Professional Documents
Culture Documents
Sridhar Iyer
IIT Bombay
sri@it.iitb.ac.in
www.it.iitb.ac.in/~sri
Outline
Overview of RFID
– Reader-Tag; Potential applications
Conclusion
RFID 2005 IIT Bombay 2
Product Marketing – 75 years ago
Add consumer
flexibility,
courtesy of
robotics,
computers …
Customer
window into
final stage of
manufacturing
5
Critical Issues
– Assembly process control
– Inventory management
– Supply chain integration
– Customer insight
Ethernet
RFID
Reader
Antenna
RF
Write data Items with Reader Read Application
Transaction
to RF tags RF Tags Manager Systems
Data Store
Antenna
Trading
Partner
EDI / Systems
1 2 3 4 5 6 7 8 XML
Tag/Item
10
Relationship
Database 9
an antenna,
printed, etched
or stamped ...
Antenna
Power Supply
Memory
Control Logic Cells
Tx Modulator (Finite State
machine)
Rx
Demodulator
Read-only tags
– Tag ID is assigned at the factory during manufacturing
• Can never be changed
• No additional data can be assigned to the tag
Write once, read many (WORM) tags
– Data written once, e.g., during packing or manufacturing
• Tag is locked once data is written
• Similar to a compact disc or DVD
Read/Write
– Tag data can be changed over time
• Part or all of the data section can be locked
Digital Signal
Processor
(DSP)
Network
Processor Power
Supply
915MHz 13.56MHz
RFID 2005 RadioIIT Bombay Radio 16
RFID application points
Assembly Line
Wireless
Handheld Applications
Bill of Lading
Material Tracking
Shipping PortalsIIT Bombay
RFID 2005 17
RFID applications
Manufacturing and Processing
– Inventory and production process monitoring
– Warehouse order fulfillment
Supply Chain Management
– Inventory tracking systems
– Logistics management
Retail
– Inventory control and customer insight
– Auto checkout with reverse logistics
Security
– Access control
– Counterfeiting and Theft control/prevention
Location Tracking
– Traffic movement control and parking management
– Wildlife/Livestock monitoring and tracking
RFID 2005 IIT Bombay 18
Smart groceries
2. “Smart Cabinet”
periodically
interrogates to assess
inventory
3. Server/Database is
updated to reflect item’s
disposition
4. Designated individuals
are notified regarding
Passive items that need
read/write tags attention (cabinet and
affixed to caps shelf location, action
of containers required)
Track products
through their entire
lifetime.
“Smart” people ??
Conclusion
RFID 2005 IIT Bombay 25
RFID communications
Reader
Antenna
Power from RF field
Reader->Tag Commands
Reader
Tag->Reader Responses
Tags
RFID Communication
Channel
IC or microprocessor
Transceiver
RFID
Tag Reader
Tag
antenna
antenna
IC or microprocessor
Transceiver
RFID
Tag Reader
Tag
antenna
antenna
Reader
Separation
distance d
A: It depends-
UHF (915MHz) : Far field propagation : Pt 1/d2
HF (13.56MHz) : Inductive coupling : Pt 1/d6
RFID 2005 IIT Bombay 31
Limiting factors for passive RFID
865MHz
200KHz
867MHz
100 mW 2W 500 mW
FT FT FT FT
LT LT LT LT
Assumptions
– Separate control channel
between readers
– The range in the control
channel is sufficient for a
reader to communicate
with all the possible
readers that might interfere
in the data channel
Several approaches
– Tree algorithm
– Memoryless protocol
– Contactless protocol
– I-code protocol
Conclusion
RFID 2005 IIT Bombay 53
How much data?
Consider a supermarket chain implementing RFID:
12 bytes EPC + Reader ID + Time = 18 bytes per tag
Average number of tags in a neighborhood store = 700,000
Data generated per second = 12.6 GB
Data generated per day = 544 TB
Assuming 50 stores in the chain,
data generated per day = 2720 TB
Layout
LayoutManagement
ManagementEngine
Engine
Product
Layout Layout Event Information Store
Management UI Store Store
11. Promotional
2. Log data offer alert
Query result
snapshot
Query result
snapshot
Notification
Message instance
The product enters the supply chain with the EPC information attached
RFID 2005 IIT Bombay 85
EPC Tags
Manufacturer Retailer
Synt
ax 4th level 3rd level 2nd level Top level
1
Domai
n Name ds . .
vnds .
verisign com
Manufacturer
EPC 18559
. .
47400 .
Retailer
onsepc com
1. EPC lifecycle begins when a Manufacturer tags the product
Manufacturer ID identifies supplier as Gillette
Object (product) Class identifies as Mach 3 razor (12 pk)
Manufacturer Retailer
Manufacturer Retailer
7 Retailer
Application
Manufacturer Retailer
Retailer
Application
Manufacturer Retailer
Conclusion
RFID 2005 IIT Bombay 93
Business implications of RFID tagging
Customer insight
Shelf availability
Self checkout
Consumer New payment mechanisms
Return management
Maintenance
Cumulative Value
Quality Control
Supply Distribution Productivity
Chain Track & Trace
Inventory management
Management
Asset management
Shelf maintenance
High value goods mgmt
Non
Resaleable Track & Trace
Management Inventory management
Asset management
Couple one
end of the
antenna to Angle Tag
the metal
No ‘one-size-fits-all’ solution.
Security hinges on the fact that in the real world, an
adversary must have physical proximity to tags to interact
with them.
RFID 2005 IIT Bombay 103
Outline
Overview of RFID
– Reader-Tag; Potential applications
Strengths Weaknesses
Opportunities Threats
Thank You