thesis rfid.doc

71
Project Thesis On “Radio Frequency Identification(RFID) access control system” Bachelor of Engineering Submitted By: Mr. Ajinkya Wagh Mr. Abhishek Mandlik Mr. Kalyani Karule Ms. Komal Dhoble Under the guidance of Mr. T.R Ravi

Upload: ajinkya-wagh

Post on 01-Feb-2016

219 views

Category:

Documents


0 download

DESCRIPTION

Advertisements for this iconic brand started through the press and print media. Newspapers was the most common medium through which the people came to know about the benefits of eating biscuits as Parle G biscuits were rich in nutritional values thus providing instant energy. The “Dadaji” commercial released in 1989 and it took the visual media of television to unimaginable heights.Parle G brand of biscuits is advertised through televisions, radio, newspapers and magazines. In1997, the company sponsored Shakti man, a tele-series. In 2002, the company introduced G-Man, who was the ambassador for Parle G. This advertisement was appreciated by the children and their parents and therefore went on to become hit

TRANSCRIPT

Page 1: Thesis RFID.doc

Project ThesisOn

“Radio Frequency Identification(RFID) access control system”

Bachelor of Engineering

Submitted By:

Mr. Ajinkya Wagh Mr. Abhishek Mandlik

Mr. Kalyani Karule Ms. Komal Dhoble

Under the guidance ofMr. T.R Ravi

Department of Computer Technology

Yeshwantrao Chavan College of EngineeringWanadongri, Hingna Road, Nagpur – 441 110

Session 2013-14

Page 2: Thesis RFID.doc

CERTIFICTE

Department of Electronics Engineering

Yeshwantrao Chavan College of EngineeringWanadongri, Hingna Road, Nagpur – 441 110

Session 2013-14

This is to certify that the project titled

“Radio Frequency Identification(RFID) access control system”

Has been successfully completed in recognition to the partial fulfillment for the award of the degree of Bachelor of Engineering in Computer Technology Engineering, Rashtrasant Tukdoji Maharaj Nagpur University, by students,

Ms. Komal Dhobale Mr. Abhishek Mandlik

Ms. Kalyani Karule Mr. Ajinkya Wagh

Mr. T.R Ravi Mr. A.R. Patil (Project Guide) (Head of Department)

Page 3: Thesis RFID.doc

ACKNOWLEDGEMENT

First, I would like to express my sincere gratitude and appreciation to our head of

department, Prof. A.R.Patil sir, for his tremendous support, invaluable guidance and constant

encouragement during the course of my studies. The completion of this project and thesis would

not have been possible without our project guide Mr. T.R.Ravi sir’s exceptional supervision and

everlasting support. I am also grateful to him for providing me with various opportunities to

pursue a dynamic and fascinating area of computer as well as explore opportunities out of the

laboratory.

I also wish to thank all the members of YCCE’s Computer department, working with

them made my time during graduate study a wonderful experience. A countless and sincere

thanks also goes to my parents, my family members and my friends, for their continuous support

and encouragement throughout my studies without their companionship, life would not have

been the same.

Page 4: Thesis RFID.doc

ABSTRACT

Radio Frequency Identification (RFID) system is a new wireless data transmission and

reception technique for automatic identification, asset tracking, security surveillance etc.

A RFID system consists of three major components: a reader or integrator, which sends

the interrogation signals to a RFID transponder or tag, which is to be identified; a RFID tag,

which contains the identification code; and a middleware, which maintains the interface and the

software protocol to encode and decode the identification data from the reader into a mainframe

or a personal computer.

Realizing the fact that the barcode and other means for identifications and asset tracking

are inadequate for recent demands, RFID technology has been taking the world of logistics,

supply chain managements, asset tracking, security access control, and many other applications

areas by storm. Communication by Means of Reflected Power. In this project we are using RFID

technology for security purpose, continuous monitoring and wireless control of a peripheral

device from a range of 100 meters. The transmitter and receiver system are used in industries in

various departmental sections.

As the user enters in to the department the RFID tag which is placed on the card of user

is continuously transmitting the radio signals, these signals are captured by the receiver circuit

which is placed on the departmental door, the LCD panel displays the information of the

particular user when he enters in to the department, the time of entrance is displayed

acoordingly,the user is under continuous monitoring by the administrator, there is a switch on

the I card of user, this switch is use to control the laod,the user can make the load on or off by the

tag, this load may be machine on which user works as operator, simultaneously the user is

monitored by administrator.

The PC interfacing is done with the help of RS 232 port cable with RFID receiver

circuit.This project has an advantage that the tags used are multiuser tags which can be at most

used by 8 users. A single tag can be used in diff modes by just changing the positions of jumpers.

The encoding is done by BCD i/p encoder. Here we are using 2 tags which has almost 16

different users. The range of wireless control can be extended further. Thus RFID is used as most

dominant and accurate technology in wireless detection and control systems.

Page 5: Thesis RFID.doc

LIST OF FIGURES

Figure 1- RFID tag

Figure 2- A variety of RFID Tags

Figure 3- RFID Frequencies

Figure 4- A paper hang-tag

Figure 5- Comparison of RFID with Bar code

Figure 6- Receiver IC PIC16F628

Figure 7- Block dig of RFID tag

Figure 8- Communication between host computer and Transponder

Figure 9- LCD display interface

Figure 10- Components used in RFID tag

Figure 11- Antenna

Figure 12- RFID Reader System Architecture

Figure 13- RFID tag PCB layout and component position

Figure 14- RFID receiver PCB layout and component

Page 6: Thesis RFID.doc

CONTENTS

Chapter 1 - Introduction

Chapter 2 - Literature Survey

Chapter 3 - Design Issues

Chapter 4 - Tools

Chapter 5 - Methodology

Chapter 6 - Implementation

Chapter 7 - Results

Chapter 8 - Conclusion

Chapter 9 - Future Scope

Page 7: Thesis RFID.doc

CHAPTER 1

INTRODUCTION

Page 8: Thesis RFID.doc

INTRODUCTION

Executive Summary

Whatever you read about packaging, supply chains, or identification, you will come

across an article or advertisement for Radio Frequency Identification (RFID). Why does it seem

that this technology is being touted as the best thing since sliced bread? And is it just another

piece of hype meant to confuse and make us invest money in another piece of technology?

RFID is evolving as a major technology enabler for identifying and tracking goods and

assets around the world. It can help hospitals locate expensive equipment more quickly to

improve patient care, pharmaceutical companies to reduce counterfeiting, and logistics providers

to improve the management of moveable assets. It also promises to enable new efficiencies in the

supply chain by tracking goods from the point of manufacture through to the retail point of sale

(POS).

As a result of the potential benefits of RFID:

The automotive industry has been using closed-loop RFID systems to track and control

major assemblies within a production plant for over 30 years.

