Presentation

31
RFID RFID Prepared by Rui Wang Ram Katepally

description

 

Transcript of Presentation

Page 1: Presentation

RFIDRFID

Prepared byRui Wang

Ram Katepally

Page 2: Presentation

Any Guesses??

Page 3: Presentation

AgendaAgenda

• Introduction and Background• Physical Components• Data Transactions• Data Management • Applications• Conclusion

Page 4: Presentation

What is RFID?

Page 5: Presentation

IBM Commercial for RFID Supply Chain

Page 6: Presentation

RFIDRFID

• Its first use is in World War II.

• Global RFID Market spent $2.7 billion in 2006, and is projecting $26.2 Billion By 2016.

• More and more companies are looking forward to deploying RFID.

Page 7: Presentation

• RFID Tag(a.k.a Transponder)

Physical ComponentsPhysical Components

Page 8: Presentation

Physical ComponentsPhysical Components

• RFID Reader(a.ka Interrogator)

Fixed Reader Handheld Reader PlugNPlay Readers

Microprocessor + Circuit board + Antenna

Page 9: Presentation

How do they work together?How do they work together?

Reader(Transceiver Antenna)

Tag(Transponder)

2

1

Passive Mode

Page 10: Presentation

• Active Mode Built-in Battery makes tags broadcasting, reader

becomes the listener

• Semi-active Mode passive mode with battery assisting

Page 11: Presentation

RF Electromagnetic spectrumRF Electromagnetic spectrum

Works better on metal and water products

Longer reading range, and faster reading speed

Page 12: Presentation

RFID StandardsRFID Standards

Page 13: Presentation

RFID data ArchitectureRFID data Architecture

Enterprise System

Middleware

Readers

Tags

Items

Enterprise Interface

Feature Implementation

Reader Interface

Page 14: Presentation

Elements of an RFID System

Page 15: Presentation

Ubiquitous RFID data Readers

Page 16: Presentation

RFID Data

• Data generated from an RFID application is seen as a stream of RFID tuples of the form EPC, location, time.

• large amount of data redundancy• Compressing multiple items that stay together

at a single location is vital in order to reduce the enormous size of the cleansed RFID database.

Page 17: Presentation

RFID Data Analysis

• The essence of RFID is automated data collection

• Databases are thus a critical part of most RFID systems

Page 18: Presentation
Page 19: Presentation

RFID data management & Challenges

• How to interpret the enormous volume of data that an RFID application generates?

• Walmart generates around 7 terabytes of data every day.

• Database vendors like Oracle, IBM and Teradata provide solutions to integrate RFID information into enterprise data warehouses.

Page 20: Presentation

RFID Back-End Database

• The RFID system has several RFID readers at the front-end, and a database at the back-end

• Real-life RFID deployments employ a wide variety of physically distributed RFID readers, access gateways, management interfaces, and databases.

RFID TAGID ContainerContents

123 Apples

234 Pears

Page 21: Presentation

RFID Back-End Database(cntd..)

Page 22: Presentation
Page 23: Presentation

Data Architecture(cntd..)

• Node servers Reside inside the reader hardware and check if tags

are registered.

• Cluster Server - Routes tag reads from node servers to interface

servers for applications. - Also periodically checks with node servers to make

sure they are still running.

Page 24: Presentation

Data Architecture(cntd..)

• Interface Server - Based on the raw data from cluster server, Interface

server computes higher level events. - Maintain connection with applications - Also respond to event Queries by applications

• Application Server - Runs the application logic and UI.

Page 25: Presentation

Smart Card Commercial

Page 26: Presentation

Case Study - RFID Credit Cards

• RFID chip or contactless smart card chip• require only physical proximity of credit card

and the reader• Use a small radio transponder that is

energized and interrogated by a reader

According to Visa "This has been the fastest acceptance of new payment technology in the history of the industry"

Page 27: Presentation

• RFID card readers capture the information such as:

• Cardholder Name• Complete credit card number• Credit card expiration date• Credit card type• Information about software version and

supported communications protocols

Page 28: Presentation

Security Threats of RFID Smart Cards

• Skimming Attack - No cryptography or passwords were required to obtain this data

• Eavesdropping Attack- Captures a copy of transmission between a legitimate credit card

reader and an RFID credit card.

Page 29: Presentation

Security of Tags and Readers

Page 30: Presentation

ConclusionConclusion

Pros• No line of sight required• Enable automated process• Read multiple tags• Increase accuracy

Cons:• Costly

Page 31: Presentation

Questions?