Professional Documents
Culture Documents
Rfid 05 PDF
Rfid 05 PDF
SridharIyer
IITBombay
sri@it.iitb.ac.in
www.it.iitb.ac.in/~sri
Outline
OverviewofRFID
ReaderTag;Potentialapplications
RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards
RFIDBusinessAspects
SecurityandPrivacy
Conclusion
RFID2005 IITBombay 2
Product Marketing 75 years ago
RFID2005 IITBombay 3
Product Marketing - Today
Add
consumer
flexibility,
courtesy of
robotics,
computers
Customer
window into
final stage of
manufacturin
g
5
RFID2005
IITBombay 4
Effectonmanufacturing
Needtoensureerrorfree,customassembly
Needinventoryofcomponentsforthevarious
customizationoptions
CriticalIssues
Assemblyprocesscontrol
Inventorymanagement
Supplychainintegration
Customerinsight
Onesolution:RFID
RFID2005 IITBombay 5
WhatisRFID?
RFID=RadioFrequencyIDentification.
AnADC(AutomatedDataCollection)technology
that:
usesradiofrequencywavestotransferdatabetween
areaderandamovableitemtoidentify,categorize,
track..
Isfastanddoesnotrequirephysicalsightorcontact
betweenreader/scannerandthetaggeditem.
Performstheoperationusinglowcostcomponents.
Attemptstoprovideuniqueidentificationandbackend
integrationthatallowsforwiderangeofapplications.
OtherADCtechnologies:Barcodes,OCR.
RFID2005 IITBombay 6
RFIDsystemcomponents
Ethernet
RFID
Reader
RFID2005 IITBombay 7
RFID systems: logical view
11
12
Product
et ONS Information
ern Internet
t Server (PMLFormat)
In
Antenna
RF
Writedata Itemswith Reader Read Application
Transaction
toRFtags RFTags Manager Systems
DataStore
Antenna
Trading
Partner
EDI/ Systems
1 2 3 4 5 6 7 8 XML
Tag/Item
10
Relationship
Database 9
Other
Tag Interfaces RFID Middleware
Systems
RFID2005 IITBombay 8
RFIDtags:Smartlabels
A paper label
with RFID inside
an antenna,
printed, etched
or stamped ...
RFID2005 IITBombay 9
Source:www.rfidprivacy.org
SomeRFIDtags
RFID2005 IITBombay 10
Source:www.rfidprivacy.org
RFIDtags
Tagscanbeattachedtoalmostanything:
Items,casesorpalletsofproducts,highvaluegoods
vehicles,assets,livestockorpersonnel
PassiveTags
DonotrequirepowerDrawsfromInterrogatorField
Lowerstoragecapacities(fewbitsto1KB)
Shorterreadranges(4inchesto15feet)
UsuallyWriteOnceReadMany/ReadOnlytags
Costaround25centstofewdollars
ActiveTags
Batterypowered
Higherstoragecapacities(512KB)
Longerreadrange(300feet)
TypicallycanberewrittenbyRFInterrogators
Costaround50to250dollars
RFID2005 IITBombay 11
Tagblockdiagram
Antenn
a
Power
Supply Memory
Control Cells
Tx Logic
Modulator (Finite State
Rx machine)
Demodulato
r
RFID2005 IITBombay 12
RFIDtagmemory
Readonlytags
TagIDisassignedatthefactoryduringmanufacturing
Canneverbechanged
Noadditionaldatacanbeassignedtothetag
Writeonce,readmany(WORM)tags
Datawrittenonce,e.g.,duringpackingormanufacturing
Tagislockedoncedataiswritten
SimilartoacompactdiscorDVD
Read/Write
Tagdatacanbechangedovertime
Partorallofthedatasectioncanbelocked
RFID2005 IITBombay 13
RFIDreaders
Readerfunctions:
Remotelypowertags
Establishabidirectionaldatalink
Inventorytags,filterresults
Communicatewithnetworkedserver(s)
Canread100300tagspersecond
Readers(interrogators)canbeatafixedpointsuchas
Entrance/exit
Pointofsale
Readerscanalsobemobile/handheld
RFID2005 IITBombay 14
SomeRFIDreaders
RFID2005 IITBombay 15
Source:www.buyrfid.org
Readeranatomy
Digital
Signal
Processor
(DSP)
Network
Processor Power
Supply
915MHz 13.56MH
RFID2005 Radio
IITBombay z 16
RFIDapplicationpoints
AssemblyLine
Wireless
HandheldApplications
BillofLading
MaterialTracking
ShippingPortalsIITBombay
RFID2005 17
RFIDapplications
ManufacturingandProcessing
Inventoryandproductionprocessmonitoring
Warehouseorderfulfillment
SupplyChainManagement
Inventorytrackingsystems
Logisticsmanagement
Retail
Inventorycontrolandcustomerinsight
Autocheckoutwithreverselogistics
Security
Accesscontrol
CounterfeitingandTheftcontrol/prevention
LocationTracking
Trafficmovementcontrolandparkingmanagement
Wildlife/Livestockmonitoringandtracking
RFID2005 IITBombay 18
Smartgroceries
AddanRFIDtagtoall
itemsinthegrocery.