Many of the world's major retailers have mandated RFID tagging for pallets and cases

shipped into their distribution centers to provide better visibility.

There are moves in the defense and aerospace industry to mandate the use of RFID to

improve supply chain visibility and ensure the authenticity of parts.

Regulatory bodies in the United States are moving to the use of pedigrees based on RFID to

prevent the counterfeiting of prescription drugs.

Hospitals are using RFID for patient identification and moveable asset tracking.

RFID tags are being used to track the movement of farm animals to assist with tracking

issues when major animal diseases strike.

But while the technology has received more than its fair share of media coverage

recently, many are still unfamiliar with RFID and the benefits it can offer. In the face of this need

for clear, comprehensive information about RFID and its benefits, this paper defines the

Page 9: Thesis RFID.doc

opportunities offered by the technology for all organizations involved in the production,

movement, or sale of goods. It is equally relevant for organizations wishing to track or locate

existing goods, assets, or equipment.

In addition, the paper seeks to outline the business and technical challenges to RFID

deployment and demonstrates how these issues can be addressed with technology from Microsoft

and its partners. Above all, it explains how Microsoft technology—which provides the software

architecture underpinning the solution rather than the tags or readers—can support the

deployment of RFID-based solutions.

What Is RFID Really?

RFID is the reading of physical tags on single products, cases, pallets, or re-usable

containers that emit radio signals to be picked up by reader devices. These devices and software

must be supported by a sophisticated software architecture that enables the collection and

distribution of location-based information in near real time. The complete RFID picture

combines the technology of the tags and readers with access to global standardized databases,

ensuring real time access to up-to-date information about relevant products at any point in the

supply chain.

Tags contain a unique identification number called an Electronic Product Code (EPC),

and potentially additional information of interest to manufacturers, healthcare organizations,

military organizations, logistics providers, and retailers, or others that need to track the physical

location of goods or equipment. All information stored on RFID tags accompanies items as they

travel through a supply chain or other business process. All information on RFID tags, such as

product attributes, physical dimensions, prices, or laundering requirements, can be scanned

wirelessly by a reader at high speed and from a distance of several meters.

Figure 1- RFID tag

Page 10: Thesis RFID.doc

RFID Bill of Materials

So what is the bill of materials for RFID then? RFID Component parts are:

Tag or Transponder- An RFID tag is a tiny radio device that is also referred to as a

transponder, smart tag, smart label, or radio barcode. The tag comprises a simple silicon

microchip (typically less than half a millimeter in size) attached to a small flat aerial and

mounted on a substrate. The whole device can then be encapsulated in different materials

(such as plastic) dependent upon its intended usage. The finished tag can be attached to an

object, typically an item, box, or pallet, and read remotely to ascertain its identity, position,

or state. For an active tag there will also be a battery.

Figure 2. A variety of RFID Tags

Different Types of RFID

Another complication to the RFID question is that there are different sorts of tags

available in the market. This typing of tags can be done in a number of different ways. The table

in Figure highlights these different typing approaches.

Page 11: Thesis RFID.doc

Table 1. RFID Tags Types

Active or passive Other Classifications

Passive (no battery)

Smaller, Lighter

Shorter range (<3m)

Smaller data storage

Lower cost

Data storage (Programming)

Read Only

Write once

Read/write

Active (with battery)

Larger, Heavier

Longer range (up to 100m)

Larger data storage

Higher cost

Frequencies

Low—135 kHz

VHF—13.5 MHz

UHF—860MHz

Microwave—2.4 GHz

There are several versions of RFID that operate at different radio frequencies. The choice

of frequency is dependent on the business requirements and read environment—it is not a

technology in which 'one size fits all' applications.

Three primary frequency bands are being used for RFID:

Low Frequency (125/134KHz)—Most commonly used for access control, animal tracking,

and asset tracking.

High-Frequency (13.56 MHz)—Used where medium data rate and read ranges up to about 1.5

meters are acceptable. This frequency also has the advantage of not being susceptible to

interference from the presence of water or metals.

Ultra High-Frequency (850 MHz to 950 MHz)—offer the longest read ranges of up to

approximately 3 meters and high reading speeds.

Page 12: Thesis RFID.doc

Figure 3. RFID Frequencies (RFID Center: Dr Carol David Daniel, Introduction to RFID, RFID Forum

December 2004, and RFID Center)

Applications for RFID within the supply chain can be found at multiple frequencies, and

different RFID solutions may be required to meet the varying needs of the marketplace.Since

UHF (Ultra High Frequency) has the range to cover portals and dock-doors, it is gaining industry

support as the frequency of choice for inventory tracking applications, including pallets and

cases.

RFID tags are further broken down into two categories:

Active RFID Tags are battery powered. They broadcast a signal to the reader and can transmit

over the greatest distances (100+ meters). Typically they can cost £5–£20 or more and are used

to track high value goods like vehicles and large containers of goods. Shipboard containers are

a good example of an active RFID tag application.

Passive RFID Tags do not contain a battery. Instead, they draw their power from the radio

wave transmitted by the reader. The reader transmits a low power radio signal through its

antenna to the tag, which in turn receives it through its own antenna to power the integrated

circuit (chip). The tag will briefly converse with the reader for verification and the exchange of

data. As a result, passive tags can transmit information over shorter distances (typically 3

meters or less) than active tags. They have a smaller memory capacity and are considerably

lower in cost (less than £1), making them ideal for tracking lower cost items.

Page 13: Thesis RFID.doc

There are two basic types of chips available on RFID tags: Read-Only and Read-Write:

Read-only chips are programmed with unique information stored on them during the

manufacturing process—often referred to as a 'number plate' application. The information on

read-only chips can not be changed.

With Read-Write chips, the user can add information to the tag or write over existing

information when the tag is within range of the reader. Read-Write chips are more expensive that

Read-only chips. Applications for these may include field service maintenance or 'item attendant

data'—where a maintenance record associated with a mechanical component is stored and

updated on a tag attached to the component. Another method used is something called a

"WORM" chip (Write Once Read Many). It can be written once and then becomes Read-only

afterwards

Page 14: Thesis RFID.doc

CHAPTER 2LITERATURE SURVEY

LITERATURE SURVEY

The information stored in an RFID chip is defined by its read/write characteristics.

Page 15: Thesis RFID.doc

Read-only: For read-only tag, the information stored must be recorded during the manufacturing

process and cannot be typically modified or erased. The data stored normally represents a unique

serial number, which is used as a reference to lookup more details about a particular item in a

host system database. Read-only tags are therefore useful for identifying an object, much like the

“license plate” of a car.

Write-once: These differ from read-only tags in that they allow the end-user to program the

tag’s memory. Therefore, as an item progresses down a conveyor, for example, an end-user can

encode a write-once tag with the item's serial number or part number which cannot be erased.

