SEED -RFID

download SEED -RFID

of 15

Transcript of SEED -RFID

  • 8/21/2019 SEED -RFID

    1/40

    Embedded / Robotics / Communication | SEED Organization

    SEED RFID

  • 8/21/2019 SEED -RFID

    2/40

    RFID

    d

    INTRODUCTION

     Almost every product in the market has a barcode printed on it.

    Barcodes are machine-readable parallel bars that store binary information,

    revealin information about the product. !hus, it acts as the product

    "nerprint. As #e o to the supermarket to buy thins, the checkout person

    runs our selection over the scanner to scan the barcode, there$s an audible

    beep, and #e are told ho# much money #e o#e.

    But the days of barcode are numbered. !he reason is that a

    technoloy called radiofre%uency identi"cation &R'()* is catchin on R'()

    tas are bein used by corporations to track people and products in +ust

    about every industry. !hey transform everyday ob+ects like caro

    containers, car keys, and even clothes on the rack at a shoppin mall into

    mini nodes on a net#ork. )atabases then record the location and status of 

    these net#ork nodes to determine product movements.

    !his technoloy can completely replace barcodes.

    !he automotive industry makes use of small R'() tas that oer a hih

    level of security at lo# cost.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    3/40

    RFID

    d

     A lot of developments are takin place in R'() technoloy that #ill chane

    the course of the industry, particularly in the supply chain area.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    4/40

    RFID

    d

    TRANSPONDER 

     A ta is any device or label that identi"es the host to #hich it is

    attached. (t typically does not hinder the operation of the host or adverselyaect its appearance.

    !he #ord transponder is derived from the #ords transmitter and

    responder. !he ta responds to a transmitted or communicated re%uest for

    the data it carries.

    'i. !ransponder Block )iaram

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    ANALOG CIRCUITRY 

      D R*SFER

      +,ER S++/

     

    DIGITAL CIRCUITRY 

    ,*R,/ /,2I

    SERI /,2I

    I*ER*/

    /,2I34IR,+R,ES,R

      EE+R,4

      R,4

      R4

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    5/40

    RFID

    d

    !he transponder memory may comprise of read-only &R*, random

    access &RA*, and non-volatile prorammable memory for data storae

    dependin on the type and sophistication of the device. !he R-based

    memory is used to accommodate security data and the transponder

    operatin system instructions #hich in con+unction #ith the processor or

    processin loic deals #ith the internal 0house-keepin$ functions like

    response delay timin, data 1o# control and supply s#itchin. !he RA-

    based memory is used for temporary data storae durin transponder

    interroation and response. !he non-volatile prorammable memory may be

    of several types of #hich the electrically erasable prorammable read-only

    memory &EE2R* is the most common. (t is used to store the transponder

    data and needs to be non-volatile to ensure that the data is retained #hen

    the device is in its %uiescent or po#er-savin 0sleep$ state.

    )ata buers are further components of memory used to temporarily

    hold the incomin data follo#in demodulation and outoin data for

    modulation and interface #ith the transponder antenna. !he interface

    circuitry provides the facility to direct and accommodate the interroation

    "eld enery for po#erin purposes in passive transponders and trierin

    of the transponder response. !he transponder antenna senses the

    interroatin "eld and serves as the means for transmittin the transponder

    response for interroation.3

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    6/40

    RFID

    d

    CLASSIFICATION OF TAGS

    n the basis of the presence of battery, tas can be classi"ed into

    active or passive tas.

     Active tas are po#ered by an internal battery and are enerally

    read/#rite devices. !hey contain a cell havin a hih po#er to #eiht ratio

    and are capable of operatin over a temperature rane of -45 to 675 deree

    Celsius. Active tas have a "nite life time. A suitable cell coupled to suitable

    lo# po#er circuitry can ensure functionality of ten or more years dependin

    on operatin temperatures, read/#rite cycles and usae. !hey have reater

    si8e and increased cost compared to passive tas.

