You are on page 1of 108

RFID:TechnologyandApplications

SridharIyer

IITBombay

sri@it.iitb.ac.in
www.it.iitb.ac.in/~sri
Outline
OverviewofRFID
ReaderTag;Potentialapplications

RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards

RFIDBusinessAspects
SecurityandPrivacy

Conclusion
RFID2005 IITBombay 2
Product Marketing 75 years ago

You can have


any color,
as long as its
black !

RFID2005 IITBombay 3
Product Marketing - Today

Add
consumer
flexibility,
courtesy of
robotics,
computers

Customer
window into
final stage of
manufacturin
g
5

RFID2005
IITBombay 4
Effectonmanufacturing
Needtoensureerrorfree,customassembly
Needinventoryofcomponentsforthevarious
customizationoptions

CriticalIssues
Assemblyprocesscontrol
Inventorymanagement
Supplychainintegration
Customerinsight

Onesolution:RFID
RFID2005 IITBombay 5
WhatisRFID?
RFID=RadioFrequencyIDentification.
AnADC(AutomatedDataCollection)technology
that:
usesradiofrequencywavestotransferdatabetween
areaderandamovableitemtoidentify,categorize,
track..
Isfastanddoesnotrequirephysicalsightorcontact
betweenreader/scannerandthetaggeditem.
Performstheoperationusinglowcostcomponents.
Attemptstoprovideuniqueidentificationandbackend
integrationthatallowsforwiderangeofapplications.
OtherADCtechnologies:Barcodes,OCR.
RFID2005 IITBombay 6
RFIDsystemcomponents

Ethernet
RFID
Reader

RFID Tag RF Antenna Network Workstation

RFID2005 IITBombay 7
RFID systems: logical view
11
12
Product
et ONS Information
ern Internet
t Server (PMLFormat)
In

Antenna
RF
Writedata Itemswith Reader Read Application
Transaction
toRFtags RFTags Manager Systems
DataStore
Antenna
Trading
Partner
EDI/ Systems
1 2 3 4 5 6 7 8 XML

Tag/Item
10
Relationship
Database 9

Other
Tag Interfaces RFID Middleware
Systems
RFID2005 IITBombay 8
RFIDtags:Smartlabels
A paper label
with RFID inside

an antenna,
printed, etched
or stamped ...

and a chip on a substrate


attached to it e.g. a plastic
foil ...

RFID2005 IITBombay 9
Source:www.rfidprivacy.org
SomeRFIDtags

RFID2005 IITBombay 10
Source:www.rfidprivacy.org
RFIDtags
Tagscanbeattachedtoalmostanything:
Items,casesorpalletsofproducts,highvaluegoods
vehicles,assets,livestockorpersonnel
PassiveTags
DonotrequirepowerDrawsfromInterrogatorField
Lowerstoragecapacities(fewbitsto1KB)
Shorterreadranges(4inchesto15feet)
UsuallyWriteOnceReadMany/ReadOnlytags
Costaround25centstofewdollars
ActiveTags
Batterypowered
Higherstoragecapacities(512KB)
Longerreadrange(300feet)
TypicallycanberewrittenbyRFInterrogators
Costaround50to250dollars
RFID2005 IITBombay 11
Tagblockdiagram

Antenn
a
Power
Supply Memory
Control Cells
Tx Logic
Modulator (Finite State
Rx machine)
Demodulato
r

Tag Integrated Circuit (IC)

RFID2005 IITBombay 12
RFIDtagmemory

Readonlytags
TagIDisassignedatthefactoryduringmanufacturing
Canneverbechanged
Noadditionaldatacanbeassignedtothetag
Writeonce,readmany(WORM)tags
Datawrittenonce,e.g.,duringpackingormanufacturing
Tagislockedoncedataiswritten
SimilartoacompactdiscorDVD
Read/Write
Tagdatacanbechangedovertime
Partorallofthedatasectioncanbelocked

RFID2005 IITBombay 13
RFIDreaders
Readerfunctions:
Remotelypowertags
Establishabidirectionaldatalink
Inventorytags,filterresults
Communicatewithnetworkedserver(s)
Canread100300tagspersecond
Readers(interrogators)canbeatafixedpointsuchas
Entrance/exit
Pointofsale
Readerscanalsobemobile/handheld