Asthecartleavesthe
store,itpassesthrough
anRFIDtransceiver.
Thecartisrungupin
seconds.
RFID2005 IITBombay 19
Smartcabinet
Readerantennasplacedundereachshelf 1. Taggeditemisremoved
fromorplacedin
SmartCabinet
1. SmartCabinet
periodically
interrogatestoassess
inventory
1. Server/Databaseis
updatedtoreflectitems
disposition
1. Designatedindividuals
arenotifiedregarding
Passive itemsthatneed
read/writetags attention(cabinetand
affixedtocaps shelflocation,action
ofcontainers required)
RFID2005 IITBombay 20
Source:HowStuffWorks
Smartfridge
Recognizeswhatsbeenputinit
Recognizeswhenthingsareremoved
Createsautomaticshoppinglists
Notifiesyouwhenthingsarepasttheirexpiration
Showsyoutherecipesthatmostcloselymatch
whatisavailable
RFID2005 IITBombay 21
Smartgroceriesenhanced
Trackproducts
throughtheirentire
lifetime.
RFID2005 IITBombay 22
Source:HowStuffWorks
Somemoresmartapplications
Smartappliances:
Closetsthatadviceonstyledependingonclothesavailable.
Ovensthatknowrecipestocookprepackagedfood.
Smartproducts:
Clothing,appliances,CDs,etc.taggedforstorereturns.
Smartpaper:
Airlineticketsthatindicateyourlocationintheairport.
Smartcurrency:
Anticounterfeitingandtracking.
Smartpeople??
RFID2005 IITBombay 23
RFIDadvantagesoverbarcodes
Nolineofsightrequiredforreading
Multipleitemscanbereadwithasinglescan
Eachtagcancarryalotofdata(read/write)
Individualitemsidentifiedandnotjustthecategory
Passivetagshaveavirtuallyunlimitedlifetime
Activetagscanbereadfromgreatdistances
Canbecombinedwithbarcodetechnology
RFID2005 IITBombay 24
Outline
OverviewofRFID
ReaderTag;Potentialapplications
RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards
RFIDBusinessAspects
SecurityandPrivacy
Conclusion
RFID2005 IITBombay 25
RFIDcommunications
Reader
Antenna
Power from RF field
Reader->Tag Commands
Reader
Tag->Reader Responses
Tags
RFID Communication
Channel
RFID2005 IITBombay 26
RFIDcommunication
HostmanagesReader(s)andissuesCommands
ReaderandtagcommunicateviaRFsignal
Carriersignalgeneratedbythereader
Carriersignalsentoutthroughtheantennas
Carriersignalhitstag(s)
Tagreceivesandmodifiescarriersignal
sendsbackmodulatedsignal(PassiveBackscatteralsoreferredto
asfielddisturbancedevice)
Antennasreceivethemodulatedsignalandsendthemtothe
Reader
Readerdecodesthedata
Resultsreturnedtothehostapplication
RFID2005 IITBombay 27
Antennafields:Inductivecoupling
ICormicroprocessor
Transceiver
RFID
TagReader
Tag
antenna
antenna
RFID2005 IITBombay 28
Antennafields:Propagationcoupling
ICormicroprocessor
Transceiver
RFID
TagReader
Tag
antenna
antenna
RFID2005 IITBombay 29
Operationalfrequencies
UHF Microwave
Frequency LF HF
868915 2.45GHz&
Ranges 125KHz 13.56MHz
MHz 5.8GHz
TypicalMax
Shortest Short Medium Longest
ReadRange 112 224 110 115
(PassiveTags)
Activetagswith
Generallypassive Activetagswith
integralbattery
Generallypassive tagsonly,using integralbatteryor
TagPower orpassivetags
tagsonly,using inductiveor passivetagsusing
Source inductivecoupling capacitive
usingcapacitive
capacitivestorage,
storage,
coupling Efieldcoupling
Efieldcoupling
DataRate Slower Moderate Fast Faster
Abilitytoread
near Better Moderate Poor Worse
metalorwet
surfaces
AccessControl&
Security
Identifyingwidgets HighwaytollTags
Librarybooks supplychain
through Identificationof
Laundry tracking
manufacturing privatevehicle
Applications processesorin
identification Highwaytoll
fleetsin/outofa
AccessControl Tags
harshenvironments yardorfacility
EmployeeIDs
Ranchanimal Assettracking
identification
EmployeeIDs
RFID2005 IITBombay 30
Reader>Tagpowertransfer
Reader
Tag
Antenna
Reader
Separation
distance d
A: It depends-
UHF (915MHz) : Far field propagation : Pt 1/d2
HF (13.56MHz) : Inductive coupling : Pt 1/d6
RFID2005 IITBombay 31
LimitingfactorsforpassiveRFID
RFID2005 IITBombay 32
Implications
SincePt1/d2,doublingreadrangerequires4X
thetransmitterpower.
