thesis rfid.doc
DESCRIPTION
Advertisements for this iconic brand started through the press and print media. Newspapers was the most common medium through which the people came to know about the benefits of eating biscuits as Parle G biscuits were rich in nutritional values thus providing instant energy. The “Dadaji” commercial released in 1989 and it took the visual media of television to unimaginable heights.Parle G brand of biscuits is advertised through televisions, radio, newspapers and magazines. In1997, the company sponsored Shakti man, a tele-series. In 2002, the company introduced G-Man, who was the ambassador for Parle G. This advertisement was appreciated by the children and their parents and therefore went on to become hitTRANSCRIPT
![Page 1: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/1.jpg)
Project ThesisOn
“Radio Frequency Identification(RFID) access control system”
Bachelor of Engineering
Submitted By:
Mr. Ajinkya Wagh Mr. Abhishek Mandlik
Mr. Kalyani Karule Ms. Komal Dhoble
Under the guidance ofMr. T.R Ravi
Department of Computer Technology
Yeshwantrao Chavan College of EngineeringWanadongri, Hingna Road, Nagpur – 441 110
Session 2013-14
![Page 2: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/2.jpg)
CERTIFICTE
Department of Electronics Engineering
Yeshwantrao Chavan College of EngineeringWanadongri, Hingna Road, Nagpur – 441 110
Session 2013-14
This is to certify that the project titled
“Radio Frequency Identification(RFID) access control system”
Has been successfully completed in recognition to the partial fulfillment for the award of the degree of Bachelor of Engineering in Computer Technology Engineering, Rashtrasant Tukdoji Maharaj Nagpur University, by students,
Ms. Komal Dhobale Mr. Abhishek Mandlik
Ms. Kalyani Karule Mr. Ajinkya Wagh
Mr. T.R Ravi Mr. A.R. Patil (Project Guide) (Head of Department)
![Page 3: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/3.jpg)
ACKNOWLEDGEMENT
First, I would like to express my sincere gratitude and appreciation to our head of
department, Prof. A.R.Patil sir, for his tremendous support, invaluable guidance and constant
encouragement during the course of my studies. The completion of this project and thesis would
not have been possible without our project guide Mr. T.R.Ravi sir’s exceptional supervision and
everlasting support. I am also grateful to him for providing me with various opportunities to
pursue a dynamic and fascinating area of computer as well as explore opportunities out of the
laboratory.
I also wish to thank all the members of YCCE’s Computer department, working with
them made my time during graduate study a wonderful experience. A countless and sincere
thanks also goes to my parents, my family members and my friends, for their continuous support
and encouragement throughout my studies without their companionship, life would not have
been the same.
![Page 4: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/4.jpg)
ABSTRACT
Radio Frequency Identification (RFID) system is a new wireless data transmission and
reception technique for automatic identification, asset tracking, security surveillance etc.
A RFID system consists of three major components: a reader or integrator, which sends
the interrogation signals to a RFID transponder or tag, which is to be identified; a RFID tag,
which contains the identification code; and a middleware, which maintains the interface and the
software protocol to encode and decode the identification data from the reader into a mainframe
or a personal computer.
Realizing the fact that the barcode and other means for identifications and asset tracking
are inadequate for recent demands, RFID technology has been taking the world of logistics,
supply chain managements, asset tracking, security access control, and many other applications
areas by storm. Communication by Means of Reflected Power. In this project we are using RFID
technology for security purpose, continuous monitoring and wireless control of a peripheral
device from a range of 100 meters. The transmitter and receiver system are used in industries in
various departmental sections.
As the user enters in to the department the RFID tag which is placed on the card of user
is continuously transmitting the radio signals, these signals are captured by the receiver circuit
which is placed on the departmental door, the LCD panel displays the information of the
particular user when he enters in to the department, the time of entrance is displayed
acoordingly,the user is under continuous monitoring by the administrator, there is a switch on
the I card of user, this switch is use to control the laod,the user can make the load on or off by the
tag, this load may be machine on which user works as operator, simultaneously the user is
monitored by administrator.
The PC interfacing is done with the help of RS 232 port cable with RFID receiver
circuit.This project has an advantage that the tags used are multiuser tags which can be at most
used by 8 users. A single tag can be used in diff modes by just changing the positions of jumpers.
The encoding is done by BCD i/p encoder. Here we are using 2 tags which has almost 16
different users. The range of wireless control can be extended further. Thus RFID is used as most
dominant and accurate technology in wireless detection and control systems.
![Page 5: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/5.jpg)
LIST OF FIGURES
Figure 1- RFID tag
Figure 2- A variety of RFID Tags
Figure 3- RFID Frequencies
Figure 4- A paper hang-tag
Figure 5- Comparison of RFID with Bar code
Figure 6- Receiver IC PIC16F628
Figure 7- Block dig of RFID tag
Figure 8- Communication between host computer and Transponder
Figure 9- LCD display interface
Figure 10- Components used in RFID tag
Figure 11- Antenna
Figure 12- RFID Reader System Architecture
Figure 13- RFID tag PCB layout and component position
Figure 14- RFID receiver PCB layout and component
![Page 6: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/6.jpg)
CONTENTS
Chapter 1 - Introduction
Chapter 2 - Literature Survey
Chapter 3 - Design Issues
Chapter 4 - Tools
Chapter 5 - Methodology
Chapter 6 - Implementation
Chapter 7 - Results
Chapter 8 - Conclusion
Chapter 9 - Future Scope
![Page 7: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/7.jpg)
CHAPTER 1
INTRODUCTION
![Page 8: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/8.jpg)
INTRODUCTION
Executive Summary
Whatever you read about packaging, supply chains, or identification, you will come
across an article or advertisement for Radio Frequency Identification (RFID). Why does it seem
that this technology is being touted as the best thing since sliced bread? And is it just another
piece of hype meant to confuse and make us invest money in another piece of technology?
RFID is evolving as a major technology enabler for identifying and tracking goods and
assets around the world. It can help hospitals locate expensive equipment more quickly to
improve patient care, pharmaceutical companies to reduce counterfeiting, and logistics providers
to improve the management of moveable assets. It also promises to enable new efficiencies in the
supply chain by tracking goods from the point of manufacture through to the retail point of sale
(POS).
As a result of the potential benefits of RFID:
The automotive industry has been using closed-loop RFID systems to track and control
major assemblies within a production plant for over 30 years.
Many of the world's major retailers have mandated RFID tagging for pallets and cases
shipped into their distribution centers to provide better visibility.
There are moves in the defense and aerospace industry to mandate the use of RFID to
improve supply chain visibility and ensure the authenticity of parts.
Regulatory bodies in the United States are moving to the use of pedigrees based on RFID to
prevent the counterfeiting of prescription drugs.