    2assive tas operate #ithout an internal battery source, derivin thepo#er to operate from the "eld enerated by the reader. !hey are hence

    lihter than active tas and have reater life time. !hey have shorter read

    ranes compared to active tas. !hey are also constrained in their ability to

    store data and perform #ell in electromanetically noisy environments.

    R'() tas can also be classi"ed on the basis of couplin into

    inductively and capacitively coupled tas.

    (nductively coupled R'() tas consist of the silicon microprocessor

    #hich vary in si8e dependin on their purpose and metal coil #hich is made

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    7/40

    RFID

    d

    of copper or aluminum #ire that is #ound into a circular pattern on the

    transponder. !his coil acts as the ta$s antenna. !he ta transmits sinal to

    the reader #ith the read distance determined by the si8e of the coil

    antenna. (t also consists of an encapsulatin material of lass or polymer

    that #raps around the chip and coil. (nductively coupled R'() tas are

    po#ered by the manetic "eld enerated by the reader .!he ta$s antenna

    picks up the manetic enery and the ta communicates #ith the reader.

    !he ta then modulates the manetic "eld in order to retrieve and transmit

    data back to the reader. )ata #hich is transmitted back to the reader is

    directed to the host computer. !hese tas are e9pensive due to the silicon,

    the coil antenna and the process that is needed to #ind the coil around the

    surface of the ta.

    Capacitively coupled R'() tas consist of an R'() chip and an

    antenna made from t#o plate electrodes. !he readin mechanism bet#een

    the ta and the reader is throuh capacitive couplin. 2lacin the ta in an

    electric "eld po#ers the ta. !he "eld radient across the ta results in a

    chare buildup bet#een the plates and hence a potential dierence #hich is

    used to eneri8e the small silicon (C at its center.

    )ata stored in data carriers re%uire some orani8ation and additionslike data identi"ers and error detection bits to satisfy recovery needs. !his

    is kno#n as source encodin. :tandard numberin systems such as

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    8/40

    RFID

    d

    ;CC/EA< can be applied to data stored in tas. !as are basically used to

    carry

    .identi"ers, in #hich a numeric or alphanumeric strin is stored for

    identi"cation purposes or as an access key to data stored in a computer or

    information manaement system.

    =. 2ortable data "les in #hich information is orani8ed for communication.

    !as can be obtained that can store sinle bits to kilobits. !he sinle bit

    devices are used for surveillance purposes. Retail electronic article

    surveillance &EA:* is the typical application #hich activates an alarm in the

    interroatin "eld. !hey can also be used for countin applications.

    )evices characteri8ed by data storae capacities upto => bits are

    suicient to hold a serial or identi"cation number toether #ith parity

    check bits. !hese devices may be manufacturer or user prorammable. !as

    #ith data storae capacities upto 4= bits are user prorammable and

    suitable for accommodatin identi"cation and other speci"c data like serial

    numbers, packae content, key process instructions and results of earlier

    interroation/response transactions. !as #ith storae capabilities of ?@

    kilobits are carriers of portable data "les. By increasin the capacity, facility

    can be provided for orani8in data into "elds or paes that may be

    selectively interroated durin the readin purpose. )ata transfer rates are

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    9/40

    RFID

    d

    linked to carrier fre%uency. !he hiher the fre%uency, the hiher the

    transfer rates. )ependin on the memory, the ta contains data that can be

    read-only #rite once read many &R* or read /#rite. Read-only tas are

    lo# capacity devices prorammed at source usually #ith an identi"cation

    number. R devices are user prorammable devices. Read/#rite devices

    are also user prorammable but allo# the user to chane data stored in a

    ta. 2ortable prorammers may also be present that allo#s in-"eld

    prorammin of the ta #hile attached to the item bein identi"ed or

    accompanied.

    READER/INTERROGATOR 

    !he reader/interroators can dier considerably in comple9ity

    dependin on the type of tas bein supported and functions to be ful"lled.