Largerantennascanhelp,butattheexpenseof
largerphysicalsizebecauseG{t,r}Area.
MoreadvancedCMOSprocesstechnologywill
helpbyreducingPt.
Atlargedistances,readersensitivitylimitations
dominate.
RFID2005 IITBombay 33
RFeffectsofcommonmaterials
Material Effect(s)onRFsignal
Cardboard Absorption(moisture)
Detuning(dielectric)
Conductiveliquids Absorption
(shampoo)
Plastics Detuning(dielectric)
Metals Reflection
Groupsofcans Complexeffects(lenses,
filters)
Reflection
Humanbody/animals Absorption,Detuning,
RFID2005 Reflection
IITBombay 34
Communicationprotocols
Listenbeforetalk
Mandatorylistentimeof>5msecbeforeeachtransmission
Max4secTXthenrelistenfor100msec
TransmissionfromotherReaders
865MHz
200KHz
867MHz
RFID2005 IITBombay 35
ETSIEN302208standard
Sharedoperationinband865.0868.0MHzattransmit
powersupto2WERP.
Operationin10subbandsof200kHz.
Powerlevelsof100mW,500mWand2WERP.
Mandatorylistenbeforetalkandlookbeforeleap.
100mW 2W 500mW
FT FT FT FT
LT LT LT LT
RFID2005 IITBombay 36
Source:www.etsi.org
ReaderCollisionProblem
ReaderReaderInterference
ReaderTagInterference
RFID2005 IITBombay 37
ReaderCollisionandHiddenTerminal
Thepassivetagsarenotabletotakepartinthecollision
resolutionoravoidance,asinotherwirelesssystems
Consider:RTSCTSforhiddenterminalproblemin802.11
rfid:TisnotabletosendaCTSinresponsetoanRTSfromR
Incasemultiplereaders
trytoreadthesametag,
thetagcannotrespond
selectivelytoaparticular
reader
RFID2005 IITBombay 38
TDMAbasedsolution
Assigndifferenttimeslotsand/orfrequenciesto
nearbyreaders
Reducestographcoloringproblem(readersform
vertices)
Onlyreadertoreaderinterference
Assigndifferentoperatingfrequencies
Onlymultiplereadertotaginterference
Assigndifferenttimeslotsforoperation
Bothtypesofinterference
Firstallotdifferenttimeslots,thenfrequencies
RFID2005 IITBombay 39
Beaconbasedsolution
Areaderwhilereading
tag,periodicallysendsa
beacononthecontrol
channel
Assumptions
Separatecontrolchannel
betweenreaders
Therangeinthecontrol
channelissufficientfora
readertocommunicate
withallthepossible
readersthatmightinterfere
inthedatachannel
RFID2005 IITBombay 40
Beaconbasedsolution(contd.)
RFID2005 IITBombay 41
MultipleTags
Whenmultipletagsareinrangeofthereader:
Allthetagswillbeexcitedatthesametime.
Makesitverydifficulttodistinguishbetweenthetags.
Collisionavoidancemechanisms:
Probabilistic:
Tagsreturnatrandomtimes.