Hospitals are using RFID for patient identification and moveable asset tracking.
RFID tags are being used to track the movement of farm animals to assist with tracking
issues when major animal diseases strike.
But while the technology has received more than its fair share of media coverage
recently, many are still unfamiliar with RFID and the benefits it can offer. In the face of this need
for clear, comprehensive information about RFID and its benefits, this paper defines the
![Page 9: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/9.jpg)
opportunities offered by the technology for all organizations involved in the production,
movement, or sale of goods. It is equally relevant for organizations wishing to track or locate
existing goods, assets, or equipment.
In addition, the paper seeks to outline the business and technical challenges to RFID
deployment and demonstrates how these issues can be addressed with technology from Microsoft
and its partners. Above all, it explains how Microsoft technology—which provides the software
architecture underpinning the solution rather than the tags or readers—can support the
deployment of RFID-based solutions.
What Is RFID Really?
RFID is the reading of physical tags on single products, cases, pallets, or re-usable
containers that emit radio signals to be picked up by reader devices. These devices and software
must be supported by a sophisticated software architecture that enables the collection and
distribution of location-based information in near real time. The complete RFID picture
combines the technology of the tags and readers with access to global standardized databases,
ensuring real time access to up-to-date information about relevant products at any point in the
supply chain.
Tags contain a unique identification number called an Electronic Product Code (EPC),
and potentially additional information of interest to manufacturers, healthcare organizations,
military organizations, logistics providers, and retailers, or others that need to track the physical
location of goods or equipment. All information stored on RFID tags accompanies items as they
travel through a supply chain or other business process. All information on RFID tags, such as
product attributes, physical dimensions, prices, or laundering requirements, can be scanned
wirelessly by a reader at high speed and from a distance of several meters.
Figure 1- RFID tag
![Page 10: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/10.jpg)
RFID Bill of Materials
So what is the bill of materials for RFID then? RFID Component parts are:
Tag or Transponder- An RFID tag is a tiny radio device that is also referred to as a
transponder, smart tag, smart label, or radio barcode. The tag comprises a simple silicon
microchip (typically less than half a millimeter in size) attached to a small flat aerial and
mounted on a substrate. The whole device can then be encapsulated in different materials
(such as plastic) dependent upon its intended usage. The finished tag can be attached to an
object, typically an item, box, or pallet, and read remotely to ascertain its identity, position,
or state. For an active tag there will also be a battery.
Figure 2. A variety of RFID Tags
Different Types of RFID
Another complication to the RFID question is that there are different sorts of tags
available in the market. This typing of tags can be done in a number of different ways. The table
in Figure highlights these different typing approaches.
![Page 11: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/11.jpg)
Table 1. RFID Tags Types
Active or passive Other Classifications
Passive (no battery)
Smaller, Lighter
Shorter range (<3m)
Smaller data storage
Lower cost
Data storage (Programming)
Read Only
Write once
Read/write
Active (with battery)
Larger, Heavier
Longer range (up to 100m)
Larger data storage
Higher cost
Frequencies
Low—135 kHz
VHF—13.5 MHz
UHF—860MHz
Microwave—2.4 GHz
There are several versions of RFID that operate at different radio frequencies. The choice
of frequency is dependent on the business requirements and read environment—it is not a
technology in which 'one size fits all' applications.
Three primary frequency bands are being used for RFID:
Low Frequency (125/134KHz)—Most commonly used for access control, animal tracking,
and asset tracking.
High-Frequency (13.56 MHz)—Used where medium data rate and read ranges up to about 1.5
meters are acceptable. This frequency also has the advantage of not being susceptible to
interference from the presence of water or metals.
Ultra High-Frequency (850 MHz to 950 MHz)—offer the longest read ranges of up to
approximately 3 meters and high reading speeds.
![Page 12: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/12.jpg)
Figure 3. RFID Frequencies (RFID Center: Dr Carol David Daniel, Introduction to RFID, RFID Forum
December 2004, and RFID Center)
Applications for RFID within the supply chain can be found at multiple frequencies, and
different RFID solutions may be required to meet the varying needs of the marketplace.Since
UHF (Ultra High Frequency) has the range to cover portals and dock-doors, it is gaining industry
support as the frequency of choice for inventory tracking applications, including pallets and
cases.
RFID tags are further broken down into two categories:
Active RFID Tags are battery powered. They broadcast a signal to the reader and can transmit
over the greatest distances (100+ meters). Typically they can cost £5–£20 or more and are used
to track high value goods like vehicles and large containers of goods. Shipboard containers are
a good example of an active RFID tag application.
Passive RFID Tags do not contain a battery. Instead, they draw their power from the radio
wave transmitted by the reader. The reader transmits a low power radio signal through its
antenna to the tag, which in turn receives it through its own antenna to power the integrated
circuit (chip). The tag will briefly converse with the reader for verification and the exchange of
data. As a result, passive tags can transmit information over shorter distances (typically 3
meters or less) than active tags. They have a smaller memory capacity and are considerably
lower in cost (less than £1), making them ideal for tracking lower cost items.
![Page 13: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/13.jpg)
There are two basic types of chips available on RFID tags: Read-Only and Read-Write:
Read-only chips are programmed with unique information stored on them during the
manufacturing process—often referred to as a 'number plate' application. The information on
read-only chips can not be changed.
With Read-Write chips, the user can add information to the tag or write over existing
information when the tag is within range of the reader. Read-Write chips are more expensive that
Read-only chips. Applications for these may include field service maintenance or 'item attendant
data'—where a maintenance record associated with a mechanical component is stored and
updated on a tag attached to the component. Another method used is something called a
"WORM" chip (Write Once Read Many). It can be written once and then becomes Read-only
afterwards
![Page 14: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/14.jpg)
CHAPTER 2LITERATURE SURVEY
LITERATURE SURVEY
The information stored in an RFID chip is defined by its read/write characteristics.
![Page 15: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/15.jpg)
Read-only: For read-only tag, the information stored must be recorded during the manufacturing
process and cannot be typically modified or erased. The data stored normally represents a unique
serial number, which is used as a reference to lookup more details about a particular item in a
host system database. Read-only tags are therefore useful for identifying an object, much like the
“license plate” of a car.
Write-once: These differ from read-only tags in that they allow the end-user to program the
tag’s memory. Therefore, as an item progresses down a conveyor, for example, an end-user can
encode a write-once tag with the item's serial number or part number which cannot be erased.