Read-write: for a read/write tag, data can be written and erased on demand at the point of

application. Since a rewriteable tag can be updated numerous times, its reusability can help to

reduce the number of tags that need to be purchased, and add greater flexibility and intelligence

to the application. Additionally, data can be added as the item moves through the supply chain,

providing better traceability and updated information. Advanced features also include locking,

encryption and disabling the RFID tag. A barcode scanner cannot read more than one barcode at

a time. RFID readers, however, may be driven by specific software applications that can handle

the reading of multiple RFID tags. This feature is called anticollision as it permits a reader to

avoid data collision from several tags that enter the reader’s coverage. RFID systems are

designed to operate at a number of designated frequencies, depending on the application

requirements and local radio-frequency regulations:

a) Low Frequency (125 kHz);

b) High Frequency (13.56MHz);

c) Ultra High Frequency (860-960 MHz)

d) Microwave (2.45 GHz)

Low-frequency tags are typically used for access control & security, manufacturing

processes, harsh environments, and animal identification applications in a variety of industries,

which require short read ranges. Read ranges are inches to several feet. High-frequency tags

were developed as a low cost, small profile alternative to low frequency RFID tags, with the

Page 16: Thesis RFID.doc

ability to be printed or embedded in substrates such as paper. Popular applications include:

library tracking and identification, healthcare patient identification, access control, etc. These

tags have a read range of up to several feet. UHF tags boast greater read distances, superior anti-

collision capabilities increasing the ability to identify a larger number of tags in the field at a

given time. The primary application envisioned for UHF tags, is supply chain tracking.

Microwave tags are mostly used in active RFID systems. Offering long range and high data

transfer speeds, at significantly higher cost per tag, making them more suitable for railroad car

tracking, container tracking, and automated toll collection. Table1 highlights the different

characteristics of the four RFID operating frequency ranges. RFID devices have three primary

elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the

database where information about tagged objects is stored.

The chip, usually made of silicon, contains information about the item to which it is

attached. Chips used by retailers and manufacturers to identify consumer goods may contain an

Electronic Product Code (“EPC”). The EPC is the RFID equivalent of the familiar Universal

Product Code (“UPC”), or bar code, currently imprinted on many products. Bar codes must be

optically scanned, and contain only generic product information. By contrast, EPC chips are

encrypted with a unique product code that identifies the individual product to which it is

attached, and can be read using radio frequency. These codes contain the type of data that

product manufacturers and retailers will use to track the authenticity and location of goods

throughout the supply chain.

An RFID chip may also contain information other than an EPC, such as biometric data (a

digitized image of a fingerprint or photograph, for example).In addition, some chips may not be

loaded with information uniquely identifying the tagged object at all; so-called “electronic article

surveillance systems” (“EAS”) may utilize 3 radio frequency communication to combat

shoplifting, but not to uniquely identify individual items. The RFID tags are used in products as

shown below.

Page 17: Thesis RFID.doc

Automatic Identification

RFID technologies are grouped under the more generic Automatic Identification (Auto-

ID) technologies. Examples of other Auto-ID technologies include Smartcards and Barcodes.

RFID is often positioned as next generation bar coding because of its obvious advantages over

barcodes. However, in many environments it is likely to co-exist with the barcode for a long

time. What advantages does RFID have over these other means of identifying a person, product,

or asset? The real benefits of RFID can be summarized as follows:

Line of sight not required

Durability

Range

Data volume

Multiple read–Speed

Read/Write–Update

Rather than using light to collect or read a number from a bar code, radio waves are used

to read a number from the RFID tag. RFID therefore does not need line-of-sight to operate.

Using radio means that the tag no longer has to be visible on the object to which it is attached;

the tag can be hidden inside the item or box that is to be identified and still be read. This

minimizes or eliminates the need for a person to have to present the reader to the tag, as it can

now be fixed to a wall, for example. As the item is passed by the reader it will be read

automatically, thus giving a potentially large saving in labor costs or substantial increase in the

throughput of scanned items.

Another feature of RFID is the ability to read many tags at the same time. It is not

necessary to present each tag to the reader separately (as is required for barcodes); instead, all

tags within the range of the reader can be read almost simultaneously as they pass the reader.

Again, there is a huge savings potential in not having to manually present the reader to each item

to be identified.

Page 18: Thesis RFID.doc

Furthermore, data can also be written to the tag, a feature that is not possible with

barcodes. This feature has tremendous implications for IT systems and the potential benefits of

RFID.

Figure 5. Comparison of RFID with Bar code

Page 19: Thesis RFID.doc

CHAPTER 3DESIGN ISSUES

Page 20: Thesis RFID.doc

IC 16F628 :-

IC, 8BIT FLASH MCU, 16F628, DIP18Controller Family/Series:PIC16FCore Size:8bitNo. of I/O's:16Program Memory Size:2 KwordsEEPROM Memory Size:128ByteRAM Memory Size:224ByteCPU Speed:20MHzOscillator Type:External, InternalNo. of Timers:3No. of PWM Channels:1Digital IC Case Style:DIPSupply Voltage Range:3V to 5.5VOperating Temperature Range:-40°C to +85°CNo. of Pins:18SVHC:No SVHC (15-Dec-2010)Operating Temperature Max:85°COperating Temperature Min:-40°CClock Frequency:20MHzDevice Marking:PIC16F628A-I/PFlash Memory Size:3.5KBIC Generic Number:16F628IC Temperature Range:IndustrialInterface:USARTLogic Function Number:16F628AMemory Size:2KBMemory Type:FLASHMicroprocessor/Controller Features:BOD, COMP, ICSP, POR, TIMERS, WDTNo. of Bits:8No. of I/O's:16Package / Case:DIPPeripherals:Comparator, PWM, TimerRAM Size:224ByteSupply Voltage Max:5.5VSupply Voltage Min:3VTermination Type:Through Hole

Page 21: Thesis RFID.doc

IC 16F72 :-

Memory Size 2000 BNumber of I/O Pins 22Number of Pins 28Access Time 20.0 µsClock Speed 20.0 MHz (max) Operating Temperature 85.0 °C (max) Supply Voltage (DC) 5.50 V (max) Case / Package SDIP-28Lead-Free Status Lead FreeMounting Type Through HolePackaging BulkRoHS Complian

Page 22: Thesis RFID.doc

CHAPTER 5

METHODOLOGY

METHODOLOGY

Basic block diagram of RFID Tag:-

Page 23: Thesis RFID.doc

Figure 7- Basic block diagram of RFID Tag

The RFID tags can be programmed by programming the microcontroller or by using

microprocessor.Most of the tags has microcontroller.The programming language used for

interfacing is visual basics or by java.The interfacing with pc is done with RS 232 port.