RFID2005 IITBombay 14
SomeRFIDreaders

RFID2005 IITBombay 15
Source:www.buyrfid.org
Readeranatomy

Digital
Signal
Processor
(DSP)

Network
Processor Power
Supply

915MHz 13.56MH
RFID2005 Radio
IITBombay z 16
RFIDapplicationpoints

AssemblyLine

Wireless

HandheldApplications

BillofLading
MaterialTracking
ShippingPortalsIITBombay
RFID2005 17
RFIDapplications
ManufacturingandProcessing
Inventoryandproductionprocessmonitoring
Warehouseorderfulfillment
SupplyChainManagement
Inventorytrackingsystems
Logisticsmanagement
Retail
Inventorycontrolandcustomerinsight
Autocheckoutwithreverselogistics
Security
Accesscontrol
CounterfeitingandTheftcontrol/prevention
LocationTracking
Trafficmovementcontrolandparkingmanagement
Wildlife/Livestockmonitoringandtracking
RFID2005 IITBombay 18
Smartgroceries

AddanRFIDtagtoall
itemsinthegrocery.

Asthecartleavesthe
store,itpassesthrough
anRFIDtransceiver.

Thecartisrungupin
seconds.

RFID2005 IITBombay 19
Smartcabinet
Readerantennasplacedundereachshelf 1. Taggeditemisremoved
fromorplacedin
SmartCabinet

1. SmartCabinet
periodically
interrogatestoassess
inventory

1. Server/Databaseis
updatedtoreflectitems
disposition

1. Designatedindividuals
arenotifiedregarding
Passive itemsthatneed
read/writetags attention(cabinetand
affixedtocaps shelflocation,action
ofcontainers required)

RFID2005 IITBombay 20
Source:HowStuffWorks
Smartfridge

Recognizeswhatsbeenputinit
Recognizeswhenthingsareremoved
Createsautomaticshoppinglists
Notifiesyouwhenthingsarepasttheirexpiration

Showsyoutherecipesthatmostcloselymatch
whatisavailable

RFID2005 IITBombay 21
Smartgroceriesenhanced

Trackproducts
throughtheirentire
lifetime.

RFID2005 IITBombay 22
Source:HowStuffWorks
Somemoresmartapplications
Smartappliances:
Closetsthatadviceonstyledependingonclothesavailable.
Ovensthatknowrecipestocookprepackagedfood.
Smartproducts:
Clothing,appliances,CDs,etc.taggedforstorereturns.
Smartpaper:
Airlineticketsthatindicateyourlocationintheairport.
Smartcurrency:
Anticounterfeitingandtracking.

Smartpeople??

RFID2005 IITBombay 23
RFIDadvantagesoverbarcodes

Nolineofsightrequiredforreading
Multipleitemscanbereadwithasinglescan

Eachtagcancarryalotofdata(read/write)
Individualitemsidentifiedandnotjustthecategory

Passivetagshaveavirtuallyunlimitedlifetime
Activetagscanbereadfromgreatdistances

Canbecombinedwithbarcodetechnology

RFID2005 IITBombay 24
Outline
OverviewofRFID
ReaderTag;Potentialapplications

RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards

RFIDBusinessAspects
SecurityandPrivacy

Conclusion
RFID2005 IITBombay 25
RFIDcommunications

Reader
Antenna
Power from RF field
Reader->Tag Commands
Reader
Tag->Reader Responses

Tags

RFID Communication
Channel

RFID2005 IITBombay 26
RFIDcommunication
HostmanagesReader(s)andissuesCommands

ReaderandtagcommunicateviaRFsignal
Carriersignalgeneratedbythereader
Carriersignalsentoutthroughtheantennas
Carriersignalhitstag(s)
Tagreceivesandmodifiescarriersignal
sendsbackmodulatedsignal(PassiveBackscatteralsoreferredto
asfielddisturbancedevice)
Antennasreceivethemodulatedsignalandsendthemtothe
Reader

Readerdecodesthedata
Resultsreturnedtothehostapplication
RFID2005 IITBombay 27
Antennafields:Inductivecoupling