Deterministic:
Readersearchesforspecifictags.
RFID2005 IITBombay 42
TagCollisionProblem
Multipletagssimultaneouslyrespondtoquery
Resultsincollisionatthereader
Severalapproaches
Treealgorithm
Memorylessprotocol
Contactlessprotocol
Icodeprotocol
RFID2005 IITBombay 43
TreeAlgorithm
Readerqueriesfortags
Readerinformsincaseofcollisionandtags
generates0or1randomly
If0thentagretransmitsonnextquery
If1thentagbecomessilentandstartsincrementing
itscounter(whichisinitiallyzero)
Counterincrementedeverytimecollisionreported
anddecrementedeverytimeidentificationreported
Tagremainssilenttillitscounterbecomeszero
RFID2005 IITBombay 44
TreeAlgorithmExample
Readerinformstagsincaseofcollisionandtagsgenerate0or1
If0thentagretransmitsonnextquery,elsetagbecomessilentandstartsacounter.
Counterincrementedeverytimecollisionreportedanddecrementedotherwise.
RFID2005 IITBombay 45
TreeAlgorithmComplexity
TimeComplexityO(n)wherenisnumberof
tagstobeidentified
MessageComplexity
nisunknown(nlogn)
nisknown(n)
Overheads
Requiresrandomnumbergenerator
Requirescounter
RFID2005 IITBombay 46
MemorylessProtocol
Assumption:tagIDstoredinkbitbinarystring
Algorithm
Readerqueriesforprefixp
Incaseofcollisionqueriesforp0orp1
Timecomplexity
RunningtimeO(n)
WorstCasen*(k+2logn)
MessageComplexityk*(2.21logn+4.19)
RFID2005 IITBombay 47
MemorylessProtocolExample
Readerqueriesforprefixp
Incaseofcollision,readerqueriesforp0orp1
Example:considertagswithprefixes:00111,01010,01100,10101,
10110and10111
RFID2005 IITBombay 48
ContactlessProtocol
Assumption:tagIDstoredinkbitbinarystring
Algorithm
Readerqueriesfor(i)thbit
Readerinformsincaseofcollision
Tagswith(i)thbit0becomesilentandmaintaincounter
Tagswith(i)thbit1respondtonextqueryfor(i+1)thbit
TimecomplexityO(2k)
MessagecomplexityO(m(k+1)),wheremis
numberoftags
RFID2005 IITBombay 49
ContactlessProtocolExample
Readerqueriesfor(i)thbit
Readerinformsincaseofcollision
Tagswith(i)thbit0becomesilentandmaintaincounter
Tagswith(i)thbit1respondtonextqueryfor(i+1)thbit
Example:tagswithprefixes:01,10and11
RFID2005 IITBombay 50
ICodeProtocol
BasedonslottedALOHAprinciple
Algorithm
ReaderprovidestimeframewithNslots,Ncalculated
forestimatenoftags
Tagsrandomlychooseaslotandtransmittheir
information
Responsespossibleforeachslotare
Empty,notagtransmittedinthisslotc0
Singleresponse,identifyingthetagc1
Multipleresponses,collisionck
RFID2005 IITBombay 51
ICodeProtocol
Newestimateforn:lower
bound
lb(N,c0,c1,ck)=c1+2ck
Usingestimaten,Ncalculated
Nbecomesconstantaftersometime
UsingthisNcalculatenumberofreadcyclesstoidentifytagswithagivenlevelofaccuracy
Timecomplexityt0*(s+p)
t0istimeforonereadcycle
pnumberofreadcyclesforestimatingN
Messagecomplexityn*(s+p)
RFID2005 IITBombay 52
Outline
OverviewofRFID
ReaderTag;Potentialapplications
RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards
RFIDBusinessAspects
SecurityandPrivacy
Conclusion
RFID2005 IITBombay 53
Howmuchdata?