    !he overall function is to provide the means of communicatin #ith the ta

    and facilitatin data transfer. 'unctions performed by readers include sinal

    conditionin, parity error checkin and correction. nce the sinal from a

    transponder has been correctly received and decoded, alorithms can be

    applied to decide #hether the sinal is a repeat transmission and may then

    instruct the transponder to stop transmittin. !his is kno#n as Command

    Response 2rotocol and is used to circumvent the problem of readin

    multiple tas in a short span of time. ;sin interroators in this #ay is also

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    10/40

    RFID

    d

    referred to as ands )o#n 2ollin. A more secure, but slo#er ta pollin

    techni%ue is called ands ;p 2ollin #hich involves the interroator

    lookin for tas #ith speci"c identities and interroatin them, in turn. A 

    further approach uses multiple readers, multiple9ed into one interroator

    but results in cost increase.

    RANGE AND POWER LEVELS

    !he rane that can be achieved in an R'() is determined byD

    . !he po#er available at the reader/interroator to communicate #ith the

    tas.

    =. !he po#er available #ithin the ta to respond.

    . !he environmental conditions and structures, the former bein more

    sini"cant at hiher fre%uencies includin the sinal to noise ratio.

     Althouh the level of available po#er is the primary determinant of 

    rane, the manner and eiciency in #hich that po#er is deployed also

    in1uences the rane. !he "eld or #ave enerated from an antenna e9tends

    into space surroundin it and its strenth diminishes #ith respect to

    distance. !he antenna desin determines the shape of the "eld or

    propaatin #ave delivered so that rane is also in1uenced by the anle

    subtended bet#een the ta and antenna.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    11/40

    RFID

    d

    (n the space free of any obstruction or absorption mechanism, the

    strenth of "eld reduces in inverse proportion to the s%uare of the distance.

    'or a #ave propaatin throuh a reion in #hich re1ections can arise from

    the round and from obstacles, the reduction in strenth can vary as an

    inverse fourth po#er of the distance. here dierent paths arise in this

    #ay, the phenomenon is called multi-path attenuation. At hiher

    fre%uencies, moisture presence can cause absorption #hich can further

    aect the rane. here a number of re1ective obstacles are to be

    encountered #ithin the applications under consideration, #hich may vary

    from time to time, it may also be necessary to establish the implications of 

    such chanes throuh an appropriate environmental evaluation.

    !he po#er #ithin the ta is enerally much less than that from the

    reader, re%uirin sensitive detection capability #ithin the reader to handle

    the return sinals. (n some systems, the reader constitutes a receiver and is

    separate from the interroation source or transmitter, particularly if the up-

    link &from transmitter to ta* carrier is dierent from the do#n-link &from

    ta to reader*.

    55-455m po#er are values %uoted for R'() systems, #hereas the

    actual values should be con"rmed #ith the appropriate reulatory

    authorities in the countries #here the technoloy is bein applied. !he form

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    12/40

    RFID

    d

    in #hich the po#er is delivered, pulsed or continuous, and the associated

     values are also indicated by the authority.

    RFID SYSTEM

     An R'() system consists of R'() tas, a means of readin or

    interroatin the tas and a means of communicatin the data to a host

    computer or information manaement system. !he system #ill also include

    a facility for enterin or prorammin data into tas, if it is not done at the

    source by the manufacturer. !here may also be present antennas for

    communication bet#een the a and the reader.

    'i.=. R'() :ystem

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    RF 4,D/E,*R,/

    4,D/E

    ,S

    REDER*E**

     R*S+,*DER (2)

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    13/40

    RFID

    d

    !he reader sends out a radio fre%uency #ave to the ta and the ta

    broadcasts back its stored data to the reader. !he system has t#o antennas,

    one for the ta and the other on the reader. !he data collected from the ta

    can either be sent directly to a host computer throuh standard interfaces

    or it can be stored in a portable reader and later updated to the computer

    for data processin. !he automatic readin and direct use of ta data is

    called 0automatic data capture$.F>3

    hen the ta #hich is battery free, is to be read, the reader sends out a

    po#er pulse to the antenna lastin for about 45ms.!he manetic "eld

    enerated is collected by the antenna in the transponder that is tuned to the

    same fre%uency. !his received enery is recti"ed and stored on a capacitor

    #ithin the transponder. hen the po#er pulse has "nished, the transponderimmediately transmits back its data, usin the enery stored #ithin its

