Professional Documents
Culture Documents
RFID Technology
RFID Technology
An Introduction to
RFID Technology
RFID is at a critical price point that could enable its large-scale adoption.
What strengths are pushing it forward? What technical challenges and
privacy concerns must we still address?
I
n recent years, radio frequency identifica- low-cost or provide enough added value for an
tion technology has moved from obscurity organization to recover the cost elsewhere. RFID
into mainstream applications that help isn’t as cheap as traditional labeling technologies,
speed the handling of manufactured goods but it does offer added value and is now at a crit-
and materials. RFID enables identification ical price point that could enable its large-scale
from a distance, and unlike earlier bar-code tech- adoption for managing consumer retail goods.
nology (see the sidebar), it does so without requir- Here I introduce the principles of RFID, discuss
ing a line of sight.1 RFID tags (see figure 1) sup- its primary technologies and applications, and
port a larger set of unique IDs than bar codes and review the challenges organizations will face in
can incorporate additional data deploying this technology.
Roy Want such as manufacturer, product
Intel Research type, and even measure envi- RFID principles
ronmental factors such as tem- Many types of RFID exist, but at the highest
perature. Furthermore, RFID level, we can divide RFID devices into two classes:
systems can discern many different tags located in active and passive. Active tags require a power
the same general area without human assistance. source—they’re either connected to a powered
In contrast, consider a supermarket checkout infrastructure or use energy stored in an inte-
counter, where you must orient each bar-coded grated battery. In the latter case, a tag’s lifetime is
item toward a reader before scanning it. limited by the stored energy, balanced against the
So why has it taken over 50 years for this tech- number of read operations the device must
nology to become mainstream? The primary rea- undergo. One example of an active tag is the
son is cost. For electronic identification tech- transponder attached to an aircraft that identi-
nologies to compete with the rock-bottom pricing fies its national origin. Another example is a
of printed symbols, they must either be equally LoJack device attached to a car, which incorpo-
rates cellular technology and a GPS to locate the
car if stolen.
However, batteries make the cost, size, and life-
About the Review Process time of active tags impractical for the retail trade.
Passive RFID is of interest because the tags don’t
This article was reviewed and accepted before Roy Want became IEEE require batteries or maintenance. The tags also
Pervasive Computing’s editor in chief. It went through our standard peer- have an indefinite operational life and are small
review process and was accepted 28 Nov. 2005. —M. Satyanarayanan enough to fit into a practical adhesive label. A pas-
sive tag consists of three parts: an antenna, a semi-
1536-1268/06/$20.00 © 2006 IEEE ■ Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25
RFID TECHNOLOGY
Figure 2. RFID tags based on near-field coupling: (a) a 128 kHz Trovan tag, encapsulated in a small glass vial that’s approximately
1 cm long and (b) a 13.56 MHz Tiris tag (www.ti.com/rfid), which has a laminar plastic substrate (approximately 5 5 cm) with
adhesive for easy attachment to goods.
Near-field RFID and a tag. Thus, if the tag’s electronics reader coil. The magnetic field drops off
Faraday’s principle of magnetic induc- applies a load to its own antenna coil and at a factor of 1/r3, where r is the sepa-
tion is the basis of near-field coupling varies it over time, a signal can be encoded ration of the tag and reader, along a cen-
between a reader and tag. A reader passes as tiny variations in the magnetic field ter line perpendicular to the coil’s plane.
a large alternating current through a strength representing the tag’s ID. The So, as applications require more ID bits
reading coil, resulting in an alternating reader can then recover this signal by as well as discrimination between mul-
magnetic field in its locality. If you place monitoring the change in current through tiple tags in the same locality for a fixed
a tag that incorporates a smaller coil (see the reader coil. A variety of modulation read time, each tag requires a higher
figure 3) in this field, an alternating volt- encodings are possible depending on the data rate and thus a higher operating
age will appear across it. If this voltage is number of ID bits required, the data frequency. These design pressures have
rectified and coupled to a capacitor, a transfer rate, and additional redundancy led to new passive RFID designs based
reservoir of charge accumulates, which bits placed in the code to remove errors on far-field communication.