ConsiderasupermarketchainimplementingRFID:
12bytesEPC+ReaderID+Time=18bytespertag
Averagenumberoftagsinaneighborhoodstore=700,000
Datageneratedpersecond=12.6GB
Datageneratedperday=544TB
Assuming50storesinthechain,
datageneratedperday=2720TB
StanfordLinearAcceleratorCentergenerates500TB
RFID2005 IITBombay 54
RFIDmiddleware
RFID2005 IITBombay 55
Source:ForresterResearch:RFIDMiddleware
Middlewareframework:PINES
Data Collection & Device Management Engine
Device
Movementand
Management
DeviceEmulator
Engineand
Engine
UI
EISData PML
Connectr
Server
Realtime
Decision QueryEngine
Support andUI
Action
Engine Rule
Notification Automated
Graphical
Engineand
UI
Dashboard Automatic Actuation
Actionable Engine
Rules
RFID2005 IITBombay 56
Source:PersistentSystems
Retailcasestudy:Enablingrealtimedecisions
12.Lastthreehour
1.Raw
promotionaloffer
eventdata
alertonproductX
11.Promotional
2.Logdata offeralert
3.Queryo/pdata 10.Promotional
offerupdate
4.Offtakedata 9.Promotional
onXproduct offerupdate
5.Fourhourstocloseof
retailsstoresandproduct
Xsalestargetfortheday
notmet!
6.Notificationsforapprovalof 8.Approval
promotionalofferonproductX alert 7.Approval
RFID2005 IITBombay 57
Source:PersistentSystems
RFID2005 IITBombay 58
Source:PersistentSystems
Layout Management Framework
RFID2005 IITBombay 59
Source:PersistentSystems
Click to
modify
parameter
s
RFID2005 IITBombay 61
Source:PersistentSystems
Floor Zone One site = Many zones
Definition Definition
RFID2005 IITBombay 62
Source:PersistentSystems
Location
Definition One zone = Many
locations
RFID2005 IITBombay 63
Source:PersistentSystems
Device Management Framework
RFID2005 IITBombay 64
Source:PersistentSystems
Click to
Click to
view reader
administer
and
reader and
antenna
antenna
properties
RFID2005 IITBombay 65
Source:PersistentSystems
Reader
definition
RFID2005 IITBombay 66
Source:PersistentSystems
Sophisticated Query Processing
RFID2005 IITBombay 67
Source:PersistentSystems
Application
Query
Builder
RFID2005 IITBombay 68
Source:PersistentSystems
Snapshot of
all Queries
RFID2005 IITBombay 69
Source:PersistentSystems
Dashboards
Corporate dashboards for enhanced decision
making
RFID2005 IITBombay 70
Source:PersistentSystems
Query
definition
Query result
snapshot
RFID2005 IITBombay 71
Source:PersistentSystems
Query
definition
Query result
snapshot
RFID2005 IITBombay 72
Source:PersistentSystems
Acceptable Daily Daily
Inventory Monitor Monitor
Threshold Indicates Reflects
Monitored Need for Result of
Daily Action Action
RFID2005 IITBombay 73
Source:PersistentSystems
Graphical
dashboard
builder to
provide visual
view over query
RFID2005 IITBombay 74
Source:PersistentSystems
Drill-down view
of Query result
RFID2005 IITBombay 75
Source:PersistentSystems
Snapshot of all
application
dashboards
RFID2005 IITBombay 76
Source:PersistentSystems
Notifications
Notifications for enhanced decision making
RFID2005 IITBombay 77
Source:PersistentSystems
a
Configuration
panel for
notification
RFID2005 IITBombay 78
Source:PersistentSystems
Notification
NotificationsonDesktop Event
Subscriber
Notification
Message
instance
RFID2005 IITBombay 79
Source:PersistentSystems
Virtual Test Bed
Scenario emulation prior to deployment
RFID2005 IITBombay 80
Source:PersistentSystems
Ability to configure event generation for
an emulated reader setup
Specify movement and time intervals
across various functional units
RFID2005 IITBombay 81
Source:PersistentSystems
TheEPCmodel:InternetofThings
RFID2005 IITBombay 82
Source:www.epcglobalinc.org
EPCandPML
EPCElectronicProductCode
Headerhandlesversionandupgrades
EPCManagerProductManufacturerCode
ObjectClassClass/TypeofProduct