Read-write: for a read/write tag, data can be written and erased on demand at the point of
application. Since a rewriteable tag can be updated numerous times, its reusability can help to
reduce the number of tags that need to be purchased, and add greater flexibility and intelligence
to the application. Additionally, data can be added as the item moves through the supply chain,
providing better traceability and updated information. Advanced features also include locking,
encryption and disabling the RFID tag. A barcode scanner cannot read more than one barcode at
a time. RFID readers, however, may be driven by specific software applications that can handle
the reading of multiple RFID tags. This feature is called anticollision as it permits a reader to
avoid data collision from several tags that enter the reader’s coverage. RFID systems are
designed to operate at a number of designated frequencies, depending on the application
requirements and local radio-frequency regulations:
a) Low Frequency (125 kHz);
b) High Frequency (13.56MHz);
c) Ultra High Frequency (860-960 MHz)
d) Microwave (2.45 GHz)
Low-frequency tags are typically used for access control & security, manufacturing
processes, harsh environments, and animal identification applications in a variety of industries,
which require short read ranges. Read ranges are inches to several feet. High-frequency tags
were developed as a low cost, small profile alternative to low frequency RFID tags, with the
![Page 16: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/16.jpg)
ability to be printed or embedded in substrates such as paper. Popular applications include:
library tracking and identification, healthcare patient identification, access control, etc. These
tags have a read range of up to several feet. UHF tags boast greater read distances, superior anti-
collision capabilities increasing the ability to identify a larger number of tags in the field at a
given time. The primary application envisioned for UHF tags, is supply chain tracking.
Microwave tags are mostly used in active RFID systems. Offering long range and high data
transfer speeds, at significantly higher cost per tag, making them more suitable for railroad car
tracking, container tracking, and automated toll collection. Table1 highlights the different
characteristics of the four RFID operating frequency ranges. RFID devices have three primary
elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the
database where information about tagged objects is stored.
The chip, usually made of silicon, contains information about the item to which it is
attached. Chips used by retailers and manufacturers to identify consumer goods may contain an
Electronic Product Code (“EPC”). The EPC is the RFID equivalent of the familiar Universal
Product Code (“UPC”), or bar code, currently imprinted on many products. Bar codes must be
optically scanned, and contain only generic product information. By contrast, EPC chips are
encrypted with a unique product code that identifies the individual product to which it is
attached, and can be read using radio frequency. These codes contain the type of data that
product manufacturers and retailers will use to track the authenticity and location of goods
throughout the supply chain.
An RFID chip may also contain information other than an EPC, such as biometric data (a
digitized image of a fingerprint or photograph, for example).In addition, some chips may not be
loaded with information uniquely identifying the tagged object at all; so-called “electronic article
surveillance systems” (“EAS”) may utilize 3 radio frequency communication to combat
shoplifting, but not to uniquely identify individual items. The RFID tags are used in products as
shown below.
![Page 17: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/17.jpg)
Automatic Identification
RFID technologies are grouped under the more generic Automatic Identification (Auto-
ID) technologies. Examples of other Auto-ID technologies include Smartcards and Barcodes.
RFID is often positioned as next generation bar coding because of its obvious advantages over
barcodes. However, in many environments it is likely to co-exist with the barcode for a long
time. What advantages does RFID have over these other means of identifying a person, product,
or asset? The real benefits of RFID can be summarized as follows:
Line of sight not required
Durability
Range
Data volume
Multiple read–Speed
Read/Write–Update
Rather than using light to collect or read a number from a bar code, radio waves are used
to read a number from the RFID tag. RFID therefore does not need line-of-sight to operate.
Using radio means that the tag no longer has to be visible on the object to which it is attached;
the tag can be hidden inside the item or box that is to be identified and still be read. This
minimizes or eliminates the need for a person to have to present the reader to the tag, as it can
now be fixed to a wall, for example. As the item is passed by the reader it will be read
automatically, thus giving a potentially large saving in labor costs or substantial increase in the
throughput of scanned items.
Another feature of RFID is the ability to read many tags at the same time. It is not
necessary to present each tag to the reader separately (as is required for barcodes); instead, all
tags within the range of the reader can be read almost simultaneously as they pass the reader.
Again, there is a huge savings potential in not having to manually present the reader to each item
to be identified.
![Page 18: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/18.jpg)
Furthermore, data can also be written to the tag, a feature that is not possible with
barcodes. This feature has tremendous implications for IT systems and the potential benefits of
RFID.
Figure 5. Comparison of RFID with Bar code
![Page 19: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/19.jpg)
CHAPTER 3DESIGN ISSUES
![Page 20: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/20.jpg)
IC 16F628 :-
IC, 8BIT FLASH MCU, 16F628, DIP18Controller Family/Series:PIC16FCore Size:8bitNo. of I/O's:16Program Memory Size:2 KwordsEEPROM Memory Size:128ByteRAM Memory Size:224ByteCPU Speed:20MHzOscillator Type:External, InternalNo. of Timers:3No. of PWM Channels:1Digital IC Case Style:DIPSupply Voltage Range:3V to 5.5VOperating Temperature Range:-40°C to +85°CNo. of Pins:18SVHC:No SVHC (15-Dec-2010)Operating Temperature Max:85°COperating Temperature Min:-40°CClock Frequency:20MHzDevice Marking:PIC16F628A-I/PFlash Memory Size:3.5KBIC Generic Number:16F628IC Temperature Range:IndustrialInterface:USARTLogic Function Number:16F628AMemory Size:2KBMemory Type:FLASHMicroprocessor/Controller Features:BOD, COMP, ICSP, POR, TIMERS, WDTNo. of Bits:8No. of I/O's:16Package / Case:DIPPeripherals:Comparator, PWM, TimerRAM Size:224ByteSupply Voltage Max:5.5VSupply Voltage Min:3VTermination Type:Through Hole
![Page 21: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/21.jpg)
IC 16F72 :-
Memory Size 2000 BNumber of I/O Pins 22Number of Pins 28Access Time 20.0 µsClock Speed 20.0 MHz (max) Operating Temperature 85.0 °C (max) Supply Voltage (DC) 5.50 V (max) Case / Package SDIP-28Lead-Free Status Lead FreeMounting Type Through HolePackaging BulkRoHS Complian
![Page 22: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/22.jpg)
CHAPTER 5
METHODOLOGY
METHODOLOGY
Basic block diagram of RFID Tag:-
![Page 23: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/23.jpg)
Figure 7- Basic block diagram of RFID Tag
The RFID tags can be programmed by programming the microcontroller or by using
microprocessor.Most of the tags has microcontroller.The programming language used for
interfacing is visual basics or by java.The interfacing with pc is done with RS 232 port.
Communication between host computer and Transponder:-
Between the host computers basic three things are. A micro controller, a RFID circuit and
an antenna. The micro controller’s task is to communicate with the host computer and
RFIDcircuit.The micro computer have a serial port, in this case a RS-232 interface. An USB-
interface should be better, not just it more up to date also because it's possible to have power
supply through the serial-port. The microcontroller communicates with the RFID-circuit with
three wire-interfaces. The microcontroller should also acts as buffer on both ways and error.