you can then use to power the tag chip. resulting from noise in the communica-
Tags that use near-field coupling send tion channel. Far-field RFID
data back to the reader using load mod- Near-field coupling is the most RFID tags based on far-field emissions
ulation. Because any current drawn from straightforward approach for imple- (see figure 4) capture EM waves propa-
the tag coil will give rise to its own small menting a passive RFID system. This is gating from a dipole antenna attached
magnetic field—which will oppose the why it was the first approach taken and to the reader. A smaller dipole antenna in
reader’s field—the reader coil can detect has resulted in many subsequent stan- the tag receives this energy as an alter-
this as a small increase in current flow- dards, such as ISO 15693 and 14443, nating potential difference that appears
ing through it. This current is propor- and a variety of proprietary solutions. across the arms of the dipole. A diode
tional to the load applied to the tag’s coil However, near-field communication has can rectify this potential and link it to a
(hence load modulation). some physical limitations. capacitor, which will result in an accu-
This is the same principle used in The range for which we can use mag- mulation of energy in order to power its
power transformers found in most homes netic induction approximates to c/2πf, electronics. However, unlike the induc-
today—although usually a transformer’s where c is a constant (the speed of light) tive designs, the tags are beyond the
primary and secondary coil are wound and f is the frequency. Thus, as the fre- range of the reader’s near field, and infor-
closely together to ensure efficient power quency of operation increases, the dis- mation can’t be transmitted back to the
transfer. However, as the magnetic field tance over which near-field coupling reader using load modulation.
extends beyond the primary coil, a sec- can operate decreases. A further limi- The technique designers use for com-
ondary coil can still acquire some of the tation is the energy available for induc- mercial far-field RFID tags is back scat-
energy at a distance, similar to a reader tion as a function of distance from the tering (see figure 5). If they design an
Magnetic field
affected by tag data
Data via
Power and data changes
in field
strength
(if tag supports RFID
write) tag
RFID
reader Binary tag ID
Glass or plastic
encapsulation
Coil
c/2πƒ
Near-field region Far-field region
Propagating electromagnetic
Alternating magnetic field in
waves
the near-field region
Figure 3. Near-field power/communication mechanism for RFID tags operating at less than 100 MHz.
antenna with precise dimensions, it can which can then detect the energy using a antenna for this purpose by placing a
be tuned to a particular frequency and sensitive radio receiver. By changing the transistor across its dipole and then turn-
absorb most of the energy that reaches it antenna’s impedance over time, the tag ing it partially on and off. As a rough
at that frequency. However, if an imped- can reflect back more or less of the design guide, tags that use far-field prin-
ance mismatch occurs at this frequency, incoming signal in a pattern that encodes ciples operate at greater than 100 MHz
the antenna will reflect back some of the the tag’s ID. typically in the ultra high-frequency
energy (as tiny waves) toward the reader, In practice, you can detune a tag’s (UHF) band (such as 2.45 GHz); below
Figure 4. RFID tags based on far-field coupling: (a) a 900-MHz Alien tag (16 1 cm) and (b) a 2.45-GHz Alien tag (8 5 cm).
(a) (b)
Data modulated
on signal reflected
by tag
RFID
reader
Binary tag ID
Glass or plastic
Data (if tag supports data write) encapsulation
Figure 5. Far-field power/communication mechanism for RFID tags operating at greater than 100 MHz.
this frequency is the domain of RFID improved sensitivity so they can now product codes. This isn’t necessary for
based on near-field coupling. detect signals, for a reasonable cost, with basic inventory control, but it has impli-
A far-field system’s range is limited by power levels on the order of –100 dBm cations for tracing manufacturing faults
the amount of energy that reaches the in the 2.4-GHz band. A typical far-field and stolen goods and for detecting
tag from the reader and by how sensi- reader can successfully interrogate tags forgery. It also offers the more contro-
tive the reader’s radio receiver is to the 3 m away, and some RFID companies versial post-sale marketing opportuni-
reflected signal. The actual return signal claim their products have read ranges of ties, enabling direct marketing based on
is very small, because it’s the result of up to 6 m. prior purchases. (I discuss the related pri-
two attenuations, each based on an EPCglobal’s work was key to pro- vacy concerns later on.)
