Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction Sensors help to easily keep track of...
-
Upload
easter-eunice-wilkins -
Category
Documents
-
view
215 -
download
0
Transcript of Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction Sensors help to easily keep track of...
IntroductionIntroduction
Sensors help to easily keep track of Sensors help to easily keep track of various informationvarious information• PeoplePeople• ProductsProducts• Chemical CompositionChemical Composition
Each application requires a different Each application requires a different type of sensortype of sensor
Possible Uses on HumansPossible Uses on Humans
IdentificationIdentification SecuritySecurity TrackingTracking Monitoring vital signsMonitoring vital signs Diabetes monitoringDiabetes monitoring Medical purposesMedical purposes
IdentificationIdentification
Use of RFID (radio frequency Use of RFID (radio frequency identification)identification)
Currently in use in form of ID cardsCurrently in use in form of ID cards Possibility of insertion into the bodyPossibility of insertion into the body
• 11 millimeter RFID tags below the right 11 millimeter RFID tags below the right triceptricep
RFID BackgroundRFID Background
A scanner is used which activates the A scanner is used which activates the grain sized sensor which sends grain sized sensor which sends identificationidentification
Sensor will send a unique IDSensor will send a unique IDto identify the personto identify the person
Low-cost solution:Low-cost solution:about 5 cents eachabout 5 cents each
Uses of RFIDUses of RFID
ATMATM• Scans the sensor for identification Scans the sensor for identification
instead of card and passcodeinstead of card and passcode Vending MachinesVending Machines
• Will not need changeWill not need change• By scanning the sensor, will be able to By scanning the sensor, will be able to
bill you laterbill you later
Uses in SecurityUses in Security
Customizing the scanners, specific Customizing the scanners, specific areas can be off limits to people areas can be off limits to people without sensors or with sensors without sensors or with sensors restricted to the arearestricted to the area
Certain devices can be customized Certain devices can be customized so that only a person with correct so that only a person with correct sensor may use itsensor may use it
TrackingTracking
Sensors can be implanted and when Sensors can be implanted and when someone passes by a scanner they someone passes by a scanner they can be trackedcan be tracked
Can be used to track patients with Can be used to track patients with Alzheimer’s disease Alzheimer’s disease
Track prisoners who escape Track prisoners who escape
Monitoring Vital SignsMonitoring Vital Signs
Sensors can be modified to be able Sensors can be modified to be able to monitor vital signsto monitor vital signs
The sensor will continuously be The sensor will continuously be collecting data, and when a scanner collecting data, and when a scanner is in range, transmit the data to itis in range, transmit the data to it
Diabetes MonitorDiabetes Monitor
Instead of drawing blood to monitor Instead of drawing blood to monitor glucose level, a sensor can be used glucose level, a sensor can be used to deliver the data to a patientto deliver the data to a patient
Medical PurposesMedical Purposes
Use of sensors for hearing impaired Use of sensors for hearing impaired and vision impaired patientsand vision impaired patients
Not RFIDNot RFID
Additional Medical PurposesAdditional Medical Purposes
No technology exists for monitoring:No technology exists for monitoring:• Oxygen LevelsOxygen Levels• ElectrolytesElectrolytes
Levels are restricted to a very small Levels are restricted to a very small windowwindow• Potassium: 3 to 5.5 mEq/LPotassium: 3 to 5.5 mEq/L• 1 in 5 hospitalized patients have low 1 in 5 hospitalized patients have low
potassiumpotassium• 14% of patients in doctors’ offices14% of patients in doctors’ offices
Other ApplicationsOther Applications
Embedded in various itemsEmbedded in various items• Product inventory: WalMartProduct inventory: WalMart• MoneyMoney
Problems to OvercomeProblems to Overcome
EnergyEnergy• Changing batteries in embedded tags Changing batteries in embedded tags
will require too much time and moneywill require too much time and money Signal IssuesSignal Issues
• Signal failures, range of use, connection Signal failures, range of use, connection to other protocolsto other protocols
SecuritySecurity• Must be able to trust the scanners and Must be able to trust the scanners and
limit access to specific users/resourceslimit access to specific users/resources
More Problems to OvercomeMore Problems to Overcome
DisruptionDisruption• RFID systems can be easily jammedRFID systems can be easily jammed• Share frequency with Wi-Fi and cell phone Share frequency with Wi-Fi and cell phone
networksnetworks BombardmentBombardment
• Active RFID tags can be attacked continuously Active RFID tags can be attacked continuously so that the battery dies very quicklyso that the battery dies very quickly
CollisionCollision• With the high expected usage of RFID, both With the high expected usage of RFID, both
reader and tag collisions will become commonreader and tag collisions will become common
Energy ProblemsEnergy Problems
Current RFID tags use 2 different Current RFID tags use 2 different battery technologiesbattery technologies• 1. Active:1. Active: Battery-poweredBattery-powered
Strong signalsStrong signalsLong rangeLong range
• 2. Passive:2. Passive: No batteryNo batteryWeak signalsWeak signalsVery short rangeVery short range
Energy ProblemsEnergy Problems
Longest range on record: 12 billion Longest range on record: 12 billion milesmiles• Drawback is very short battery lifeDrawback is very short battery life
Need to develop a method to offer Need to develop a method to offer reasonable range with “infinite” reasonable range with “infinite” batterybattery
Methods to combat bombardmentMethods to combat bombardment
Security ProblemsSecurity Problems
A more secure system is needed, A more secure system is needed, especially with the movement into especially with the movement into skin-embedded sensorsskin-embedded sensors
Must limit what people have access Must limit what people have access to vital, secret informationto vital, secret information
Current RFID tags can be read at any Current RFID tags can be read at any time with no notificationtime with no notification
Security ProblemsSecurity Problems
Unique ID for every individual item in Unique ID for every individual item in storesstores• ID’s will then be tied to credit cardsID’s will then be tied to credit cards• Security problems if tags are stolen, lost Security problems if tags are stolen, lost
or removed from the productsor removed from the products An effective method of destroying An effective method of destroying
stored information after some time is stored information after some time is neededneeded
Preliminary ResolutionsPreliminary Resolutions
Battery life:Battery life:• Rechargeable via wireless technologyRechargeable via wireless technology
Signal range:Signal range:• Use of repeaters to relay signalUse of repeaters to relay signal• Amplified signal may be permitted if Amplified signal may be permitted if
batteries can be recharged easily and batteries can be recharged easily and cost-effectivelycost-effectively
Security:Security:• Setup infrastructure with limited accessSetup infrastructure with limited access
ReferencesReferences
VeriChip: <http://www.4verichip.com>VeriChip: <http://www.4verichip.com> CNN Money: <http://cnnmoney.com>CNN Money: <http://cnnmoney.com> Technovelgy: Technovelgy:
<http://www.technovelgy.com/ct/Technology-<http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=20>Article.asp?ArtNum=20>