SerialNumberUniqueObjectIdentity
PMLPhysicalMarkupLanguage
ExtensionofXML
RepresentationofTaggedObjectInformation
InteractionofTaggedObjectInformation
RFID2005 IITBombay 83
SavantandONS
Savants
ManagetheflowofEPCdatafromRFIDreaders
Datasmoothing
Readercoordination
Dataforwarding
Datastorage
InteractwiththeONSnetwork
ONSServers
DirectoryforEPCinformation,similartoInternetDNS
UsestheobjectmanagernumberoftheEPCtofind
outhowtogetmoreinformationabouttheproduct
RFID2005 IITBombay 84
EPCprocessflow
SuppliersInternalSupplyChain
CustomersRFIDsystem
readstheEPCinformation
CustomersInternalSupplyChain
EPCcompliant andrequestsadditional
datafromtheEPC
RFIDtagsare
Network
placedon
products,
casesorpallets
during
distributionor TheEPCenabled
productisreceivedatthe
manufacturing
customersite
TheproductentersthesupplychainwiththeEPCinformationattached
RFID2005 IITBombay 85
EPCTags
64and96bitEPCtagshavebeendefined
010000A2100015E000189DF0
Header EPCManager ObjectClass SerialNumber
8Bits 835bits 3956bits 6095bits
AllowsforuniqueIDsfor268millioncompanies
Eachcompanycanthenhave16millionobjectclasses
EachobjectorSKUcanhave68billionserialnumbers
assignedtoit
RFID2005 IITBombay 86
TheEPCNetwork
EPC Network
Manufacturer Retailer
1.EPClifecyclebeginswhenaManufacturertagstheproduct
RFID2005 IITBombay 87
Source:VerisignInc
TheEPCNetwork
EPC Network
Electronic Product Code
urn:epc:sgtin:47400.18559.1234
Synt
ax 4thlevel 3rdlevel 2ndlevel Toplevel
1 Dom
ain ds . .
vnds .
verisign com
Name
Manufacturer
EPC .
18559 .
47400 .
Retailer
onsepc com
1.EPClifecyclebeginswhenaManufacturertagstheproduct
Manufacturer ID identifies supplier as Gillette
Object (product) Class identifies as Mach 3 razor (12 pk)
RFID2005 IITBombay 88
TheEPCNetwork
EPC Network
Manufacturer Retailer
1.EPClifecyclebeginswhenaManufacturertagstheproduct
2.Manufacturerrecordsproductinformation(e.g.,manufacturedate,expirationdate,
location)intoEPCInformationService
3.EPCInformationServiceregistersEPCknowledgewithEPCDiscoveryService
RFID2005 IITBombay 89
TheEPCNetwork
EPC Network
Manufacturer Retailer
4.ManufacturersendsproducttoRetailer
5.RetailerrecordsreceiptofproductintoEPCIS
6.RetailersEPCISthenregistersproductknowledgewithEPCDiscoveryService
RFID2005 IITBombay 90
TheEPCNetwork
EPC Network
7 Retailer
Application
Manufacturer Retailer
7.IfRetailerrequiresproductinformation,RootONSisqueriedforlocationof
ManufacturersLocalONS
8.ManufacturersLocalONSisqueriedforlocationofEPCIS
RFID2005 IITBombay 91
TheEPCNetwork
Total
EPC Network Transaction
Time:
<10
milliseconds
Retailer
Application
Manufacturer Retailer
9.RetailerqueriesManufacturerEPCISfordesiredproductinformation(e.g.,
manufacturedate,expirationdate,etc.)
RFID2005 IITBombay 92
Outline
OverviewofRFID
ReaderTag;Potentialapplications
RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards
RFIDBusinessAspects
SecurityandPrivacy
Conclusion
RFID2005 IITBombay 93
BusinessimplicationsofRFIDtagging
Customerinsight
Shelfavailability
Selfcheckout
Consumer Newpaymentmechanisms
Returnmanagement
Maintenance
CumulativeValue
QualityControl
Supply DistributionProductivity
Chain Track&Trace
Inventorymanagement
Management Assetmanagement
Shelfmaintenance
Highvaluegoodsmgmt
Non
Resaleable Track&Trace
Management Inventorymanagement
Assetmanagement
RFID2005 IITBombay 94
Source:www.accenture.org
RFIDdeploymentchallenges
ManageSystemcosts
Choosetherighthardware
Choosetherightintegrationpath
Choosetherightdatainfrastructure
HandleMaterialmatters
RFTaggingofproducedobjects
DesigninglayoutsforRFInterrogators
TagIdentificationSchemeIncompatibilities
Whichstandardtofollow?