inverse square law—the first attenuation moting the design of UHF tags (see
occurs as EM waves radiate from the www.epcglobalinc.org), which has been Adopting a standard: The
reader to the tag, and the second when the basis of RFID trials at both Wal- Near-Field Communication
reflected waves travel back from the tag Mart and Tesco (see the sidebar for more Forum
to the reader. Thus the returning energy information about the trials). EPCglobal An important recent development
is 1/r4 (again, r is the separation of the was originally the MIT Auto-ID Center, opens up new possibilities for more
tag and reader). a nonprofit organization set up by the widespread RFID applications. Since
Fortunately, thanks to Moore’s law MIT Media Lab. The center later divided 2002, Philips has pioneered an open
and the shrinking feature size of semi- into Auto-ID labs, still part of MIT, and standard through EMCA International,
conductor manufacturing, the energy EPCglobal, a commercial company. This resulting in the Near-Field Communi-
required to power a tag at a given fre- company has defined an extensible range cation Forum (www.nfc-forum.org). The
quency continues to decrease (currently of tag standards, but its Class-1 Gener- forum sets out to integrate active signal-
as low as a few microwatts). So, with ation-1 96-bit tag is the one receiving the ing between mobile devices using near-
modern semiconductors, we can design most attention of late. This tag can label field coupling, and it uses an approach
tags that can be read at increasingly over 50 quadrillion (50 1015) items, that is compatible with reading existing
greater distances than were possible a making it possible to uniquely label passive RFID products. The new NFC
few years ago. Furthermore, inexpensive every manufactured item for the fore- standard aims to provide a mechanism
radio receivers have been developed with seeable future—not just using generic by which wireless mobile devices can
communicate with peer devices in the beginning of the interrogation signal and
immediate locality (up to 20 cm), rather the tag’s response. But a collision might
than rely on the discovery mechanisms still occur, so the reader must initiate sev-
of popular short-range radio standards. eral rounds of interrogation until it hears
These standards, such as Bluetooth and all the tags in that area with high prob-
Wi-Fi, have unpredictable propagation ability. The number of rounds used,
characteristics and might form associa- number of tags present, and duration of
tions with devices that aren’t local. each tag reply can be used to calculate
The NFC standard aims to streamline the probability of all tags being detected.
the discovery process by passing wire- By modifying the number of rounds, we
less Media Access Control addresses and can adjust the probability to suit typical
channel-encryption keys between radios Figure 6. The Nokia 3200 cell phone operation conditions. We can further
through a near-field coupling side chan- features a Near Field Communications enhance this protocol by preventing tags
nel, which, when limited to 20 cm, lets reader. From the front, it looks like an that have already been heard by the
users enforce their own physical security ordinary cell phone, but on the back, you reader from responding on the next
for encryption key exchange. The forum can see the reader coil molded into the round until the current interrogation
deliberately designed the NFC standard housing. (figure courtesy of Nokia) cycle ends.
to be compatible with ISO 15693 RFID Using another anticollision approach,
tags operating in the 13.56-MHz band. the EPCglobal class-1 standard imple-
It also allows mobile devices to read this field communication techniques, work- ments an algorithm based on a Query
already popular tag standard and to be ing at UHF frequencies. Unfortunately, Tree protocol. The reader starts an inter-
compatible with the FeliCa and Mifare NFC and EPCglobal standards are fun- rogation cycle by asking which of the
smart card standards, widely used in damentally incompatible. ID space’s top branches (modeled as a
Japan. binary tree) contain tags. The algorithm
In 2004, Nokia announced the 3200 Reading colocated tags recursively repeats for each subtree
GSM cell phone, which incorporates an One commercial objective of RFID branch, but if a particular subtree doesn’t
NFC reader (see figure 6). Although the systems is to read, and charge for, all generate a reply, the reader won’t con-
company hasn’t published an extensive tagged goods in a standard supermarket sider any of its branches and subtrees in
list of potential applications, the phone shopping cart as it is pushed through an the remaining search space. In other
can make electronic payments (similar instrumented checkout aisle. Such a sys- words, that branch is pruned from the
to a smart card) and place calls based on tem would speed up the checkout binary tree. After a short time, all tags
the RFID tags it encounters. For exam- process and reduce operational costs. present will respond to the reader in
ple, you could place your phone near an Even if the RF reading environment for depth-first-search order. EPCglobal sys-
RFID tag attached to a taxi-stand sign, an RFID tag is ideal, it’s still an engi- tems using this anticollision algorithm
and your phone would call the taxi com- neering challenge to support multiple can potentially read 500 colocated tags
pany’s coordinator to request a taxi at colocated tags. Consider two tags situ- per second.