Communication between host computer and Transponder:-

Between the host computers basic three things are. A micro controller, a RFID circuit and

an antenna. The micro controller’s task is to communicate with the host computer and

RFIDcircuit.The micro computer have a serial port, in this case a RS-232 interface. An USB-

interface should be better, not just it more up to date also because it's possible to have power

supply through the serial-port. The microcontroller communicates with the RFID-circuit with

three wire-interfaces. The microcontroller should also acts as buffer on both ways and error.

Page 24: Thesis RFID.doc

Figure 8- Communication between host computer and Transponder

The S6700 Multi Protocol Transceiver IC provides the receive/transmit functions

required to communicate with the three types of transponders that operate in the13.5 MHz ISM

band [8]. A transmit encoder converts the transmitted data stream into the selected protocol;

protocol selection is done in the header of the transmitted data string. The transmitter can provide

up to 200 mW of RF power to a matched 50 Ohm load with a 5 V power supply. Higher output

power can be obtained by an external amplifier. The receive decoder converts the signals from

the RF receiver into a simple data string. The protocol uses a simple three wire serial link

between the transceiver IC and the controller to transmit data and set up data. The antenna could

be printed to the board. This is the LCD Display senses the information of a user or of a product

which is stored in to the memory of RFID tags memory. This is the LCD Display senses the

information of a user or of a product which is stored in to the memory of RFID tags memory.

.

Page 25: Thesis RFID.doc

CHAPTER 6IMPLEMENTATION

Page 26: Thesis RFID.doc

8051 Tx

Rx DATA PIN

PORT 2

RFID TAG

Door

Lock

Figure 9- LCD display interface

Access Control

RFID Readers placed at entrances that require a person to pass their proximity card (RF tag) to

be "read' before the access can be made.

Contact less Payment Systems.

RFID tags used to carry payment information. RFIDs are particular suited to electronic Toll

collection systems. Tags attached to vehicles, or carried by people transmit payment information

to a fixed reader attached to a Toll station. Payments are then routinely deducted from a users

account, or information is changed directly on the RFID tag.

Product Tracking and Inventory Control.

Page 27: Thesis RFID.doc

RFID systems are commonly used to track and record the movement of ordinary items such as

library books, clothes, factory pallets, electrical goods and numerous items.

How do RFIDs work?

Shown below is a typical RFID system. In every RFID system the transponder Tags

contain information. This information can be as little as a single binary bit, or be a large array

of bits representing such things as an identity code, personal medical information, or literally

any type of information that can be stored in digital binary format.

Figure 10- Component used in RFID tag

COMPONENTS OF RFID

A basic RFID system consists of three components:

An antenna or coil

A transceiver (with decoder)

A transponder (RF tag) electronically programmed with unique information

ANTENNA

Page 28: Thesis RFID.doc

The antenna emits radio signals to activate the tag and read and write data to it. Antennas

are the conduits between the tag and the transceiver, which controls the system's data acquisition

and communication. Antennas are available in a variety of shapes and sizes; they can be built

into a door frame to receive tag data from persons or things passing through the door, or mounted

on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field

produced by an antenna can be constantly present when multiple tags are expected continually. If

constant interrogation is not required, a sensor device can activate the field.

Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.

interrogator), which can be configured either as a handheld or a fixed-mount device. The reader

emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its

power output and the radio frequency used. When an RFID tag passes through the

electromagnetic zone, it detects the reader's activation signal. The reader decodes the data

encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer .

.

Figure 11- Antenna

TAGS (Transponders)

An RFID tag is comprised of a microchip containing identifying information and an

antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a

serialized identifier, or license plate number, that uniquely identifies that item, Similar to the way

many bar codes are used today. A key difference, however is that RFID tags have a higher data

capacity than their bar code counterparts. This increases the options for the type of information

that can be encoded on the tag, including the manufacturer, batch or lot number, weight,

Page 29: Thesis RFID.doc

ownership, destination and history (such as the temperature range to which an item has been

exposed). In fact, an unlimited list of other types of information can be stored on RFID tags,

depending on application needs. An RFID tag can be placed on individual items, cases or pallets

for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc.

There are three options in terms of how data can be encoded on tags: (1) Read-only tags

contain data such as a serialized tracking number, which is pre-written onto them by the tag

manufacturer or distributor. These are generally the least expensive tags because they cannot

have any additional information included as they move throughout the supply chain. Any updates

to that information would have to be maintained in the application software that tracks SKU

movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in

production or distribution processes. Again, this may include a serial number, but perhaps other

data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the

tag as needed—and even written over the original data. Examples for the latter capability might

include the time and date of ownership transfer or updating the repair history of a fixed asset.

While these are the most costly of the three tag types and are not practical for tracking

inexpensive items, future standards for electronic product codes (EPC) appear to be headed in

this direction.

RFID TAGS

Data capacity

The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as

much as several thousand bits on the high end. Of course, the greater the storage capacity, the

higher the price per tag.

Page 30: Thesis RFID.doc

Form factor

The tag and antenna structure can come in a variety of physical form factors and can

either be self-contained or embedded as part of a traditional label structure (i.e., the tag is inside

what looks like a regular bar code label—this is termed a 'Smart Label') companies must choose

the appropriate form factors for the tag very carefully and should expect to use multiple form

factors to suit the tagging needs of different physical products and units of measure. For

example, a pallet may have an RFID tag fitted only to an area of protected placement on the

pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that

also provide operators human-readable information and a back-up should the tag fail or pass

through non RFID-capable supply chain links.

Passive versus active

“Passive” tags have no battery and "broadcast" their data only when energized by a

reader. That means they must be actively polled to send information. "Active" tags are capable of

broadcasting their data using their own battery power. In general, this means that the read ranges

are much greater for active tags than they are for passive tags—perhaps a read range of 100 feet

or more, versus 15 feet or less for most passive tags. The extra capability and read ranges of

active tags, however, come with a cost; they are several times more expensive than passive tags.

Today, active tags are much more likely to be used for high-value items or fixed assets such as

trailers, where the cost is minimal compared to item value, and very long read ranges are

required. Most traditional supply chain applications, such as the RFID-based tracking and

compliance programs emerging in the consumer goods retail chain, will use the less expensive

passive tags.

Frequencies

Like all wireless communications, there are a variety of frequencies or spectra through

which RFID tags can communicate with readers. Again, there are trade-offs among cost,

performance and application requirements. For instance, low-frequency tags are cheaper than

ultra high-frequency (UHF) tags, use less power and are better able to penetrate non-metallic

substances. They are ideal for scanning objects with high water content, such as fruit, at close

range. UHF frequencies typically offer better range and can transfer data faster. But they use

Page 31: Thesis RFID.doc

more power and are less likely to pass through some materials. UHF tags are typically best suited

for use with or near wood, paper, cardboard or clothing products. Compared to low-frequency

tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into

a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is

likely that a variety of tag types will be required to solve specific operational issues. You will

want to work with a company that is very knowledgeable in tag and reader technology to

appropriately identify the right mix of RFID technology for your environment and applications.