ICormicroprocessor

Transceiver
RFID
TagReader
Tag
antenna

antenna

RFID2005 IITBombay 28
Antennafields:Propagationcoupling

ICormicroprocessor

Transceiver
RFID
TagReader
Tag
antenna

antenna

RFID2005 IITBombay 29
Operationalfrequencies
UHF Microwave
Frequency LF HF
868915 2.45GHz&
Ranges 125KHz 13.56MHz
MHz 5.8GHz
TypicalMax
Shortest Short Medium Longest
ReadRange 112 224 110 115
(PassiveTags)
Activetagswith
Generallypassive Activetagswith
integralbattery
Generallypassive tagsonly,using integralbatteryor
TagPower orpassivetags
tagsonly,using inductiveor passivetagsusing
Source inductivecoupling capacitive
usingcapacitive
capacitivestorage,
storage,
coupling Efieldcoupling
Efieldcoupling
DataRate Slower Moderate Fast Faster
Abilitytoread
near Better Moderate Poor Worse
metalorwet
surfaces
AccessControl&
Security
Identifyingwidgets HighwaytollTags
Librarybooks supplychain
through Identificationof
Laundry tracking
manufacturing privatevehicle
Applications processesorin
identification Highwaytoll
fleetsin/outofa
AccessControl Tags
harshenvironments yardorfacility
EmployeeIDs
Ranchanimal Assettracking
identification
EmployeeIDs


RFID2005 IITBombay 30
Reader>Tagpowertransfer
Reader
Tag
Antenna

Reader
Separation
distance d

Q: If a reader transmits Pr watts, how much power Pt


does the tag receive at a separation distance d?

A: It depends-
UHF (915MHz) : Far field propagation : Pt 1/d2
HF (13.56MHz) : Inductive coupling : Pt 1/d6
RFID2005 IITBombay 31
LimitingfactorsforpassiveRFID

1. Reader transmitter power Pr (Govt.


limited)
2. Reader receiver sensitivity Sr
3. Reader antenna gain Gr (Govt. limited)

4. Tag antenna gain Gt (Size limited)


5. Power required at tag Pt (Silicon process
limited)
6. Tag modulator efficiency Et

RFID2005 IITBombay 32
Implications

SincePt1/d2,doublingreadrangerequires4X
thetransmitterpower.
Largerantennascanhelp,butattheexpenseof
largerphysicalsizebecauseG{t,r}Area.
MoreadvancedCMOSprocesstechnologywill
helpbyreducingPt.

Atlargedistances,readersensitivitylimitations
dominate.

RFID2005 IITBombay 33
RFeffectsofcommonmaterials
Material Effect(s)onRFsignal
Cardboard Absorption(moisture)
Detuning(dielectric)
Conductiveliquids Absorption
(shampoo)
Plastics Detuning(dielectric)
Metals Reflection
Groupsofcans Complexeffects(lenses,
filters)
Reflection
Humanbody/animals Absorption,Detuning,
RFID2005 Reflection
IITBombay 34
Communicationprotocols
Listenbeforetalk
Mandatorylistentimeof>5msecbeforeeachtransmission

Max4secTXthenrelistenfor100msec
TransmissionfromotherReaders

865MHz
200KHz
867MHz

RFID2005 IITBombay 35
ETSIEN302208standard
Sharedoperationinband865.0868.0MHzattransmit
powersupto2WERP.
Operationin10subbandsof200kHz.
Powerlevelsof100mW,500mWand2WERP.

Mandatorylistenbeforetalkandlookbeforeleap.

865.0MHz 865.6MHz 867.6MHz 868.0MHz

100mW 2W 500mW
FT FT FT FT

LT LT LT LT

600kHz 600kHz 600kHz


865.5MHz 867.7MHz
865.1MHz 865.7MHz 867.5MHz 867.9MHz

RFID2005 IITBombay 36
Source:www.etsi.org
ReaderCollisionProblem
ReaderReaderInterference
ReaderTagInterference

RFID2005 IITBombay 37
ReaderCollisionandHiddenTerminal
Thepassivetagsarenotabletotakepartinthecollision
resolutionoravoidance,asinotherwirelesssystems

Consider:RTSCTSforhiddenterminalproblemin802.11
rfid:TisnotabletosendaCTSinresponsetoanRTSfromR

Incasemultiplereaders
trytoreadthesametag,
thetagcannotrespond
selectivelytoaparticular
reader