that location.2 This model offers a close ated next to each other and equidistant
link between the virtual representations from the reader. On hearing the reader’s Enabling a distributed memory
within a computer’s memory, such as the signal, both would acquire enough power revolution
positions of taxis being tracked by the to turn on and transmit a response back Another distinguishing feature of
dispatch computer, and the physical to the reader, resulting in a collision. The modern RFID is that tags can contain far
world, such as signs and people with cell data from both tags would be superim- more information than a simple ID.
phones. Furthermore, it is a key enabling posed and garbled. They can incorporate additional read-
technology for implementing Mark In CSMA (carrier sense multiple only or read-write memory, which a
Weiser’s vision of ubiquitous and perva- access)-based communication networks, reader can then further interact with.
sive computing.3 such as Ethernet, this is an old probl- Read-only memory might contain
A complication for broad adoption of em that an anticollision protocol can additional product details that don’t
the NFC standard is that state-of-the-art resolve. In its simplest form, the protocol need to be read every time a tag is inter-
EPCglobal RFID tags are based on far- inserts a random delay between the rogated but are available when required.
inventory stock checks, because employ- advocates argued that covert readers alientechnology.com) could supply RFID
ees can quickly catalog the contents of might steal the information, enabling tags for 12.9 cents each in quantities of
various racks and bins, even when cus- identity theft.7 The passport scheme is 1 million.)
tomers have mixed up the clothes. Also, still going forward, but the government Market analysts can’t agree on the
employees can perform fast periodic is modifying its implementation to price tipping point—will it be a 10-cent,
stock checks to detect thefts, which isn’t address public concerns. 5-cent, or 1-cent tag? Consider a 50-cent
usually an easy task. EPCglobal has addressed some of candy bar—if you replace a bar code
However, if the store fails to remove a these concerns by designing a kill switch (which costs nothing because you can
tag at the point of purchase, it’s possible in their tags that lets vendors perma- print it on the wrapper) with a 10-cent
to track customers every time they wear nently disable a tag at the point of sale. RFID tag, then you might not have any
remaining profit. Consequently, RFID
The press and civil libertarians have raised some tags are likely to have their first deploy-
ments with high-profit items. Of course,
genuine concerns, so it’s important that we when adoption does take hold, it could
rapidly accelerate as mass production
proceed cautiously to incorporate safeguards drives down prices.
Another important issue is design. We
that address the potential for RFID misuse. still need to engineer tags and readers so
that they guarantee highly reliable iden-
the tagged clothing. Vendors—including Vendors then wouldn’t have to remove tification. The solutions must be resilient
vendors other than the original seller— the tag itself, which might be woven into to all tag orientations, packaging mate-
could learn where the customer shops to a garment and (deliberately) difficult to rials, and checkout configurations found
better target the person with direct-mar- remove. Of course, concerns still exist in typical stores. Improved tag antenna
keting techniques. Even more troubling, that vendors might become complacent design can solve some of these issues. Tag
a criminal might track consumers, judg- and that not all stores would be vigilant readers can also be designed to exhibit
ing their wealth based on purchases, pos- about disabling the tags. An insidious antenna diversity by multiplexing their
sibly targeting them for theft. number of tags could still become part signals between several antenna modules
Although the potential for RFID mis- of our daily activities, which could later mounted in orthogonal orientations, or
use is high, undesirable scenarios can be be exploited for criminal purposes. by coordinating multiple readers. In the
turned into potentially useful ones. For RSA’s proposed solution is the concept latter case, we must avoid the reader col-
example, if clothes were tagged, wash- of a blocker tag8—a modified RFID tag lision problem,9 as interrogation signals
ing machine manufacturers could inte- that takes advantage of EPCglobal’s anti- will interfere with each other. A strict
grate RFID readers into the doors of collision protocol. The blocker tag time division scheme would allow mul-
their machines, making them aware of responds to each interrogation such that tiple readers to be deployed.