EPC Tags

EPC refers to "electronic product code," an emerging specification for RFID tags,

readers and business applications first developed at the Auto-ID Center at the Massachusetts

Institute of Technology. This organization has provided significant intellectual leadership toward

the use and application of RFID technology. EPC represents a specific approach to item

identification, including an emerging standard for the tags themselves, including both the data

content of the tag and open wireless communication protocols. In a sense, the EPC movement is

combining the data standards embodied in certain bar code specifications, such as the UPC or

UCC-128 bar code standards, with the wireless data communication standards that have been

developed by ANSI and other groups.

RF Transceiver:

The RF transceiver is the source of the RF energy used to activate and power the

passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it

may be a separate piece of equipment. When provided as a separate piece of equipment, the

transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates

the radio frequencies that the antenna transmits and receives. The transceiver filters and

amplifies the backscatter signal from a passive RFID tag.

Page 32: Thesis RFID.doc

RFID Tag ArchitectureThe architecture of a security-enhanced RFID tag is sketched in figure 3. It consists of four parts: analog frontend, digital controller, EEPROM, and AES module. The analog frontend is responsible for the power supply of the tag which is transmitted from the reader to the tag. Other tasks of the analog frontend are the modulation and demodulation of data and the clock recovery from the carrier frequency. The digital control unit is a finite state machine that handles communication with the reader, implements the anti-collision mechanism, and executes the commands in the protocol. Furthermore, it allows read and write access to the EEPROM and the AES module. The EEPROM stores tag-specific data like the unique ID and the cryptographic key. These data must be retained when the power supply is lost. The security-enhanced RFID tag calculates strong cryptographic authentication with an AES module which is designed for lowpower requirements and low die-size restrictions. The requirements concerning power consumption and chip area and a description of the AES module are presented in the following sections.

Requirements for RFID Tag Design

In order to achieve a significant economic benefit from using RFID systems, tags will need to be priced under US$ 0.10 [15] for simple identification tags and a little bit higher for security-enhanced tags. Additionally to the aspect of low cost, the environmental conditions play a decisive role because contactless identification must work within a distance of a few meters. The limiting factors thereby are the available power supply for the tag and the signal strength for modulation and demodulation. The available power consumption for the digital part of the RFID tag (digital controller and AES module) is amounting to 20 μA.

Estimating the current consumption of the digital controller to 5 μA, 15 μA remain for the AES module which should not exceed a chip area of 5,000 gates. Additionally, the number of authenticated tags per second is about 50. As presented in chapter 3, this leads to an available time slot of 18 ms for encrypting a 128-bit block of data. Our proposed AES architecture, which is presented in section 4.2, encrypts in about 1000 clock cycles. As a consequence, the clock frequency of the AES module can be reduced under 100 kHz. This allows to reach the ambitious power consumption goal.

4.2 AES Architecture

The Advanced Encryption Standard (AES) is a symmetric encryption algorithm which was selected in 2001 by the National Institute of Standards and Technology (NIST) as the Federal Information Processing Standard FIPS-197 [13]. It operates on blocks of data, the so called State, that have a fixed size of 128 bits. The State is organized as a matrix of four rows and four columns of bytes. The defined key lengths are 128 bits, 192 bits, or 256 bits. Our implementation uses a fixed key size of 128 bits. As most symmetric ciphers, AES encrypts an input block by applying the same round function. The ten round function iterations alter the State by applying

Page 33: Thesis RFID.doc

non-linear, linear, and key-dependent transformations. Each transforms the 128-bit State into a modified 128-bit State. Every byte of the State matrix is affected by these transformations:

1. SubBytes substitutes each byte of the State. This operation is non-linear. It is often implemented as a table look-up. Sometimes the SubBytes transformation is called S-Box operation.

2. ShiftRows rotates each row of the State by an offset. The actual value of the offset equals the row index, e.g. the first row is not rotated at all; the last row is rotated three bytes to the left.

3. MixColumns transforms columns of the State. It is a multiplication by a constant polynomial in an extension field of GF(28).

4. AddRoundKey combines the 128-bit State with a 128-bit round key by adding corresponding bits mod 2. This transformation corresponds to a XOR-operation of the State and the round key.

The calculation of the 128-bit round keys works by applying the KeySchedule function. The first

round key is equal to the cipher key. The computation of all other round keys is based on the S-

Box functionality and the Rcon operation. AES is a flexible algorithm for hardware

implementations. A large number of architectures are possible to cover the full range of

applications. AES hardware implementations can be tailored for low die-size demands in

embedded systems or can be optimized for high throughput in server applications. This

flexibility of the AES algorithm was intended by its creators. They paid attention that the

algorithm can be implemented on systems with different bus sizes. Efficient implementations are

possible on 8-bit, 32-bit, 64-bit, and 128-bit platforms. Although many AES hardware

architectures have been proposed, none of the reported architectures meets the requirements of

an AES module for RFID tags regarding low die-size and low power-consumption requirements.

Nearly all of these architectures have GBit throughput rates as optimization goal. This is

contrarious to our needs where throughput is not of concern. Only a few published AES

architectures do not optimize throughput at any cost. of AES which care about hardware

efficiency. All these implementations do not unroll the AES rounds for sake of silicon size. The

more S-Boxes are used, the less clock cycles are needed for encryption. The encryption-only

AES processor of I. able to calculate one AES round in a single clock cycle. The compact 32-bit

AES architecture of S. Mangard et al. in [10] is confident with four S-Boxes and takes eight

cycles for one round. The FGPA implementations of N. Pramstaller et al. [14] and P. Chodowiec

et al. [1] are 32-bit architectures too. They also use four S-Boxes. Four S-Boxes suit a 32-bit

Page 34: Thesis RFID.doc

architecture as each S-Box substitutes 8 bits. The MixColumns operation and the ShiftRows

operation are 32-bit operations too because they transform either four columns bytes or four row

bytes of the AES State. The AddRoundKey operation (128-bit XOR) can also be split-up into 32-

bit operations. Implementing the AES algorithm as a 32-bit architecture allows to quarter the

hardware resources compared to an 128-bit architecture [10, 1]. This comes at the expense of

quadrupling the time for an AES encryption.

Typical Applications for RFID

Automatic Vehicle identification

Inventory Management

Work-in-Process

Container/ Yard Management

Document/ Jewellery tracking

Patient Monitoring

The Advantages of RFID Over Bar Coding

1. No "line of sight" requirements: Bar code reads can sometimes be limited or

problematic due to the need to have a direct "line of sight" between a scanner and

a bar code. RFID tags can be read through materials without line of sight.