RFID2005 IITBombay 38
TDMAbasedsolution
Assigndifferenttimeslotsand/orfrequenciesto
nearbyreaders
Reducestographcoloringproblem(readersform
vertices)

Onlyreadertoreaderinterference
Assigndifferentoperatingfrequencies
Onlymultiplereadertotaginterference
Assigndifferenttimeslotsforoperation
Bothtypesofinterference
Firstallotdifferenttimeslots,thenfrequencies

RFID2005 IITBombay 39
Beaconbasedsolution
Areaderwhilereading
tag,periodicallysendsa
beacononthecontrol
channel

Assumptions
Separatecontrolchannel
betweenreaders
Therangeinthecontrol
channelissufficientfora
readertocommunicate
withallthepossible
readersthatmightinterfere
inthedatachannel

RFID2005 IITBombay 40
Beaconbasedsolution(contd.)

RFID2005 IITBombay 41
MultipleTags

Whenmultipletagsareinrangeofthereader:
Allthetagswillbeexcitedatthesametime.
Makesitverydifficulttodistinguishbetweenthetags.

Collisionavoidancemechanisms:
Probabilistic:
Tagsreturnatrandomtimes.
Deterministic:
Readersearchesforspecifictags.

RFID2005 IITBombay 42
TagCollisionProblem
Multipletagssimultaneouslyrespondtoquery
Resultsincollisionatthereader

Severalapproaches
Treealgorithm
Memorylessprotocol
Contactlessprotocol
Icodeprotocol

RFID2005 IITBombay 43
TreeAlgorithm

Readerqueriesfortags
Readerinformsincaseofcollisionandtags
generates0or1randomly
If0thentagretransmitsonnextquery
If1thentagbecomessilentandstartsincrementing
itscounter(whichisinitiallyzero)
Counterincrementedeverytimecollisionreported
anddecrementedeverytimeidentificationreported
Tagremainssilenttillitscounterbecomeszero

RFID2005 IITBombay 44
TreeAlgorithmExample
Readerinformstagsincaseofcollisionandtagsgenerate0or1
If0thentagretransmitsonnextquery,elsetagbecomessilentandstartsacounter.
Counterincrementedeverytimecollisionreportedanddecrementedotherwise.

RFID2005 IITBombay 45
TreeAlgorithmComplexity

TimeComplexityO(n)wherenisnumberof
tagstobeidentified
MessageComplexity
nisunknown(nlogn)
nisknown(n)
Overheads
Requiresrandomnumbergenerator
Requirescounter

RFID2005 IITBombay 46
MemorylessProtocol

Assumption:tagIDstoredinkbitbinarystring
Algorithm
Readerqueriesforprefixp
Incaseofcollisionqueriesforp0orp1
Timecomplexity
RunningtimeO(n)
WorstCasen*(k+2logn)
MessageComplexityk*(2.21logn+4.19)

RFID2005 IITBombay 47
MemorylessProtocolExample
Readerqueriesforprefixp
Incaseofcollision,readerqueriesforp0orp1
Example:considertagswithprefixes:00111,01010,01100,10101,
10110and10111

RFID2005 IITBombay 48
ContactlessProtocol

Assumption:tagIDstoredinkbitbinarystring
Algorithm
Readerqueriesfor(i)thbit
Readerinformsincaseofcollision
Tagswith(i)thbit0becomesilentandmaintaincounter
Tagswith(i)thbit1respondtonextqueryfor(i+1)thbit
TimecomplexityO(2k)
MessagecomplexityO(m(k+1)),wheremis
numberoftags

RFID2005 IITBombay 49
ContactlessProtocolExample
Readerqueriesfor(i)thbit
Readerinformsincaseofcollision
Tagswith(i)thbit0becomesilentandmaintaincounter
Tagswith(i)thbit1respondtonextqueryfor(i+1)thbit
Example:tagswithprefixes:01,10and11

RFID2005 IITBombay 50
ICodeProtocol

BasedonslottedALOHAprinciple
Algorithm
ReaderprovidestimeframewithNslots,Ncalculated
forestimatenoftags
Tagsrandomlychooseaslotandtransmittheir
information
Responsespossibleforeachslotare
Empty,notagtransmittedinthisslotc0
Singleresponse,identifyingthetagc1
Multipleresponses,collisionck