![Page 24: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/24.jpg)
Figure 8- Communication between host computer and Transponder
The S6700 Multi Protocol Transceiver IC provides the receive/transmit functions
required to communicate with the three types of transponders that operate in the13.5 MHz ISM
band [8]. A transmit encoder converts the transmitted data stream into the selected protocol;
protocol selection is done in the header of the transmitted data string. The transmitter can provide
up to 200 mW of RF power to a matched 50 Ohm load with a 5 V power supply. Higher output
power can be obtained by an external amplifier. The receive decoder converts the signals from
the RF receiver into a simple data string. The protocol uses a simple three wire serial link
between the transceiver IC and the controller to transmit data and set up data. The antenna could
be printed to the board. This is the LCD Display senses the information of a user or of a product
which is stored in to the memory of RFID tags memory. This is the LCD Display senses the
information of a user or of a product which is stored in to the memory of RFID tags memory.
.
![Page 25: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/25.jpg)
CHAPTER 6IMPLEMENTATION
![Page 26: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/26.jpg)
8051 Tx
Rx DATA PIN
PORT 2
RFID TAG
Door
Lock
Figure 9- LCD display interface
Access Control
RFID Readers placed at entrances that require a person to pass their proximity card (RF tag) to
be "read' before the access can be made.
Contact less Payment Systems.
RFID tags used to carry payment information. RFIDs are particular suited to electronic Toll
collection systems. Tags attached to vehicles, or carried by people transmit payment information
to a fixed reader attached to a Toll station. Payments are then routinely deducted from a users
account, or information is changed directly on the RFID tag.
Product Tracking and Inventory Control.
![Page 27: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/27.jpg)
RFID systems are commonly used to track and record the movement of ordinary items such as
library books, clothes, factory pallets, electrical goods and numerous items.
How do RFIDs work?
Shown below is a typical RFID system. In every RFID system the transponder Tags
contain information. This information can be as little as a single binary bit, or be a large array
of bits representing such things as an identity code, personal medical information, or literally
any type of information that can be stored in digital binary format.
Figure 10- Component used in RFID tag
COMPONENTS OF RFID
A basic RFID system consists of three components:
An antenna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically programmed with unique information
ANTENNA
![Page 28: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/28.jpg)
The antenna emits radio signals to activate the tag and read and write data to it. Antennas
are the conduits between the tag and the transceiver, which controls the system's data acquisition
and communication. Antennas are available in a variety of shapes and sizes; they can be built
into a door frame to receive tag data from persons or things passing through the door, or mounted
on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field
produced by an antenna can be constantly present when multiple tags are expected continually. If
constant interrogation is not required, a sensor device can activate the field.
Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.
interrogator), which can be configured either as a handheld or a fixed-mount device. The reader
emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its
power output and the radio frequency used. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal. The reader decodes the data
encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer .
.
Figure 11- Antenna
TAGS (Transponders)
An RFID tag is comprised of a microchip containing identifying information and an
antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a
serialized identifier, or license plate number, that uniquely identifies that item, Similar to the way
many bar codes are used today. A key difference, however is that RFID tags have a higher data
capacity than their bar code counterparts. This increases the options for the type of information
that can be encoded on the tag, including the manufacturer, batch or lot number, weight,
![Page 29: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/29.jpg)
ownership, destination and history (such as the temperature range to which an item has been
exposed). In fact, an unlimited list of other types of information can be stored on RFID tags,
depending on application needs. An RFID tag can be placed on individual items, cases or pallets
for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc.
There are three options in terms of how data can be encoded on tags: (1) Read-only tags
contain data such as a serialized tracking number, which is pre-written onto them by the tag
manufacturer or distributor. These are generally the least expensive tags because they cannot
have any additional information included as they move throughout the supply chain. Any updates
to that information would have to be maintained in the application software that tracks SKU
movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in
production or distribution processes. Again, this may include a serial number, but perhaps other
data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the
tag as needed—and even written over the original data. Examples for the latter capability might
include the time and date of ownership transfer or updating the repair history of a fixed asset.
While these are the most costly of the three tag types and are not practical for tracking
inexpensive items, future standards for electronic product codes (EPC) appear to be headed in
this direction.
RFID TAGS
Data capacity
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as
much as several thousand bits on the high end. Of course, the greater the storage capacity, the
higher the price per tag.
![Page 30: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/30.jpg)
Form factor
The tag and antenna structure can come in a variety of physical form factors and can
either be self-contained or embedded as part of a traditional label structure (i.e., the tag is inside
what looks like a regular bar code label—this is termed a 'Smart Label') companies must choose
the appropriate form factors for the tag very carefully and should expect to use multiple form
factors to suit the tagging needs of different physical products and units of measure. For
example, a pallet may have an RFID tag fitted only to an area of protected placement on the
pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that
also provide operators human-readable information and a back-up should the tag fail or pass
through non RFID-capable supply chain links.
Passive versus active
“Passive” tags have no battery and "broadcast" their data only when energized by a
reader. That means they must be actively polled to send information. "Active" tags are capable of
broadcasting their data using their own battery power. In general, this means that the read ranges
are much greater for active tags than they are for passive tags—perhaps a read range of 100 feet
or more, versus 15 feet or less for most passive tags. The extra capability and read ranges of
active tags, however, come with a cost; they are several times more expensive than passive tags.
Today, active tags are much more likely to be used for high-value items or fixed assets such as
trailers, where the cost is minimal compared to item value, and very long read ranges are
required. Most traditional supply chain applications, such as the RFID-based tracking and
compliance programs emerging in the consumer goods retail chain, will use the less expensive
passive tags.
Frequencies
Like all wireless communications, there are a variety of frequencies or spectra through
which RFID tags can communicate with readers. Again, there are trade-offs among cost,
performance and application requirements. For instance, low-frequency tags are cheaper than
ultra high-frequency (UHF) tags, use less power and are better able to penetrate non-metallic
substances. They are ideal for scanning objects with high water content, such as fruit, at close
range. UHF frequencies typically offer better range and can transfer data faster. But they use
![Page 31: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/31.jpg)
more power and are less likely to pass through some materials. UHF tags are typically best suited
for use with or near wood, paper, cardboard or clothing products. Compared to low-frequency
tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into
a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is
likely that a variety of tag types will be required to solve specific operational issues. You will
want to work with a company that is very knowledgeable in tag and reader technology to
appropriately identify the right mix of RFID technology for your environment and applications.