2. More automated reading: RFID tags can be read automatically when a tagged

product comes past or near a reader, reducing the labor required to scan product

and allowing more proactive, real-time tracking.

Page 35: Thesis RFID.doc

3. Improved read rates: RFID tags ultimately offer the promise of higher read

rates than bar codes, especially in high-speed operations such as carton sortation.

Figure 12- RFID Reader System Architecture

Figure shows the data flow of the RFID system architecture. RFID readers are devices

that perform the interrogation of RFID transponders. In a passive RFID system the RFID reader

supplies the tag with essential power in order for it to perform modulation of the reader’s

interrogation signal. Therefore, the reader and transponders are in a master-slave relationship

where the reader acts as a master and the transponders as slaves. Nevertheless RFID readers

themselves are in a slave position as well. A software application, also called middleware,

processes data from the RFID reader, acts as the master unit and sends commands to the reader.

This means that all activities of the reader and transponder are initiated by the application

software. In a hierarchical system structure the application software such as enterprise software

represents the master while the reader, as the slave, which is only activated when it receives a

command from the application software, and therefore, the reader perform read or write

operations of RFID transponders that are in its interrogation area.

CIRCUIT EXPLANATION

Page 36: Thesis RFID.doc

Transmitter (RF tag)

The circuit used in this kit used only one IC – the PIC16F628. It is one of the PIC family

of RISC based microcontroller for MICROCHIP. So the IC is program using microcontroller

greatly reduce the component count while providing the more feature than could be found using

dedicated logic the cost is also lower. The PIC 16F628 was choice in this kit because it has a

internal oscillator, eliminating the need for external crystal and loading capacitor.

Fig. 1 shows block diagram of RF Tag. The system comprises the microchip PIC 16F628

microcontroller (U2) and the RF transmitter module (U3). Microcontroller chip is a programmed

to read BCD user code and send the data serially via RF transmitter module.

The 14 Pin microcontroller PIC 16F628 ports RB0 to RB7 as a input port. It’s pulled up

via internal pull-ups and used for user code (BCD) settings. Port RA1 as output port and connect

with the RF Transmitter module. RF Transmitter modulates the data and transmitted in air via

antenna.

RF TRANSMITTER MODULE

RF Rx Module used in remote control application where low cost and longer range is

required .the transmitter operates from a 1.5 to 12 volts supply, making it ideal for battery power

applications. the transmitter employs a SAW-stabilize oscillator, ensuring the accurate frequency

conrol for best range performance. Output power and harmonic emissions are easy to control,

making FCC and ETSI compliance easy.

RECEIVER (RFID reader)

Microcontroller:-

The full ckt of the project is shown in schematic diagram, the brain of the receiver is the

pre programmed mi crocontroller.The ckt comprise microchip PIC 16F72 microcontroller

(U2),434 MHZ RF receiver module, relay, buzzer and 16*2 LCD display.PIC 16F72 is the 8 bit

CMOS microcontroller. Its internal circuitry reducing the need for external component ,thus

reducing the cost and power consumption and enhancing the system reliability.PIC 16F72 is an 8

bit, low cost, high performance flash microcontroller. Its a key feature are the 4K words of the

Page 37: Thesis RFID.doc

flash programmed memory,192 byte of data RAM,11 interupts,3 I/O ports,8 bit ADC and only

35 powerful single- cycle instruction(each 14-bit byte).PIC 16F72 microcontroller is a 28- pin IC

with 3 I/O ports : port A(RA 0 through RA5), port B(RBO through RB7)and ports c(RC0

through RC7). All 22 bi-directional i/o pin are used for RF module interface, LCD display,

buzzer and relay interfacing

The RF RX module

The RF RX module is used in short range remote control applications where cost is

primary concern. The receiver module requires no external module RF comports except for the

antenna, it generates, virtually no emissions, making FCC and ETSI approvals easy .The super-

regenerative design exhibits exceptional sensitivity at a very low cost.

The RF module connect with micro controller port RA2.RF module receive the modulated

data from antenna .In the RF module uses a super-regenerative AM detector to demodulated the

incoming AM carrier (modulated data).Demodulated data gives it to the micro controller. Micro

controllers decode the valid user code and display the information on LCD Display. If valid

user codes receive then operate a relay for five seconds.

Security Considerations for RFID Systems-

RFID systems are susceptible to security attacks: as they work non-line-of-sight and contactless,

an attacker can work remote and passive attacks will not be noticed.Some of the main concerns

are (unwanted) consumer tracking, tag forgery and the unauthorized access to the tag’s memory

content. These security risks have to be dealt with in order to gain a broad user acceptance.

Related Work-

Some publications already deal with security aspects for RFID systems. Juels,Rivest, and Szydlo

propose so called “blocker tags” to protect consumers from tracking. One tag simulates a broad

range of ID numbers, so a reader cannot identify it uniquely and tracking is circumvented. This

was an approach to secure low-price tags

They also address the protection of tag contents and introduce the concept of access control

through mutual authentication of tag and reader. Juels and Pappu make a proposal how to secure

banknotes with RFID tags. They want to reach various security goals, some of them are

Page 38: Thesis RFID.doc

consumer privacy, forgery resistance, and fraud detection. They propose a system which satisfies

the requirements for all of the four main actors: the central bank, them erchants, the executive,

and the consumer. The proposal in this publication is an RFID system using asymmetric

cryptography combined with some methods which require physical access to the tag.

Finally, the this deals with data security of RFID systemsby using authentication mechanisms.

This is also the topic of our paper. We propose using strong cryptographic algorithms to perform

authentication.

Authentication:-

Authentication means that an object proves its claimed identity to its communicationpartner.

This technique can solve all of the former mentioned securityproblems. Consumer tracking can

be avoided, if tags only communicate theiridentity to authenticated readers. An unauthorized

reader cannot get any informationabout tags which are currently in its field. The authentication

of thereader to the tags also solves the unauthorized-access problem. Only authorizedreaders can

read from or write to the tag’s memory. Authentication of a tagmeans that the tag proves its

identity to the reader. A forged tag cannot convince the reader of its authenticity, so forgery of

tags can be circumvented. Menezes, Oorschot, and Vanstone [12] differentiate between three

authentication methods: password systems (weak authentication), challenge-response

authentication (strong authentication), and customized and zero-knowledge authentication.

Password systems offer a weak level of security and zero-knowledgetechniques are often related

to “strong” mathematical problems which are very costly in calculation and implementation. So

we aim for the second type, the challenge-response techniques, which are broadly used. There

are asymmetric and symmetric challenge-response techniques. The disadvantage of asymmetric

authentication methods is that they are very time consuming and costly to implement in

hardware. So, they are not the first choice for RFID systems. There were attempts to design

resource-saving asymmetric authentication algorithms. NTRU [5] has been proposed for RFID

system implementations more suitable for closed systems. In closed systems each component can

be controlled by one central instance. All devices can get their keys and key updates easily from

the central control instance. In open systems, where the components can join the system

Page 39: Thesis RFID.doc

unsolicited and no central control instance is available, key distribution and management is more

difficult.