    capacitor as its po#er source. !he data is picked up by the receivin

    antenna and decoded by the reader unit. nce all the data has been

    transmitted, the storae capacitor is dischared resettin the transponder

    to make it ready for the ne9t read cycle. !he period bet#een transmission

    pulses is called sync time and lasts bet#een =5ms and 45ms dependin on

    the system set up.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    14/40

    RFID

    d

    !he transmission techni%ue bet#een the transponder and the reader

    is ':G.!his approach has ood resistance to noise and is cost eective to

    implement.

    SYSTEM PERFORMANCE

    Reading ditan!e"  !he actual readin distance depends on the

    transponder type, electromanetic noise, transponder orientation, antenna

    type. (n eneral, a =mm lass transponder can be read #ith a stationary

    reader and ate antenna from a distance of about m.Harer transponders

    can achieve ranes upto =m #ith handheld readers oerin lo#er ranes

    upto =45mm.

    Data a!!#ra!$"  A ?-bit cyclic redundancy check alorithm is used to

    ensure that only valid data is sent from the reader to its associated

    controller.

     Antenna e%e!tion"  f the antenna types, the one ivin larer read

    ranes is selected. Electromanetic noise aects the readout pattern.

    Tran&onder orientation" 'or ma9imum rane, the antenna orientation

    #ith respect to the transponder must be optimi8ed for ma9imum couplin.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    15/40

    RFID

    d

    !he orientation in line #ith a ferrite antenna produces the larest read

    ranes from =mm lass transponder.

    Reading &eed" any applications re%uire that that transponder must

    remain in the readin rane. :ince a standard stationary reader completes

    one cycle in abut =5ms, transponders must remain in the boundaries of a

    readout pattern for at least that amount of time.

    IMMO'ILI(ER SYSTEM

    (mmobili8ers are the security systems in automobiles. !he latest

    eneration of R'() transponders called crypto transponders can be used as

    the chief part of immobili8ers.

    'i. . (B(H(IER !RA

  • 8/21/2019 SEED -RFID

    16/40

    RFID

    d

    Gey-based immobili8er systems consist of four main components. !he

    core of the system is the transponder , a battery less device #hich is

    available in various form factors and #ith dierent functionalities. 'or

    operation, the transponder has to be supplied #ith enery from an e9ternal

    source. !he transceiver enerates a hih fre%uency manetic "eld #hich is

    radiated by an antenna coil. !he enery activates the transponder and it

    sends a data stream in form of a modulated R' sinal. !his sinal is

    demodulated by the transceiver and then passed to the controller for data

    processin. )ierent physical principles for R'() systems have been

    established on the market. Concernin the transmission of enery, t#o

    dierent systems can be distinuished.

    F#%% D#&%e) S$te*+ !he enery for the transponder and the data sinal

    enerated by the transponder are transmitted at the same time.

    ,a%- D#&%e) S$te*+ !he transmission of the enery for the transponder

    and the data sinal from the transponder are done consecutively. !he

    transponder stores enery in a capacitor and as soon as the transmitter is

    s#itched o, the enery is used to transmit data. !he dierent techni%ues

    have an impact on system desin and readin rane, but have no impact on

    the system.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    17/40

    RFID

    d

    Cr$&togra&.i! 'a!gro#nd

    'rom the cryptoraphic point of vie#, the problem of immobili8ation

    consists of t#o dierent tasks, the identi"cation of the driver and provin

    his identity, the authentication. :everal cryptoraphic means are applicable

    for driver authentication.

    0no1%edge

    !he authentication is based on the kno#lede of a secret, for e9ample

    a pass#ord or 2(< &2ersonal (denti"cation

  • 8/21/2019 SEED -RFID

    18/40

    RFID

    d

     Authentication by means of possession is the most common method

    and #ill also be #idely spread in future. !he simplest implementation is the

    possession of a mechanical key. A much hiher security is oered if the key

    contains an electronic ta such as a transponder. !o start the vehicle, the

    mechanical key and the code in the transponder must match.