EPC Tags
EPC refers to "electronic product code," an emerging specification for RFID tags,
readers and business applications first developed at the Auto-ID Center at the Massachusetts
Institute of Technology. This organization has provided significant intellectual leadership toward
the use and application of RFID technology. EPC represents a specific approach to item
identification, including an emerging standard for the tags themselves, including both the data
content of the tag and open wireless communication protocols. In a sense, the EPC movement is
combining the data standards embodied in certain bar code specifications, such as the UPC or
UCC-128 bar code standards, with the wireless data communication standards that have been
developed by ANSI and other groups.
RF Transceiver:
The RF transceiver is the source of the RF energy used to activate and power the
passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it
may be a separate piece of equipment. When provided as a separate piece of equipment, the
transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates
the radio frequencies that the antenna transmits and receives. The transceiver filters and
amplifies the backscatter signal from a passive RFID tag.
![Page 32: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/32.jpg)
RFID Tag ArchitectureThe architecture of a security-enhanced RFID tag is sketched in figure 3. It consists of four parts: analog frontend, digital controller, EEPROM, and AES module. The analog frontend is responsible for the power supply of the tag which is transmitted from the reader to the tag. Other tasks of the analog frontend are the modulation and demodulation of data and the clock recovery from the carrier frequency. The digital control unit is a finite state machine that handles communication with the reader, implements the anti-collision mechanism, and executes the commands in the protocol. Furthermore, it allows read and write access to the EEPROM and the AES module. The EEPROM stores tag-specific data like the unique ID and the cryptographic key. These data must be retained when the power supply is lost. The security-enhanced RFID tag calculates strong cryptographic authentication with an AES module which is designed for lowpower requirements and low die-size restrictions. The requirements concerning power consumption and chip area and a description of the AES module are presented in the following sections.
Requirements for RFID Tag Design
In order to achieve a significant economic benefit from using RFID systems, tags will need to be priced under US$ 0.10 [15] for simple identification tags and a little bit higher for security-enhanced tags. Additionally to the aspect of low cost, the environmental conditions play a decisive role because contactless identification must work within a distance of a few meters. The limiting factors thereby are the available power supply for the tag and the signal strength for modulation and demodulation. The available power consumption for the digital part of the RFID tag (digital controller and AES module) is amounting to 20 μA.
Estimating the current consumption of the digital controller to 5 μA, 15 μA remain for the AES module which should not exceed a chip area of 5,000 gates. Additionally, the number of authenticated tags per second is about 50. As presented in chapter 3, this leads to an available time slot of 18 ms for encrypting a 128-bit block of data. Our proposed AES architecture, which is presented in section 4.2, encrypts in about 1000 clock cycles. As a consequence, the clock frequency of the AES module can be reduced under 100 kHz. This allows to reach the ambitious power consumption goal.
4.2 AES Architecture
The Advanced Encryption Standard (AES) is a symmetric encryption algorithm which was selected in 2001 by the National Institute of Standards and Technology (NIST) as the Federal Information Processing Standard FIPS-197 [13]. It operates on blocks of data, the so called State, that have a fixed size of 128 bits. The State is organized as a matrix of four rows and four columns of bytes. The defined key lengths are 128 bits, 192 bits, or 256 bits. Our implementation uses a fixed key size of 128 bits. As most symmetric ciphers, AES encrypts an input block by applying the same round function. The ten round function iterations alter the State by applying
![Page 33: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/33.jpg)
non-linear, linear, and key-dependent transformations. Each transforms the 128-bit State into a modified 128-bit State. Every byte of the State matrix is affected by these transformations:
1. SubBytes substitutes each byte of the State. This operation is non-linear. It is often implemented as a table look-up. Sometimes the SubBytes transformation is called S-Box operation.
2. ShiftRows rotates each row of the State by an offset. The actual value of the offset equals the row index, e.g. the first row is not rotated at all; the last row is rotated three bytes to the left.
3. MixColumns transforms columns of the State. It is a multiplication by a constant polynomial in an extension field of GF(28).
4. AddRoundKey combines the 128-bit State with a 128-bit round key by adding corresponding bits mod 2. This transformation corresponds to a XOR-operation of the State and the round key.
The calculation of the 128-bit round keys works by applying the KeySchedule function. The first
round key is equal to the cipher key. The computation of all other round keys is based on the S-
Box functionality and the Rcon operation. AES is a flexible algorithm for hardware
implementations. A large number of architectures are possible to cover the full range of
applications. AES hardware implementations can be tailored for low die-size demands in
embedded systems or can be optimized for high throughput in server applications. This
flexibility of the AES algorithm was intended by its creators. They paid attention that the
algorithm can be implemented on systems with different bus sizes. Efficient implementations are
possible on 8-bit, 32-bit, 64-bit, and 128-bit platforms. Although many AES hardware
architectures have been proposed, none of the reported architectures meets the requirements of
an AES module for RFID tags regarding low die-size and low power-consumption requirements.
Nearly all of these architectures have GBit throughput rates as optimization goal. This is
contrarious to our needs where throughput is not of concern. Only a few published AES
architectures do not optimize throughput at any cost. of AES which care about hardware
efficiency. All these implementations do not unroll the AES rounds for sake of silicon size. The
more S-Boxes are used, the less clock cycles are needed for encryption. The encryption-only
AES processor of I. able to calculate one AES round in a single clock cycle. The compact 32-bit
AES architecture of S. Mangard et al. in [10] is confident with four S-Boxes and takes eight
cycles for one round. The FGPA implementations of N. Pramstaller et al. [14] and P. Chodowiec
et al. [1] are 32-bit architectures too. They also use four S-Boxes. Four S-Boxes suit a 32-bit
![Page 34: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/34.jpg)
architecture as each S-Box substitutes 8 bits. The MixColumns operation and the ShiftRows
operation are 32-bit operations too because they transform either four columns bytes or four row
bytes of the AES State. The AddRoundKey operation (128-bit XOR) can also be split-up into 32-
bit operations. Implementing the AES algorithm as a 32-bit architecture allows to quarter the
hardware resources compared to an 128-bit architecture [10, 1]. This comes at the expense of
quadrupling the time for an AES encryption.
Typical Applications for RFID
Automatic Vehicle identification
Inventory Management
Work-in-Process
Container/ Yard Management
Document/ Jewellery tracking
Patient Monitoring
The Advantages of RFID Over Bar Coding
1. No "line of sight" requirements: Bar code reads can sometimes be limited or
problematic due to the need to have a direct "line of sight" between a scanner and
a bar code. RFID tags can be read through materials without line of sight.
2. More automated reading: RFID tags can be read automatically when a tagged
product comes past or near a reader, reducing the labor required to scan product
and allowing more proactive, real-time tracking.
![Page 35: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/35.jpg)
3. Improved read rates: RFID tags ultimately offer the promise of higher read
rates than bar codes, especially in high-speed operations such as carton sortation.