RFID2005 IITBombay 51
ICodeProtocol

Newestimateforn:lower
bound
lb(N,c0,c1,ck)=c1+2ck
Usingestimaten,Ncalculated
Nbecomesconstantaftersometime
UsingthisNcalculatenumberofreadcyclesstoidentifytagswithagivenlevelofaccuracy
Timecomplexityt0*(s+p)
t0istimeforonereadcycle
pnumberofreadcyclesforestimatingN
Messagecomplexityn*(s+p)

RFID2005 IITBombay 52
Outline
OverviewofRFID
ReaderTag;Potentialapplications

RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards

RFIDBusinessAspects
SecurityandPrivacy

Conclusion
RFID2005 IITBombay 53
Howmuchdata?
ConsiderasupermarketchainimplementingRFID:
12bytesEPC+ReaderID+Time=18bytespertag
Averagenumberoftagsinaneighborhoodstore=700,000
Datageneratedpersecond=12.6GB
Datageneratedperday=544TB
Assuming50storesinthechain,
datageneratedperday=2720TB

StanfordLinearAcceleratorCentergenerates500TB
RFID2005 IITBombay 54
RFIDmiddleware

RFID2005 IITBombay 55
Source:ForresterResearch:RFIDMiddleware
Middlewareframework:PINES
Data Collection & Device Management Engine
Device
Movementand
Management
DeviceEmulator
Engineand
Engine
UI

Layout Management Engine


Product
Layout Layout Event InformationStore
ManagementUI Store Store

EISData PML
Connectr
Server
Realtime
Decision QueryEngine
Support andUI
Action
Engine Rule
Notification Automated
Graphical
Engineand
UI
Dashboard Automatic Actuation
Actionable Engine
Rules

RFID2005 IITBombay 56
Source:PersistentSystems
Retailcasestudy:Enablingrealtimedecisions

12.Lastthreehour
1.Raw
promotionaloffer
eventdata
alertonproductX

11.Promotional
2.Logdata offeralert

3.Queryo/pdata 10.Promotional
offerupdate

4.Offtakedata 9.Promotional
onXproduct offerupdate
5.Fourhourstocloseof
retailsstoresandproduct
Xsalestargetfortheday
notmet!
6.Notificationsforapprovalof 8.Approval
promotionalofferonproductX alert 7.Approval

RFID2005 IITBombay 57
Source:PersistentSystems
RFID2005 IITBombay 58
Source:PersistentSystems
Layout Management Framework

Site Layout Configuration and Location


Management

RFID2005 IITBombay 59
Source:PersistentSystems
Click to
modify
parameter
s

Specify the layout for a reader and antenna


setup by means of locations and junctions
Ability to continuously modify/update the
layout
Provide access to reader and antenna
RFID2005 configuration from visual layout
IITBombay 60
Source:PersistentSystems
Site
Definition
One site = Many floors

RFID2005 IITBombay 61
Source:PersistentSystems
Floor Zone One site = Many zones
Definition Definition

RFID2005 IITBombay 62
Source:PersistentSystems
Location
Definition One zone = Many
locations

RFID2005 IITBombay 63
Source:PersistentSystems
Device Management Framework

Remote monitoring and configuration


of RF Sensor network elements
Readers and Antennas

RFID2005 IITBombay 64
Source:PersistentSystems
Click to
Click to
view reader
administer
and
reader and
antenna
antenna
properties

Status view for all readers at a glance

RFID2005 IITBombay 65
Source:PersistentSystems
Reader
definition

One reader = Multiple


antennas

Reader and Antenna configuration and


status view for specific reader
Ability to remotely monitor and configure
Reader and Antenna parameters

RFID2005 IITBombay 66
Source:PersistentSystems
Sophisticated Query Processing

Stream based event store for incessant,


high performance querying

RFID2005 IITBombay 67
Source:PersistentSystems
Application
Query
Builder

Ability to configure queries for continuous


execution on event store
Incorporates querying on PML information
Programmable querying interfaces
Provides data filtering abilities

RFID2005 IITBombay 68
Source:PersistentSystems
Snapshot of
all Queries

Access configuration panels of specific


queries
View tabular and graphical outputs for all
queries

RFID2005 IITBombay 69
Source:PersistentSystems
Dashboards
Corporate dashboards for enhanced decision
making

