Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction Sensors help to easily keep track of...

21
Embedded Wireless Embedded Wireless Sensors Sensors Tony Arous Tony Arous Vincent Yu Vincent Yu

Transcript of Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction Sensors help to easily keep track of...

Embedded Wireless Embedded Wireless SensorsSensors

Tony ArousTony Arous

Vincent YuVincent Yu

IntroductionIntroduction

Sensors help to easily keep track of Sensors help to easily keep track of various informationvarious information• PeoplePeople• ProductsProducts• Chemical CompositionChemical Composition

Each application requires a different Each application requires a different type of sensortype of sensor

Possible Uses on HumansPossible Uses on Humans

IdentificationIdentification SecuritySecurity TrackingTracking Monitoring vital signsMonitoring vital signs Diabetes monitoringDiabetes monitoring Medical purposesMedical purposes

IdentificationIdentification

Use of RFID (radio frequency Use of RFID (radio frequency identification)identification)

Currently in use in form of ID cardsCurrently in use in form of ID cards Possibility of insertion into the bodyPossibility of insertion into the body

• 11 millimeter RFID tags below the right 11 millimeter RFID tags below the right triceptricep

RFID BackgroundRFID Background

A scanner is used which activates the A scanner is used which activates the grain sized sensor which sends grain sized sensor which sends identificationidentification

Sensor will send a unique IDSensor will send a unique IDto identify the personto identify the person

Low-cost solution:Low-cost solution:about 5 cents eachabout 5 cents each

Uses of RFIDUses of RFID

ATMATM• Scans the sensor for identification Scans the sensor for identification

instead of card and passcodeinstead of card and passcode Vending MachinesVending Machines

• Will not need changeWill not need change• By scanning the sensor, will be able to By scanning the sensor, will be able to

bill you laterbill you later

Uses in SecurityUses in Security

Customizing the scanners, specific Customizing the scanners, specific areas can be off limits to people areas can be off limits to people without sensors or with sensors without sensors or with sensors restricted to the arearestricted to the area

Certain devices can be customized Certain devices can be customized so that only a person with correct so that only a person with correct sensor may use itsensor may use it

TrackingTracking

Sensors can be implanted and when Sensors can be implanted and when someone passes by a scanner they someone passes by a scanner they can be trackedcan be tracked

Can be used to track patients with Can be used to track patients with Alzheimer’s disease Alzheimer’s disease

Track prisoners who escape Track prisoners who escape

Monitoring Vital SignsMonitoring Vital Signs

Sensors can be modified to be able Sensors can be modified to be able to monitor vital signsto monitor vital signs

The sensor will continuously be The sensor will continuously be collecting data, and when a scanner collecting data, and when a scanner is in range, transmit the data to itis in range, transmit the data to it

Diabetes MonitorDiabetes Monitor

Instead of drawing blood to monitor Instead of drawing blood to monitor glucose level, a sensor can be used glucose level, a sensor can be used to deliver the data to a patientto deliver the data to a patient

Medical PurposesMedical Purposes

Use of sensors for hearing impaired Use of sensors for hearing impaired and vision impaired patientsand vision impaired patients

Not RFIDNot RFID

Additional Medical PurposesAdditional Medical Purposes

No technology exists for monitoring:No technology exists for monitoring:• Oxygen LevelsOxygen Levels• ElectrolytesElectrolytes

Levels are restricted to a very small Levels are restricted to a very small windowwindow• Potassium: 3 to 5.5 mEq/LPotassium: 3 to 5.5 mEq/L• 1 in 5 hospitalized patients have low 1 in 5 hospitalized patients have low

potassiumpotassium• 14% of patients in doctors’ offices14% of patients in doctors’ offices

Other ApplicationsOther Applications

Embedded in various itemsEmbedded in various items• Product inventory: WalMartProduct inventory: WalMart• MoneyMoney

Problems to OvercomeProblems to Overcome

EnergyEnergy• Changing batteries in embedded tags Changing batteries in embedded tags

will require too much time and moneywill require too much time and money Signal IssuesSignal Issues

• Signal failures, range of use, connection Signal failures, range of use, connection to other protocolsto other protocols

SecuritySecurity• Must be able to trust the scanners and Must be able to trust the scanners and

limit access to specific users/resourceslimit access to specific users/resources

More Problems to OvercomeMore Problems to Overcome

DisruptionDisruption• RFID systems can be easily jammedRFID systems can be easily jammed• Share frequency with Wi-Fi and cell phone Share frequency with Wi-Fi and cell phone

networksnetworks BombardmentBombardment

• Active RFID tags can be attacked continuously Active RFID tags can be attacked continuously so that the battery dies very quicklyso that the battery dies very quickly

CollisionCollision• With the high expected usage of RFID, both With the high expected usage of RFID, both

reader and tag collisions will become commonreader and tag collisions will become common

Energy ProblemsEnergy Problems

Current RFID tags use 2 different Current RFID tags use 2 different battery technologiesbattery technologies• 1. Active:1. Active: Battery-poweredBattery-powered

Strong signalsStrong signalsLong rangeLong range

• 2. Passive:2. Passive: No batteryNo batteryWeak signalsWeak signalsVery short rangeVery short range

Energy ProblemsEnergy Problems

Longest range on record: 12 billion Longest range on record: 12 billion milesmiles• Drawback is very short battery lifeDrawback is very short battery life

Need to develop a method to offer Need to develop a method to offer reasonable range with “infinite” reasonable range with “infinite” batterybattery

Methods to combat bombardmentMethods to combat bombardment

Security ProblemsSecurity Problems

A more secure system is needed, A more secure system is needed, especially with the movement into especially with the movement into skin-embedded sensorsskin-embedded sensors

Must limit what people have access Must limit what people have access to vital, secret informationto vital, secret information

Current RFID tags can be read at any Current RFID tags can be read at any time with no notificationtime with no notification

Security ProblemsSecurity Problems

Unique ID for every individual item in Unique ID for every individual item in storesstores• ID’s will then be tied to credit cardsID’s will then be tied to credit cards• Security problems if tags are stolen, lost Security problems if tags are stolen, lost

or removed from the productsor removed from the products An effective method of destroying An effective method of destroying

stored information after some time is stored information after some time is neededneeded

Preliminary ResolutionsPreliminary Resolutions

Battery life:Battery life:• Rechargeable via wireless technologyRechargeable via wireless technology

Signal range:Signal range:• Use of repeaters to relay signalUse of repeaters to relay signal• Amplified signal may be permitted if Amplified signal may be permitted if

batteries can be recharged easily and batteries can be recharged easily and cost-effectivelycost-effectively

Security:Security:• Setup infrastructure with limited accessSetup infrastructure with limited access

ReferencesReferences

VeriChip: <http://www.4verichip.com>VeriChip: <http://www.4verichip.com> CNN Money: <http://cnnmoney.com>CNN Money: <http://cnnmoney.com> Technovelgy: Technovelgy:

<http://www.technovelgy.com/ct/Technology-<http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=20>Article.asp?ArtNum=20>