Figure 12- RFID Reader System Architecture
Figure shows the data flow of the RFID system architecture. RFID readers are devices
that perform the interrogation of RFID transponders. In a passive RFID system the RFID reader
supplies the tag with essential power in order for it to perform modulation of the reader’s
interrogation signal. Therefore, the reader and transponders are in a master-slave relationship
where the reader acts as a master and the transponders as slaves. Nevertheless RFID readers
themselves are in a slave position as well. A software application, also called middleware,
processes data from the RFID reader, acts as the master unit and sends commands to the reader.
This means that all activities of the reader and transponder are initiated by the application
software. In a hierarchical system structure the application software such as enterprise software
represents the master while the reader, as the slave, which is only activated when it receives a
command from the application software, and therefore, the reader perform read or write
operations of RFID transponders that are in its interrogation area.
CIRCUIT EXPLANATION
![Page 36: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/36.jpg)
Transmitter (RF tag)
The circuit used in this kit used only one IC – the PIC16F628. It is one of the PIC family
of RISC based microcontroller for MICROCHIP. So the IC is program using microcontroller
greatly reduce the component count while providing the more feature than could be found using
dedicated logic the cost is also lower. The PIC 16F628 was choice in this kit because it has a
internal oscillator, eliminating the need for external crystal and loading capacitor.
Fig. 1 shows block diagram of RF Tag. The system comprises the microchip PIC 16F628
microcontroller (U2) and the RF transmitter module (U3). Microcontroller chip is a programmed
to read BCD user code and send the data serially via RF transmitter module.
The 14 Pin microcontroller PIC 16F628 ports RB0 to RB7 as a input port. It’s pulled up
via internal pull-ups and used for user code (BCD) settings. Port RA1 as output port and connect
with the RF Transmitter module. RF Transmitter modulates the data and transmitted in air via
antenna.
RF TRANSMITTER MODULE
RF Rx Module used in remote control application where low cost and longer range is
required .the transmitter operates from a 1.5 to 12 volts supply, making it ideal for battery power
applications. the transmitter employs a SAW-stabilize oscillator, ensuring the accurate frequency
conrol for best range performance. Output power and harmonic emissions are easy to control,
making FCC and ETSI compliance easy.
RECEIVER (RFID reader)
Microcontroller:-
The full ckt of the project is shown in schematic diagram, the brain of the receiver is the
pre programmed mi crocontroller.The ckt comprise microchip PIC 16F72 microcontroller
(U2),434 MHZ RF receiver module, relay, buzzer and 16*2 LCD display.PIC 16F72 is the 8 bit
CMOS microcontroller. Its internal circuitry reducing the need for external component ,thus
reducing the cost and power consumption and enhancing the system reliability.PIC 16F72 is an 8
bit, low cost, high performance flash microcontroller. Its a key feature are the 4K words of the
![Page 37: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/37.jpg)
flash programmed memory,192 byte of data RAM,11 interupts,3 I/O ports,8 bit ADC and only
35 powerful single- cycle instruction(each 14-bit byte).PIC 16F72 microcontroller is a 28- pin IC
with 3 I/O ports : port A(RA 0 through RA5), port B(RBO through RB7)and ports c(RC0
through RC7). All 22 bi-directional i/o pin are used for RF module interface, LCD display,
buzzer and relay interfacing
The RF RX module
The RF RX module is used in short range remote control applications where cost is
primary concern. The receiver module requires no external module RF comports except for the
antenna, it generates, virtually no emissions, making FCC and ETSI approvals easy .The super-
regenerative design exhibits exceptional sensitivity at a very low cost.
The RF module connect with micro controller port RA2.RF module receive the modulated
data from antenna .In the RF module uses a super-regenerative AM detector to demodulated the
incoming AM carrier (modulated data).Demodulated data gives it to the micro controller. Micro
controllers decode the valid user code and display the information on LCD Display. If valid
user codes receive then operate a relay for five seconds.
Security Considerations for RFID Systems-
RFID systems are susceptible to security attacks: as they work non-line-of-sight and contactless,
an attacker can work remote and passive attacks will not be noticed.Some of the main concerns
are (unwanted) consumer tracking, tag forgery and the unauthorized access to the tag’s memory
content. These security risks have to be dealt with in order to gain a broad user acceptance.
Related Work-
Some publications already deal with security aspects for RFID systems. Juels,Rivest, and Szydlo
propose so called “blocker tags” to protect consumers from tracking. One tag simulates a broad
range of ID numbers, so a reader cannot identify it uniquely and tracking is circumvented. This
was an approach to secure low-price tags
They also address the protection of tag contents and introduce the concept of access control
through mutual authentication of tag and reader. Juels and Pappu make a proposal how to secure
banknotes with RFID tags. They want to reach various security goals, some of them are
![Page 38: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/38.jpg)
consumer privacy, forgery resistance, and fraud detection. They propose a system which satisfies
the requirements for all of the four main actors: the central bank, them erchants, the executive,
and the consumer. The proposal in this publication is an RFID system using asymmetric
cryptography combined with some methods which require physical access to the tag.
Finally, the this deals with data security of RFID systemsby using authentication mechanisms.
This is also the topic of our paper. We propose using strong cryptographic algorithms to perform
authentication.
Authentication:-
Authentication means that an object proves its claimed identity to its communicationpartner.
This technique can solve all of the former mentioned securityproblems. Consumer tracking can
be avoided, if tags only communicate theiridentity to authenticated readers. An unauthorized
reader cannot get any informationabout tags which are currently in its field. The authentication
of thereader to the tags also solves the unauthorized-access problem. Only authorizedreaders can
read from or write to the tag’s memory. Authentication of a tagmeans that the tag proves its
identity to the reader. A forged tag cannot convince the reader of its authenticity, so forgery of
tags can be circumvented. Menezes, Oorschot, and Vanstone [12] differentiate between three
authentication methods: password systems (weak authentication), challenge-response
authentication (strong authentication), and customized and zero-knowledge authentication.
Password systems offer a weak level of security and zero-knowledgetechniques are often related
to “strong” mathematical problems which are very costly in calculation and implementation. So
we aim for the second type, the challenge-response techniques, which are broadly used. There
are asymmetric and symmetric challenge-response techniques. The disadvantage of asymmetric
authentication methods is that they are very time consuming and costly to implement in
hardware. So, they are not the first choice for RFID systems. There were attempts to design
resource-saving asymmetric authentication algorithms. NTRU [5] has been proposed for RFID
system implementations more suitable for closed systems. In closed systems each component can
be controlled by one central instance. All devices can get their keys and key updates easily from
the central control instance. In open systems, where the components can join the system
![Page 39: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/39.jpg)
unsolicited and no central control instance is available, key distribution and management is more
difficult.