RFID2005 IITBombay 70
Source:PersistentSystems
Query
definition

Query result
snapshot

RFID2005 IITBombay 71
Source:PersistentSystems
Query
definition

Query result
snapshot

RFID2005 IITBombay 72
Source:PersistentSystems
Acceptable Daily Daily
Inventory Monitor Monitor
Threshold Indicates Reflects
Monitored Need for Result of
Daily Action Action

Flash promotions application as reflected


in a corporate dashboard

RFID2005 IITBombay 73
Source:PersistentSystems
Graphical
dashboard
builder to
provide visual
view over query

Choose from multiple types of graphs


Configuration panels for visualization effects
Configuration panels for drilled down views

RFID2005 IITBombay 74
Source:PersistentSystems
Drill-down view
of Query result

RFID2005 IITBombay 75
Source:PersistentSystems
Snapshot of all
application
dashboards

Access configuration panels of specific dashboard


View tabular and graphical outputs for all dashboards

RFID2005 IITBombay 76
Source:PersistentSystems
Notifications
Notifications for enhanced decision making

RFID2005 IITBombay 77
Source:PersistentSystems
a
Configuration
panel for
notification

Specify alerts via email and SMS

RFID2005 IITBombay 78
Source:PersistentSystems
Notification

NotificationsonDesktop Event
Subscriber

Notification
Message
instance

Email message in outlook

RFID2005 IITBombay 79
Source:PersistentSystems
Virtual Test Bed
Scenario emulation prior to deployment

RFID2005 IITBombay 80
Source:PersistentSystems
Ability to configure event generation for
an emulated reader setup
Specify movement and time intervals
across various functional units

RFID2005 IITBombay 81
Source:PersistentSystems
TheEPCmodel:InternetofThings

RFID2005 IITBombay 82
Source:www.epcglobalinc.org
EPCandPML
EPCElectronicProductCode
Headerhandlesversionandupgrades
EPCManagerProductManufacturerCode
ObjectClassClass/TypeofProduct
SerialNumberUniqueObjectIdentity
PMLPhysicalMarkupLanguage
ExtensionofXML
RepresentationofTaggedObjectInformation
InteractionofTaggedObjectInformation

RFID2005 IITBombay 83
SavantandONS
Savants
ManagetheflowofEPCdatafromRFIDreaders
Datasmoothing
Readercoordination
Dataforwarding
Datastorage
InteractwiththeONSnetwork
ONSServers
DirectoryforEPCinformation,similartoInternetDNS
UsestheobjectmanagernumberoftheEPCtofind
outhowtogetmoreinformationabouttheproduct

RFID2005 IITBombay 84
EPCprocessflow

SuppliersInternalSupplyChain
CustomersRFIDsystem
readstheEPCinformation

CustomersInternalSupplyChain
EPCcompliant andrequestsadditional
datafromtheEPC
RFIDtagsare
Network
placedon
products,
casesorpallets
during
distributionor TheEPCenabled
productisreceivedatthe
manufacturing
customersite

TheproductentersthesupplychainwiththeEPCinformationattached
RFID2005 IITBombay 85
EPCTags

64and96bitEPCtagshavebeendefined

010000A2100015E000189DF0
Header EPCManager ObjectClass SerialNumber
8Bits 835bits 3956bits 6095bits

AllowsforuniqueIDsfor268millioncompanies
Eachcompanycanthenhave16millionobjectclasses
EachobjectorSKUcanhave68billionserialnumbers
assignedtoit

RFID2005 IITBombay 86
TheEPCNetwork
EPC Network

Manufacturer Retailer

1.EPClifecyclebeginswhenaManufacturertagstheproduct

RFID2005 IITBombay 87
Source:VerisignInc
TheEPCNetwork
EPC Network
Electronic Product Code
urn:epc:sgtin:47400.18559.1234

Identification on Bar Codes

Identification for Serialized Information

Synt
ax 4thlevel 3rdlevel 2ndlevel Toplevel
1 Dom
ain ds . .
vnds .
verisign com
Name
Manufacturer
EPC .
18559 .
47400 .
Retailer
onsepc com
1.EPClifecyclebeginswhenaManufacturertagstheproduct
Manufacturer ID identifies supplier as Gillette
Object (product) Class identifies as Mach 3 razor (12 pk)