In airport luggage tracking systems each controlled bag can be equipped with an RFID tag and

can be tracked throughout the whole airport. All assigned tag numbers are stored in a central

server. In that way automated cargo and baggage transportation systems as well as security

applications are possible (access control, checking if the holder of the bag is in the same plane as

the luggage, etc.)

Tag forgery and unauthorized access to the tag’s memory should be avoided. Luggage tracking

should also only be possible for authorized readers. During transportation, RFID systems can be

used to track and route goods on their way from the factory to the retailer. Here, theft and loss of

goods can be rapidly detected, but the substitution with forged goods can only be avoided by

using tag authentication mechanisms. Authentication of the reader could be used to prohibit

unauthorized persons from spying the content of cargo. Tag memory can be used to record

environmental incidents (for example, the disruption of the cold chain when transporting food).

In this case, memory access must be secured by using reader authentication to prevent

unauthorized memory manipulation.

Another application are car immobilizers, where symmetric authentication is already in use. In

general, these implementations use proprietary encryption algorithms, which are optimized for

the specific application. The security of these algorithms cannot be evaluated. Using AES would

add some extra security. As a final example, for proof of origin of goods authentication is

essential. In the next section we propose a method to integrate an one-way authentication

protocol into existing RFID standards.

Page 40: Thesis RFID.doc

CHAPTER – 7

RESULTS

Page 41: Thesis RFID.doc

The RFID system is easy to use ,flexible and efficient wireless technology while

practically instaling on Industrial level.This technology has a secured medium of

communication and that can be controlled with the help of RFID tags.Diffrent tags are used on

concept level basis in our project.Further extension can be made through interfacing the circuit

with PC and hence the outcome is displayed on monitor screen.

Page 42: Thesis RFID.doc

CHAPTER – 8

CONCLUSION

CONCLUSION:-

There is an accelerating trend in the adoption of RFID technology for various industrial

and consumer applications. The full potential of this technology has not yet been realized in

practice. There is sufficient potential for systems integrators who need to address the

requirements of customers and help integrate RFID based systems into enterprise wide

Management Information Systems networks. Business leaders need to look at this new

Page 43: Thesis RFID.doc

technology more closely because it has the potential for value addition to any business engaged

in large-scale data processing in any form. So far, the technology has gained prominence in retail

and supply chain management. Its use in manufacturing has not yet reached the critical point but

that is only a matter of time. The hardware is available. Cost effective and robust components are

available with tags able to withstand even high temperatures like those found in baking ovens.

Miniaturization and moisture resistance are no longer the issues. Many businesses selling RFID

solutions are well entrenched but there is room for more. The RFID technology will play an

increasingly important role in the manufacturing and wireless Internet manufacturing in the

future.

Page 44: Thesis RFID.doc

CHAPTER – 9

FUTURE SCOPE

RFID technology in general-

Read range in difficult environments -

Microwave RFID technology (at 2,4GHz and 5,8GHz; passive, semi-active and active) to reduce

the size of antennas, to use the directivity of antennas, etc.

RF development at µ-wave (at 2,4GHz and 5,8GHz; passive, semi-active

and active) e.g. chips, readers, antennas, tags, etc.

system integration in µ-wave RF technology

Research is also needed on how to enable and facilitate the integration of RFID solutions into

global Information Systems:

Page 45: Thesis RFID.doc

Providing advanced sensor systems and middleware to facilitate the use of real time

identification and events into manufacturing and maintenance processes.

Extending the RFID-enabled paradigms to the overall process chain along the product life

cycle from e.g. process planning, early problem identification, production order status

tracking, control of specific tasks in the workflow up to after sales services.

New models for data storing, process control and process management to determine which

degree of distributed systems need or can be attached to specific objects in manufacturing

and maintenance processes.

New, human centred solutions for the interaction of the worker with increasingly intelligent

processes and environments.

Defining appropriate methodologies for modelling complex interaction patterns within

distributed business networks, where enhanced RFID based systems for distributed networks

are promising to deliver diverse business benefits. This is specifically important to allow

SMEs to use or contribute to the RFID-enabled solutions.

New approaches for assuring security and trust in networked services (i.e.: considering

safety aspects and financial impact of system breakdown)). Future research shall specifically

address technical as well as organisational issues to be addressed by SME type actors, not

requiring centralised authorities, while aiming at “design for secure and trustful

applications”.

All of the above mentioned research efforts shall be associated with a strong standardisation

effort in order to facilitate the networking of research efforts. A strong and efficient European

standardisation policy is also likely to be a key factor for the success of solutions developed in

Europe.

Moreover the need for standardisation of the technologies associated with RFID (frequencies,

power, read protocols etc…) must also be highlighted.

On the top of that, research work is needed to improve the visibility on the market from both

points of view of supply and demand:

Business models need to be developed to determine the profitability for large organisations

and SME’s to integrate RFID-enabled, networked systems.

Page 46: Thesis RFID.doc

A reliable information database shall be made available to entrepreneurs to evaluate the pros

and cons of an RFID project. A network of independent experts shall be developed.

Business models are needed to determine the ROI for chip manufacturers to invest high

amount of money to develop high performance/ high cost chips

However, based on this analysis, the following key research targets were prioritised:

RFID technology for long life, reliable tags that can operate in harsh and metallic

environments.

Extending the RFID-enabled paradigms to the overall process chain along the product life

cycle from e.g. process planning, early problem identification, production order status

tracking, control of specific tasks in the workflow up to after sales services.

Appropriate methodologies for modelling complex interaction patterns and distributed

decision paradigms, also including models for data storing, process control and process

management, within open-loop business networks.

Providing advanced sensor systems to facilitate the use of real time identification and events

into manufacturing and maintenance processes.

Product Safety, Quality and Information

State of the art

At the current point in time, RFID technology is beginning to pervade the domain of trade with

tags being introduced mostly to logistical units such as pallets, but not so much on the item level,

yet. There are already several examples of pilot installations also targeted at consumers, most

notably the Future Store initiative of the Metro group, which is pioneering the trials of RFID

related applications for the benefits of the end consumers.

Manufacturing and production industries are in general still quite hesitant regarding the adoption

of RFID technologies for reasons of missing interoperability standards and also because of lack

of knowledge about best practices. There are however already some success stories in the field of

product safety and quality, even for fast moving goods, such as a project on RFID for the food

supply chain between Chiquita and the RFID Center at the University of Arkansas, in which a

Page 47: Thesis RFID.doc

temperature tracking system using RFID is implemented. Similar activities are carried out by the

coffee retailer Starbucks at several distribution sites in the US.