In airport luggage tracking systems each controlled bag can be equipped with an RFID tag and
can be tracked throughout the whole airport. All assigned tag numbers are stored in a central
server. In that way automated cargo and baggage transportation systems as well as security
applications are possible (access control, checking if the holder of the bag is in the same plane as
the luggage, etc.)
Tag forgery and unauthorized access to the tag’s memory should be avoided. Luggage tracking
should also only be possible for authorized readers. During transportation, RFID systems can be
used to track and route goods on their way from the factory to the retailer. Here, theft and loss of
goods can be rapidly detected, but the substitution with forged goods can only be avoided by
using tag authentication mechanisms. Authentication of the reader could be used to prohibit
unauthorized persons from spying the content of cargo. Tag memory can be used to record
environmental incidents (for example, the disruption of the cold chain when transporting food).
In this case, memory access must be secured by using reader authentication to prevent
unauthorized memory manipulation.
Another application are car immobilizers, where symmetric authentication is already in use. In
general, these implementations use proprietary encryption algorithms, which are optimized for
the specific application. The security of these algorithms cannot be evaluated. Using AES would
add some extra security. As a final example, for proof of origin of goods authentication is
essential. In the next section we propose a method to integrate an one-way authentication
protocol into existing RFID standards.
![Page 40: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/40.jpg)
CHAPTER – 7
RESULTS
![Page 41: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/41.jpg)
The RFID system is easy to use ,flexible and efficient wireless technology while
practically instaling on Industrial level.This technology has a secured medium of
communication and that can be controlled with the help of RFID tags.Diffrent tags are used on
concept level basis in our project.Further extension can be made through interfacing the circuit
with PC and hence the outcome is displayed on monitor screen.
![Page 42: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/42.jpg)
CHAPTER – 8
CONCLUSION
CONCLUSION:-
There is an accelerating trend in the adoption of RFID technology for various industrial
and consumer applications. The full potential of this technology has not yet been realized in
practice. There is sufficient potential for systems integrators who need to address the
requirements of customers and help integrate RFID based systems into enterprise wide
Management Information Systems networks. Business leaders need to look at this new
![Page 43: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/43.jpg)
technology more closely because it has the potential for value addition to any business engaged
in large-scale data processing in any form. So far, the technology has gained prominence in retail
and supply chain management. Its use in manufacturing has not yet reached the critical point but
that is only a matter of time. The hardware is available. Cost effective and robust components are
available with tags able to withstand even high temperatures like those found in baking ovens.
Miniaturization and moisture resistance are no longer the issues. Many businesses selling RFID
solutions are well entrenched but there is room for more. The RFID technology will play an
increasingly important role in the manufacturing and wireless Internet manufacturing in the
future.
![Page 44: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/44.jpg)
CHAPTER – 9
FUTURE SCOPE
RFID technology in general-
Read range in difficult environments -
Microwave RFID technology (at 2,4GHz and 5,8GHz; passive, semi-active and active) to reduce
the size of antennas, to use the directivity of antennas, etc.
RF development at µ-wave (at 2,4GHz and 5,8GHz; passive, semi-active
and active) e.g. chips, readers, antennas, tags, etc.
system integration in µ-wave RF technology
Research is also needed on how to enable and facilitate the integration of RFID solutions into
global Information Systems:
![Page 45: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/45.jpg)
Providing advanced sensor systems and middleware to facilitate the use of real time
identification and events into manufacturing and maintenance processes.
Extending the RFID-enabled paradigms to the overall process chain along the product life
cycle from e.g. process planning, early problem identification, production order status
tracking, control of specific tasks in the workflow up to after sales services.
New models for data storing, process control and process management to determine which
degree of distributed systems need or can be attached to specific objects in manufacturing
and maintenance processes.
New, human centred solutions for the interaction of the worker with increasingly intelligent
processes and environments.
Defining appropriate methodologies for modelling complex interaction patterns within
distributed business networks, where enhanced RFID based systems for distributed networks
are promising to deliver diverse business benefits. This is specifically important to allow
SMEs to use or contribute to the RFID-enabled solutions.
New approaches for assuring security and trust in networked services (i.e.: considering
safety aspects and financial impact of system breakdown)). Future research shall specifically
address technical as well as organisational issues to be addressed by SME type actors, not
requiring centralised authorities, while aiming at “design for secure and trustful
applications”.
All of the above mentioned research efforts shall be associated with a strong standardisation
effort in order to facilitate the networking of research efforts. A strong and efficient European
standardisation policy is also likely to be a key factor for the success of solutions developed in
Europe.
Moreover the need for standardisation of the technologies associated with RFID (frequencies,
power, read protocols etc…) must also be highlighted.
On the top of that, research work is needed to improve the visibility on the market from both
points of view of supply and demand:
Business models need to be developed to determine the profitability for large organisations
and SME’s to integrate RFID-enabled, networked systems.
![Page 46: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/46.jpg)
A reliable information database shall be made available to entrepreneurs to evaluate the pros
and cons of an RFID project. A network of independent experts shall be developed.
Business models are needed to determine the ROI for chip manufacturers to invest high
amount of money to develop high performance/ high cost chips
However, based on this analysis, the following key research targets were prioritised:
RFID technology for long life, reliable tags that can operate in harsh and metallic
environments.
Extending the RFID-enabled paradigms to the overall process chain along the product life
cycle from e.g. process planning, early problem identification, production order status
tracking, control of specific tasks in the workflow up to after sales services.
Appropriate methodologies for modelling complex interaction patterns and distributed
decision paradigms, also including models for data storing, process control and process
management, within open-loop business networks.
Providing advanced sensor systems to facilitate the use of real time identification and events
into manufacturing and maintenance processes.
Product Safety, Quality and Information
State of the art
At the current point in time, RFID technology is beginning to pervade the domain of trade with
tags being introduced mostly to logistical units such as pallets, but not so much on the item level,
yet. There are already several examples of pilot installations also targeted at consumers, most
notably the Future Store initiative of the Metro group, which is pioneering the trials of RFID
related applications for the benefits of the end consumers.
Manufacturing and production industries are in general still quite hesitant regarding the adoption
of RFID technologies for reasons of missing interoperability standards and also because of lack
of knowledge about best practices. There are however already some success stories in the field of
product safety and quality, even for fast moving goods, such as a project on RFID for the food
supply chain between Chiquita and the RFID Center at the University of Arkansas, in which a
![Page 47: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/47.jpg)
temperature tracking system using RFID is implemented. Similar activities are carried out by the
coffee retailer Starbucks at several distribution sites in the US.