RFID2005 IITBombay 88
TheEPCNetwork
EPC Network

Manufacturer Retailer

1.EPClifecyclebeginswhenaManufacturertagstheproduct
2.Manufacturerrecordsproductinformation(e.g.,manufacturedate,expirationdate,
location)intoEPCInformationService
3.EPCInformationServiceregistersEPCknowledgewithEPCDiscoveryService

RFID2005 IITBombay 89
TheEPCNetwork
EPC Network

Manufacturer Retailer

4.ManufacturersendsproducttoRetailer
5.RetailerrecordsreceiptofproductintoEPCIS
6.RetailersEPCISthenregistersproductknowledgewithEPCDiscoveryService

RFID2005 IITBombay 90
TheEPCNetwork
EPC Network

7 Retailer
Application

Manufacturer Retailer

7.IfRetailerrequiresproductinformation,RootONSisqueriedforlocationof
ManufacturersLocalONS
8.ManufacturersLocalONSisqueriedforlocationofEPCIS

RFID2005 IITBombay 91
TheEPCNetwork
Total
EPC Network Transaction
Time:
<10
milliseconds

Retailer
Application

Manufacturer Retailer

9.RetailerqueriesManufacturerEPCISfordesiredproductinformation(e.g.,
manufacturedate,expirationdate,etc.)

RFID2005 IITBombay 92
Outline
OverviewofRFID
ReaderTag;Potentialapplications

RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards

RFIDBusinessAspects
SecurityandPrivacy

Conclusion
RFID2005 IITBombay 93
BusinessimplicationsofRFIDtagging
Customerinsight
Shelfavailability
Selfcheckout
Consumer Newpaymentmechanisms
Returnmanagement
Maintenance
CumulativeValue

QualityControl
Supply DistributionProductivity
Chain Track&Trace
Inventorymanagement
Management Assetmanagement
Shelfmaintenance
Highvaluegoodsmgmt

Non
Resaleable Track&Trace
Management Inventorymanagement
Assetmanagement

Truck/Asset Pallet/Case Tote/Package


LevelofTagging/Time

RFID2005 IITBombay 94
Source:www.accenture.org
RFIDdeploymentchallenges
ManageSystemcosts
Choosetherighthardware
Choosetherightintegrationpath
Choosetherightdatainfrastructure
HandleMaterialmatters
RFTaggingofproducedobjects
DesigninglayoutsforRFInterrogators
TagIdentificationSchemeIncompatibilities
Whichstandardtofollow?
OperatingFrequencyVariances
LowFrequencyorHighFrequencyorUltraHighFrequency
BusinessProcessRedesign
Newprocesseswillbeintroduced
Existingprocesseswillberedefined
TrainingofHR
CostROIsharing
RFID2005 IITBombay 95
Usingtagswithmetal

Tagsplaceddirectlyagainstmetalwill
negativelyaffectreadability

Spacetagfromsurface Offsettagfromsurface

Coupleone
endofthe
antennato AngleTag
themetal

RFID2005 IITBombay 96
GettingreadyforRFID
Identifybusinessprocessimpacts
Inventorycontrol(acrossthesupplychain)
Manufacturingassembly
DetermineoptimalRFIDconfiguration
WhereamIgoingtotagmycomponents/products?
Surfaces,metalenvironmentandhandlingissues
WhereamIgoingtoplacethereaders?
Movingfromthelabenvironmenttothemanufacturingor
distributioncentercanbetricky
WhenamIgoingtoassembletheRFIDdata?
IntegratewithERPandothersystems
RFID2005 IITBombay 97
RFIDservicesvaluechain
Data Enterprise
Strategy/ Middleware/ EPC &Information Application Business
Hardware
Consulting DeviceMgmt Network Management Integration Applications
Services

SystemIntegrationandSolutionDelivery

Business Product ETL SupplyChain


Tags Event Directory
Process Catalogand Services Execution
Monitoring Services
Integration Readers Attribute
Managemnt Legacy ERP
Solution Datafiltering Discovery
Label Services Application
Framework Data Integration Warehouse
Printers Reader
Synchro Management
Network coordination Authorization
/ nization
Setup Store
Policy Authenticatn
Management
RFaspects Management Framework
Distribution
Management