OperatingFrequencyVariances
LowFrequencyorHighFrequencyorUltraHighFrequency
BusinessProcessRedesign
Newprocesseswillbeintroduced
Existingprocesseswillberedefined
TrainingofHR
CostROIsharing
RFID2005 IITBombay 95
Usingtagswithmetal
Tagsplaceddirectlyagainstmetalwill
negativelyaffectreadability
Spacetagfromsurface Offsettagfromsurface
Coupleone
endofthe
antennato AngleTag
themetal
RFID2005 IITBombay 96
GettingreadyforRFID
Identifybusinessprocessimpacts
Inventorycontrol(acrossthesupplychain)
Manufacturingassembly
DetermineoptimalRFIDconfiguration
WhereamIgoingtotagmycomponents/products?
Surfaces,metalenvironmentandhandlingissues
WhereamIgoingtoplacethereaders?
Movingfromthelabenvironmenttothemanufacturingor
distributioncentercanbetricky
WhenamIgoingtoassembletheRFIDdata?
IntegratewithERPandothersystems
RFID2005 IITBombay 97
RFIDservicesvaluechain
Data Enterprise
Strategy/ Middleware/ EPC &Information Application Business
Hardware
Consulting DeviceMgmt Network Management Integration Applications
Services
SystemIntegrationandSolutionDelivery
RFID2005 IITBombay 98
Source:AMRResearch
Privacy:TheflipsideofRFID
Hiddenplacementoftags
Uniqueidentifiersforallobjectsworldwide
Massivedataaggregation
Unauthorizeddevelopmentofdetailedprofiles
Unauthorizedthirdpartyaccesstoprofiledata
Hiddenreaders
Justincaseyou
wanttoknow,shes
carrying700Euro
RFID2005 IITBombay 99
Source:www.rfidprivacy.org
TheBlockerTagapproach
Treewalkingprotocolforidentifyingtags
recursivelyasksquestion:
Whatisyournextbit?
Blockertagalwayssaysboth0and1!
Makesitseemlikeallpossibletagsarepresent
Readercannotfigureoutwhichtagsareactually
present
Numberofpossibletagsishuge,soreaderstalls
Blockertagcanbeselective:
Privacyzones:OnlyblockcertainrangesofRFIDtag
serialnumbers
Zonemobility:Allowshopstomoveitemsintoprivacy
zoneuponpurchase
Example:
Blockerblocksallidentifierswithleading1bit
Itemsinsupermarketcarryleading0bit
Oncheckout,leadingbitisflippedfrom0to1
PINrequired,asforkilloperation
1. Readerspecifieswhichlevelitwants.
2. Tagspecifieslevelofsecurity,and/oramountof
energyneeded.
3. Readerproceedsatthatlevelofsecurity.
4. Tagrespondsifandonlyifitgetsenergyand
securityrequired.
RFID2005 IITBombay 102
Somemoreapproaches
TheFaradayCageapproach.
PlaceRFIDtagsinaprotectivemesh.
Wouldmakelocomotiondifficult.
TheKillTagapproach.
Killthetagwhileleavingthestore.
RFIDtagsaretoousefulforreverselogistics.
TheTagEncryptionapproach.
Tagcyclesthroughseveralpseudonyms.
Gettingagoodmodelisdifficult.
Noonesizefitsallsolution.
Securityhingesonthefactthatintherealworld,an
adversarymusthavephysicalproximitytotagsto
interactwiththem.
RFID2005 IITBombay 103
Outline
OverviewofRFID
ReaderTag;Potentialapplications
RFIDTechnologyInternals
RFcommunications;Reader/Tagprotocols
Middlewarearchitecture;EPCstandards
RFIDBusinessAspects
SecurityandPrivacy
Conclusion
TagsandReaders
IdentifyingReadPoints
Installation&RFTuning
RFIDMiddleware
Connectors&Integration
ProcessChanges
CrossSupplyChainView
RFIDisnotaplug&playtechnology.
Onefrequencyfitsallisamyth.
Technologyisevolvingbutphysicshaslimitations.
RFIDdoesnotsolvedatainconsistencywithinand
acrossenterprises.
ManagementofRFIDinfrastructureanddatahasbeen
underestimated.
Strengths Weaknesses
Advancedtechnology Lackofindustryandapplication
Easytouse standards
Highmemorycapacity HighcostperunitandhighRFID
Smallsize systemintegrationcosts
Weakmarketunderstandingof
thebenefitsofRFIDtechnology
Opportunities Threats
Couldreplacethebarcode Ethicalthreatsconcerning
EnduserdemandforRFID privacylife
systemsisincreasing Highlyfragmentedcompetitive
Hugemarketpotentialinmany environment
businesses
ThankYou