In general however, most producers lack both the knowledge of the respective processes (esp.
with regard to safety regulations) and the potential connections to related technologies that make
sense for integration in the field of product safety and quality such as temperature or humidity
sensors.
Vision
When we regard the issues of product safety and especially product quality, we have the clear
objective to provide detailed information about the history of a product to the end consumer.
This will help to create trust and transparency in sensitive product areas such as perishable or
sensitive goods, but also pharmaceutical and luxury goods and high-value goods, some of which
are highly composite products. Depending on the consumer’s context and demands, correct and
complete information has to be provided. The classical “pull” mode, where consumers actively
search and query for information, could easily be extended by a “push” mode in order to ensure
the provisioning of up-to-date information at the right place, at the right time.
We want to achieve fully RFID-enabled product lifecycle processes for the businesses in the
trade domain. After packaging and labelling the respective cases, pallets, and potentially even
items with RFID tags, information about shipments will be stored and tracked at different stages
in the product lifecycle throughout the complete supply chain. By augmenting this track & trace
information with sensor data regarding relevant properties such as temperature, humidity,
velocities of movement etc. we can enable all intermediaries and the buyers of products to get an
insight into a product’s history and to verify the quality of goods.
Especially when sufficient transparency across company borders is given, the tracking and
tracing of composite products can potentially lead to more efficient quality management when it
comes to exactly locating a faulty batch, production line or manufacturer, and meeting optimal
quality improvement measures or precisely directed recall campaigns.
In the long run and in certain domains, we will see an increase in the utilization of sensor
technologies in general, which allow for contributions to product safety far beyond the typical
![Page 48: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/48.jpg)
track & trace based approaches that are currently being implemented. Especially for certain
product types such as perishable goods there are strong indications that measuring e.g.
temperature or humidity on the way through the supply chains and altering delivery models
accordingly can greatly enhance product quality. Likewise, in some areas, e.g. hazardous goods,
it has already been demonstrated in research trials that embedded, communicating sensors can
help prevent industrial accidents by giving feedback about storage and handling conditions.
Naturally, the ultimate goal of data exchange with the customer requires the previous installation
of respective B2B exchange infrastructures based on global standards. Not-for-profit standards
bodies such as EPCglobal are overseeing the development of an architecture of open standard
interfaces for the necessary large scale B2B infrastructures, based on requirements from end
users and with the active participation of several technology solution providers. The benefit of
such open standards is to foster a competitive marketplace for solutions, in which the end-user
can choose among interoperable solutions from multiple providers. In addition to this, we also
need legislative bodies and institutions in order to establish trust and security among the
respective businesses in the trade domain.
REFERENCES
[1] Takaragi K, Usami M, Imura R, Itsuki R, Satoh T., 2001, “An ultra small individual
recognition security chip,” IEEE MICRO 21 (6), pp. 43-49.
[2] Usami M, Ohki M., 2003, “The mu-chip: An ultra-small 2.45 GHz RFID chip for ubiquitous
recognition applications,” IEICE TRANSACTIONS ON ELECTRONICS (IEICE T
ELECTRON), E86C (4), pp. 521-528.
[3] Strassner B, Chang K., 2003, “Passive 5.8-GHz radio-frequency identification tag for
monitoring oil drill pipe,” IEEE TRANSACTIONS ON MICROWAVE THEORY AND
TECHNIQUES (IEEE T MICROW THEORY)51 (2), pp. 356-363.
[4] 2002, “Florida airport gets first RFID system,” IIE SOLUTIONS 34 (7), pp.14-14.
![Page 49: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/49.jpg)
[5] Irnich W., 2002, “Electronic security systems and active implantable medical devices,”
PACE-PACING AND CLINICAL ELECTROPHYSIOLOGY (PACE), 25 (8), pp. 1235-1258.
[6] Kampers FWH, Rossing W, Eradus WJ., 1999, “The ISO standard for radiofrequency
identification of animals,” COMPUTERS AND ELECTRONICS IN AGRICULTURE
(COMPUT ELECTRON AGR), 24 (1-2), pp. 27-43.
[7] Jansen MB, Eradus W., 1999, “Future developments on devices for animal
radiofrequency identification,” COMPUT ELECTRON AGR 24 (1-2), pp. 109-117.
[8] O’Gorman L, Pavlidis T., 1999, “Auto ID technology: From barcodes to
biometrics,” IEEE ROBOTICS & AUTOMATION MAGAZINE (IEEE ROBOT AUTOM
MAG), 6 (1), pp. 4.
[9] Sakamura K, Koshizuka N., 2001, “The eTRON wide-area distributed-system architecture
for e-commerce,” IEEE MICRO 21 (6), pp. 7-11.
[10] Reynolds DR, Riley JR., 2002, “Remote-sensing, telemetric and computer-based
technologies for investigating insect movement: a survey of existing and potential techniques,”
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 35 (2-3), pp. 271-307.
[11] Hum APJ., “Fabric area network - a new wireless communications infrastructure to enable
ubiquitous networking and sensing on intelligent clothing,” COMPUTER NETWORKS-THE
INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS
NETWORKING (COMPUT NETW), 35 (4), pp. 391-399.
[12] Callahan JM., 2002, “RFID and PC technology pave way to increased profits in aggregate
industry,” CONTROL SOLUTIONS, 75 (7), pp. 20.
![Page 50: Thesis RFID.doc](https://reader031.vdocuments.us/reader031/viewer/2022020921/5695d3411a28ab9b029d4f81/html5/thumbnails/50.jpg)
[13] Ruff TM, Hession-Kunz D., 2001, “Application of radio-frequency identification systems to
collision avoidance in metal/non-metal mines,” IEEE TRANSACTIONS ON INDUSTRY
APPLICATIONS (IEEE T IND APPL), 37 (1), pp. 112-116.
[14] Osman KA, 2000, “Furness A. Potential for two-dimensional codes in
automated manufacturing,” ASSEMBLY AUTOMATION, 20 (1), pp. 52-57. [15] Telford D.,
2000, “The application of high-density codes in engineering,” ASSEMBLY AUTOMATION, 20
(1), pp. 18-23.
[16] Udoka SJ., 1992, “The role of automatic identification (Auto ID) in the computer integrated
manufacturing (CIM) architecture,” COMPUTERS & INDUSTRIAL ENGINEERING
(COMPUT IND ENG), 23 (1-4), pp. 1-5.
[17] Udoka SJ., 1991, “Automated data capture techniques - a prerequisite for effective
integrated manufacturing systems,” COMPUTERS & INDUSTRIAL ENGINEERING
(COMPUT IND ENG), 21 (1-4), pp. 217-221.
[18] Johnson D., 2002, “RFID tags improve tracking, quality on Ford line in Mexico,”
CONTROL ENGINEERING 49 (11), pp. 16-16.