RFID2005 IITBombay 98
Source:AMRResearch
Privacy:TheflipsideofRFID
Hiddenplacementoftags
Uniqueidentifiersforallobjectsworldwide
Massivedataaggregation
Unauthorizeddevelopmentofdetailedprofiles
Unauthorizedthirdpartyaccesstoprofiledata
Hiddenreaders
Justincaseyou
wanttoknow,shes
carrying700Euro

RFID2005 IITBombay 99
Source:www.rfidprivacy.org
TheBlockerTagapproach
Treewalkingprotocolforidentifyingtags
recursivelyasksquestion:
Whatisyournextbit?

Blockertagalwayssaysboth0and1!
Makesitseemlikeallpossibletagsarepresent
Readercannotfigureoutwhichtagsareactually
present
Numberofpossibletagsishuge,soreaderstalls

RFID2005 IITBombay 100


Moreonblockertags

Blockertagcanbeselective:
Privacyzones:OnlyblockcertainrangesofRFIDtag
serialnumbers
Zonemobility:Allowshopstomoveitemsintoprivacy
zoneuponpurchase
Example:
Blockerblocksallidentifierswithleading1bit
Itemsinsupermarketcarryleading0bit
Oncheckout,leadingbitisflippedfrom0to1
PINrequired,asforkilloperation

RFID2005 IITBombay 101


TheChallengeResponseapproach
Tagdoesnotgiveallitsinformationtoreader.
Thecloserthereader,themoretheprocessing.
Tagrevealshighestlevelofauthenticatedinformation.

1. Readerspecifieswhichlevelitwants.
2. Tagspecifieslevelofsecurity,and/oramountof
energyneeded.
3. Readerproceedsatthatlevelofsecurity.
4. Tagrespondsifandonlyifitgetsenergyand
securityrequired.
RFID2005 IITBombay 102
Somemoreapproaches
TheFaradayCageapproach.
PlaceRFIDtagsinaprotectivemesh.
Wouldmakelocomotiondifficult.
TheKillTagapproach.
Killthetagwhileleavingthestore.
RFIDtagsaretoousefulforreverselogistics.
TheTagEncryptionapproach.
Tagcyclesthroughseveralpseudonyms.
Gettingagoodmodelisdifficult.

Noonesizefitsallsolution.
Securityhingesonthefactthatintherealworld,an
adversarymusthavephysicalproximitytotagsto
interactwiththem.
RFID2005 IITBombay 103
Outline
OverviewofRFID
ReaderTag;Potentialapplications

RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards

RFIDBusinessAspects
SecurityandPrivacy
Conclusion

RFID2005 IITBombay 104


RFID:Thecompletepicture

TagsandReaders

IdentifyingReadPoints
Installation&RFTuning
RFIDMiddleware
Connectors&Integration
ProcessChanges
CrossSupplyChainView

RFID2005 IITBombay 105


PointstonoteaboutRFID
RFIDbenefitsareduetoautomationandoptimization.

RFIDisnotaplug&playtechnology.

Onefrequencyfitsallisamyth.

Technologyisevolvingbutphysicshaslimitations.

RFIDdoesnotsolvedatainconsistencywithinand
acrossenterprises.

ManagementofRFIDinfrastructureanddatahasbeen
underestimated.

RFID2005 IITBombay 106


RFIDSummary

Strengths Weaknesses

Advancedtechnology Lackofindustryandapplication
Easytouse standards
Highmemorycapacity HighcostperunitandhighRFID
Smallsize systemintegrationcosts
Weakmarketunderstandingof
thebenefitsofRFIDtechnology

Opportunities Threats

Couldreplacethebarcode Ethicalthreatsconcerning
EnduserdemandforRFID privacylife
systemsisincreasing Highlyfragmentedcompetitive
Hugemarketpotentialinmany environment
businesses

RFID2005 IITBombay 107


SomeLinks
http://www.epcglobalinc.com/
http://www.rfidjournal.com/
http://rfidprivacy.com/
http://www.rfidinc.com/
http://www.buyrfid.com/

ThankYou

RFID2005 IITBombay 108

You might also like