-500 KHz Inter mediate 10-15 MHz High 850-950 MHz 2.4-5.8 GHz Short to medium read range, low reading speed Short to medium read range, potentially inexpensive, medium reading speed Long read range, line of site required, expensive Access control Animal identification Inventory control Access control Smart Cards Rail road car monitoring, toll collection systems
  • 22. Transponder / TAG • Derived from Transmitter / Responder. • It responds to a transmitted request for data, by the READER . • They are fabricated as low power integrated circuits suitable data transfer and power generation ( for passive TAG ) • The TAGS are distinguished entirely by the manner in which the device derives its power.
  • 23. Tag is a device used to transmit information such as a serial number to the reader in a contact less manner Classified as : Passive – energy from reader Active - battery Semi-passive – battery and energy from reader RFID Tag
  • 24. Types of RF Tags • Active Tags • Passive Tags • Semi Passive RF Tags • The first function of the reader is to activate the TAG in the reading volume by creating an electromagnetic field.
  • 25. Active RFID Tags • Battery Powered tags • More expensive • Shorter life span
  • 26. Passive RFID Tags • Tag contains antenna and a small data chip • Tag is powered by the electromagnetic field generated in doorways, reflecting back a weak signal containing data
  • 27. RFID Tag Attributes Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using RF from reader Tag Battery Yes No Availability of Power Continuous Only in field of reader Required signal strength to Tag Very Low Very High Range Up to 100m Up to 3-5m, usually less
  • 28. Range and Power Levels of RFID The range that can be achieved in an RFID system is essentially determined by: • The power available at the reader/interrogator to communicate with the tag(s) • The power available within the tag to respond • The environmental condition and structures, the former being more significant at higher frequencies including signal to noise ratio.
  • 29. How far can a passive tag be read? Assume distance limited by power available to run the tag’s circuits.   meters in distance MHz) (915 frequency meters/s 10 3 (meters) wavelength dBi) (1 gain antenna tag dBi) (6 gain antenna reader watt) (1 power nsmit reader tra needed) W (100 tag to available power 4 8 2 2 2           r f x c f c G G P P r G G P P T R R T T R R T    
  • 31. EPC Code • 613.23000.123456.123456789 (96 bits) • Header – defines data type (8 bits) • EPC Manager – describes originator of EPC (Product manufacturer) (34 bits) • Object Class - Could describe the product type (20 Bits) • Serial Number – Unique ID for that product item (34 Bits)
  • 32. Supply Chain – Global Vision
  • 33. RFID Uses • Retail & Distribution • Contact less Payment • Keyless Entry • Livestock Tagging • Pharmaceuticals • Logistics Assets (containers, trailers) • Pet Identification
  • 34. Animal Identification Standards • International standard 134.2 kHz – ISO 11784: “Radio-frequency identification of animals” – code structure – ISO 11785: “Radio-frequency identification of animals” – Technical concept – ISO 14223: “Radio-frequency identification of animals” – Advanced transponders • U.S. standard 125 kHz • At these frequencies the RF can penetrate mud, blood, and water
  • 35. RFID Security and Privacy Threats • Security threats to the RFID system • Privacy threats by the RFID system
  • 36. Security Threats to RFID • A competitor or thief performs an unauthorized inventory of a store by scanning tags with an unauthorized reader to determine the types and quantities of items leading to information disclosure. • An attacker modifies the EPC number on tags , tampering data, in supply chain disrupting business operations and causing a loss of revenue. • An attacker modifies a high-priced item’s EPC number to be the EPC number of a lower cost item.
  • 37. Privacy Threats by RFID • A bomb in a restaurant explodes when there are five or more Americans with RFID-enabled passports detected. • A fixed reader at any retail counter could identify the tags of a person and show the similar products on the nearby screen to a person to provide individualized marketing. • A sufficiently powerful directed reader reads tags in your house or car.
  • 38. EPC vs. UPC (Barcodes) • Both are forms of Automatic identification technologies • Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do not • UPC require optical reader to read whereas EPC reader reads via radio waves • EPC tags possess a memory and can be written while UPC do not • EPC tags cost 5 cents, UPC tags cost 1/10 cent
  • 39. Advantages of RFID RFID systems offer a number of advantages over current ID systems such as barcodes or magnetic cards. These include; • Hands Free Operation • Write Ability • Security • No need for intrinsic energy source • Adaptability • Noncontact, non-line of sight nature of technology
  • 40. Summary • RFID will rapidly expand as the cost of tag will reduce over time. • Industry experts predict substantial growth in material. • RFID will be next technological wave for automatic data capture industry
  • 41. References [1] 7th International IEEE conference on E- Commerce Technology 2005 [2] The 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE-04) [3] Klaus Finkenzeller, RFID handbook, John Wiley and Sons, 2001 [4] Materials from Internet