all items selected for washing. The it appears that all possible tag IDs are The final issue is acceptance. The press
machines could then choose the appro- present, so the reader has no idea what and civil libertarians have raised some
priate washing cycle and possibly warn tags are actually nearby. Perhaps having genuine concerns, so it’s important that
you about incompatible garments that simple countermeasures to prevent tag we proceed cautiously to incorporate safe-
might result in color runs. misuse is exactly what we need to over- guards that address the potential for RFID
The current focus, however, remains come privacy concerns. misuse. In 2003, Simson Garfinkel pro-
on the potential for misuse. A growing posed “An RFID Bill of Rights,”10 which
cloud of public and media concern forced Remaining challenges laid down a set of guidelines that retail-
Benetton, a well-known clothing store, Three main issues are holding back ers should adhere to in order to protect
to hastily retreat after it announced plans RFID’s widespread adoption, the first of citizens’ rights. Currently, no laws regu-
to use RFID tags in its stores.6 Concern which is cost. Although RFID tags are late tag use, and legislation might be
also surfaced when the US government now potentially available at prices as low required to assure the public. In the mean-
announced plans to put RFID tags into as 13 cents each, this is still much more time, early adopters such as Wal-Mart
passports to make them easier to check at expensive than printed labels. (As of Sep- and Tesco could help defuse concerns by
borders and harder to forge. Privacy tember 2005, Alien Technologies (www. publicly adopting a similar proposal.
D
espite these challenges, RFID Roy Want is a principal engineer at Intel Research in Santa Clara, California, and
continues to make inroads leader of the Ubiquity Strategic Research Project. His research interests include
proactive computing, ubiquitous computing, wireless protocols, hardware design,
into inventory control sys- embedded systems, distributed systems, automatic identification, and micro-
tems, and it’s only a matter of electromechanical systems. He received his PhD for his work on “reliable manage-
time before the component costs fall low ment of voice in a distributed system” from Cambridge University. He is a Fellow of
the IEEE and ACM. Contact him at Intel Corp., 2200 Mission College Blvd., Santa
enough to make RFID an attractive eco- Clara, CA 95052; roy.want@intel.com.
nomic proposition. Furthermore, exten-
sive engineering efforts are under way to
wired.com/news/wireless/0,1382,58385, 9. D.W. Engels and S.E. Sarma, “The Reader
overcome current technical limitations 00.html. Collision Problem,” white paper MIT-
and to build accurate and reliable tag- AUTOID-WH-007, Auto-ID Center, Nov.
reading systems. We might also start to 7. R. Singel, “American Passports to Get 2001.
Chipped,” Wired News, 19 Oct. 2004;
see economic pressure from the larger www.wired.com/news/privacy/0,1848, 10. S. Garfinkel, “An RFID Bill of Rights,”
distributors to modify product packag- 65412,00.html. Technology Rev., Oct. 2002, p. 35.
ing and its associated materials to more
8. A. Juels, R.L. Rivest, and M. Szydlo, “The
effectively integrate RFID. Finally, at this Blocker Tag: Selective Blocking of RFID
delicate stage, while major corporations Tags for Consumer Privacy,” Proc. 8th For more information on this or any other comput-
are trialing the technology, media reac- ACM Conf. Computer and Comm. Secu- ing topic, please visit our Digital Library at www.
rity, ACM Press, 2003, pp. 103–111. computer.org/publications/dlib.
tion and outspoken privacy groups can
influence the rules by which we use the
technology. Given that legislation is now
in place among most of the developed
countries to protect our personal infor- D O N’T R U N T H E R I S K .
mation held in computers at banks and
other organizations, there is no reason
why RFID data management can’t
acquire a similar code of conduct.
RFID’s potential benefits are large,
BE SECURE.
and we’re sure to see many novel appli-
cations in the future—some of which we
can’t even begin to imagine.
REFERENCES
1. K. Finkelzeller, The RFID Handbook, 2nd Ensure that your networks operate safely
ed., John Wiley & Sons, 2003. and provide critical services even in the face
of attacks. Develop lasting security solutions,
2. R. Want et al., “Bridging Real and Virtual with this peer-reviewed publication.
Worlds with Electronic Tags,” Proc. ACM
SIGCHI, ACM Press, 1999, pp. 370–377.
Top security professionals in the field share
3. M. Weiser, “The Computer for the 21st information you can rely on:
Century,” Scientific Am., vol. 265, no. 3,
1991, pp. 94–104.
Wireless Security • Securing the Enterprise • Designing
4. T. Kindberg et al., “People, Places, and
Things: Web Presence of the Real World,” for Security Infrastructure Security • Privacy Issues
ACM Mobile Networks & Applications J., • Legal Issues • Cybercrime • Digital Rights Management •
2002, pp. 365–376. Intellectual Property Protection and Piracy • The Security
Profession • Education
5. R. Want, “Enabling Ubiquitous Sensing
with RFID,” Computer, vol. 37, no. 4,
2004, pp. 84–86. Order your subscription today.