In general however, most producers lack both the knowledge of the respective processes (esp.

with regard to safety regulations) and the potential connections to related technologies that make

sense for integration in the field of product safety and quality such as temperature or humidity

sensors.

Vision

When we regard the issues of product safety and especially product quality, we have the clear

objective to provide detailed information about the history of a product to the end consumer.

This will help to create trust and transparency in sensitive product areas such as perishable or

sensitive goods, but also pharmaceutical and luxury goods and high-value goods, some of which

are highly composite products. Depending on the consumer’s context and demands, correct and

complete information has to be provided. The classical “pull” mode, where consumers actively

search and query for information, could easily be extended by a “push” mode in order to ensure

the provisioning of up-to-date information at the right place, at the right time.

We want to achieve fully RFID-enabled product lifecycle processes for the businesses in the

trade domain. After packaging and labelling the respective cases, pallets, and potentially even

items with RFID tags, information about shipments will be stored and tracked at different stages

in the product lifecycle throughout the complete supply chain. By augmenting this track & trace

information with sensor data regarding relevant properties such as temperature, humidity,

velocities of movement etc. we can enable all intermediaries and the buyers of products to get an

insight into a product’s history and to verify the quality of goods.

Especially when sufficient transparency across company borders is given, the tracking and

tracing of composite products can potentially lead to more efficient quality management when it

comes to exactly locating a faulty batch, production line or manufacturer, and meeting optimal

quality improvement measures or precisely directed recall campaigns.

In the long run and in certain domains, we will see an increase in the utilization of sensor

technologies in general, which allow for contributions to product safety far beyond the typical

Page 48: Thesis RFID.doc

track & trace based approaches that are currently being implemented. Especially for certain

product types such as perishable goods there are strong indications that measuring e.g.

temperature or humidity on the way through the supply chains and altering delivery models

accordingly can greatly enhance product quality. Likewise, in some areas, e.g. hazardous goods,

it has already been demonstrated in research trials that embedded, communicating sensors can

help prevent industrial accidents by giving feedback about storage and handling conditions.

Naturally, the ultimate goal of data exchange with the customer requires the previous installation

of respective B2B exchange infrastructures based on global standards. Not-for-profit standards

bodies such as EPCglobal are overseeing the development of an architecture of open standard

interfaces for the necessary large scale B2B infrastructures, based on requirements from end

users and with the active participation of several technology solution providers. The benefit of

such open standards is to foster a competitive marketplace for solutions, in which the end-user

can choose among interoperable solutions from multiple providers. In addition to this, we also

need legislative bodies and institutions in order to establish trust and security among the

respective businesses in the trade domain.

REFERENCES

[1] Takaragi K, Usami M, Imura R, Itsuki R, Satoh T., 2001, “An ultra small individual

recognition security chip,” IEEE MICRO 21 (6), pp. 43-49.

[2] Usami M, Ohki M., 2003, “The mu-chip: An ultra-small 2.45 GHz RFID chip for ubiquitous

recognition applications,” IEICE TRANSACTIONS ON ELECTRONICS (IEICE T

ELECTRON), E86C (4), pp. 521-528.

[3] Strassner B, Chang K., 2003, “Passive 5.8-GHz radio-frequency identification tag for

monitoring oil drill pipe,” IEEE TRANSACTIONS ON MICROWAVE THEORY AND

TECHNIQUES (IEEE T MICROW THEORY)51 (2), pp. 356-363.

[4] 2002, “Florida airport gets first RFID system,” IIE SOLUTIONS 34 (7), pp.14-14.

Page 49: Thesis RFID.doc

[5] Irnich W., 2002, “Electronic security systems and active implantable medical devices,”

PACE-PACING AND CLINICAL ELECTROPHYSIOLOGY (PACE), 25 (8), pp. 1235-1258.

[6] Kampers FWH, Rossing W, Eradus WJ., 1999, “The ISO standard for radiofrequency

identification of animals,” COMPUTERS AND ELECTRONICS IN AGRICULTURE

(COMPUT ELECTRON AGR), 24 (1-2), pp. 27-43.

[7] Jansen MB, Eradus W., 1999, “Future developments on devices for animal

radiofrequency identification,” COMPUT ELECTRON AGR 24 (1-2), pp. 109-117.

[8] O’Gorman L, Pavlidis T., 1999, “Auto ID technology: From barcodes to

biometrics,” IEEE ROBOTICS & AUTOMATION MAGAZINE (IEEE ROBOT AUTOM

MAG), 6 (1), pp. 4.

[9] Sakamura K, Koshizuka N., 2001, “The eTRON wide-area distributed-system architecture

for e-commerce,” IEEE MICRO 21 (6), pp. 7-11.

[10] Reynolds DR, Riley JR., 2002, “Remote-sensing, telemetric and computer-based

technologies for investigating insect movement: a survey of existing and potential techniques,”

COMPUTERS AND ELECTRONICS IN AGRICULTURE, 35 (2-3), pp. 271-307.

[11] Hum APJ., “Fabric area network - a new wireless communications infrastructure to enable

ubiquitous networking and sensing on intelligent clothing,” COMPUTER NETWORKS-THE

INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS

NETWORKING (COMPUT NETW), 35 (4), pp. 391-399.

[12] Callahan JM., 2002, “RFID and PC technology pave way to increased profits in aggregate

industry,” CONTROL SOLUTIONS, 75 (7), pp. 20.

Page 50: Thesis RFID.doc

[13] Ruff TM, Hession-Kunz D., 2001, “Application of radio-frequency identification systems to

collision avoidance in metal/non-metal mines,” IEEE TRANSACTIONS ON INDUSTRY

APPLICATIONS (IEEE T IND APPL), 37 (1), pp. 112-116.

[14] Osman KA, 2000, “Furness A. Potential for two-dimensional codes in

automated manufacturing,” ASSEMBLY AUTOMATION, 20 (1), pp. 52-57. [15] Telford D.,

2000, “The application of high-density codes in engineering,” ASSEMBLY AUTOMATION, 20

(1), pp. 18-23.

[16] Udoka SJ., 1992, “The role of automatic identification (Auto ID) in the computer integrated

manufacturing (CIM) architecture,” COMPUTERS & INDUSTRIAL ENGINEERING

(COMPUT IND ENG), 23 (1-4), pp. 1-5.

[17] Udoka SJ., 1991, “Automated data capture techniques - a prerequisite for effective

integrated manufacturing systems,” COMPUTERS & INDUSTRIAL ENGINEERING

(COMPUT IND ENG), 21 (1-4), pp. 217-221.

[18] Johnson D., 2002, “RFID tags improve tracking, quality on Ford line in Mexico,”

CONTROL ENGINEERING 49 (11), pp. 16-16.