     All cryptoraphic systems described above are based on static

    authentication procedures, #hich mean the security system of the car can

     verify the identity of the key but the electronics in the key cannot check the

    identity of the communication partner. A mutual authentication procedure

    #hich also allo#s the key to verify the identity of the communication

    partner is one feature that #ould improve the security level of the system.

     A much hiher level of security can be achieved #ith a simple

    symmetrical alorithm kno#n as challene / response protocol. !he security

    system of the vehicle can check the identity of the key by sendin a %uestion

    &a challene* and verifyin the ans#er &response*. !he correct ans#er can

    only be iven if a secret is kno#n that is shared by both partners. !his

    challene/response

    concept has several advantaes. )urin normal use, the secret is not

    e9chaned and both challene and response vary from cycle to cycle.

    Standard Se!#rit$ Ar!.ite!t#re #ing RFID

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    19/40

    RFID

    d

     Jarious security systems usin R'() transponders have been

    established on the market.

    'i9ed Code :ystems are the most commonly used. )urin

    initiali8ation, the controller learns dierent identi"cation codes stored in

    the transponders that belon to a vehicle. hen the driver places the

    inition key in the lock cylinder, the "9ed code in the transponder is read

    and compared to the codes stored in the memory of the controller.

    !he level of security depends to a reat e9tend on the type of 

    transponder used. !here are #rite once transponders on the market #hich

    are delivered unprorammed. 2rorammin is done by the user.

    Commercially available readers/#riters allo# to pick up the code in the

    transponder #hile a#ay from the vehicle and to proram an unprorammed

    unit. !hus a copy of the "9ed code has been enerated #hich cannot be

    distinuished from the oriinal. !rue Read nly systems on the market are

    factory prorammed #ith a uni%ue identi"cation number. !hese systems do

    not allo# copies. o#ever, it is possible to emulate the data sinal on the

    radio fre%uency level. !he eort to desin an emulator is considerable and

    re%uires R' desin kno#lede.

    Rollin Code :ystems operate in the same #ay as "9ed code systems

    e9cept that the secret code in the key is only valid for a certain period of 

    time, typically from one inition cycle to the other. !he :ystem :ecurity

    Controller reprorams the transponder hich is a Read/rite type*

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    20/40

    RFID

    d

    periodically. !he secret is chaned, but in terms of cryptoraphics the

    procedure is still a static authentication. !o uarantee the reliability of the

    system, resynchroni8ation procedures have to be implemented in case the

    transponder prorammin fails or the transponder is reprorammed by

    mistake #hile a#ay from the vehicle. Especially these procedures for

    resynchroni8ation are the most critical issues in such systems.

     A simple mutual authentication can be provided by pass#ord

    protected transponders. !he transponder #ill deny access to the secret data

    information stored in its memory unless a pass#ord is presented and thus

    the identity of the reader proven. !he lenth of the pass#ord can vary

    dependin on the re%uired security level. !he pass#ord is usually

    transmitted in plain te9t and can be picked up or uessed if the transponderis available. )ependin on the lenth of the pass#ord, the time to uess the

    pass#ord can vary from several minutes to several years. A limitation of the

    system is the total transaction time #hich can be unacceptable for practical

    use in the application.

    Combined Rollin Code / 2ass#ord :ystems can also be implemented

    usin pass#ord protected :ecured Read rite !ransponders. !hey provide

    a hiher level of security.

    Cr$&to Tran&onder

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    21/40

    RFID

    d

    Crypto !ransponders are the second eneration of transponders for

    use in immobili8ers. !he ne# eneration of crypto transponders developed

    by !e9as (nstruments is based upon the !(R(: ! half duple9 R'()

    technoloy and is compatible to all standard R' interfaces of the !(R(: !

    product rane.

    S$te* O2er2ie1 

    !he )iital :inature !ransponder &):!* is a crypto device #hich

    oers the challene/ response functionality. )urin initiali8ation, the vehicle

    security system and the transponder e9chane a secret encryption key. !he

    key cannot be read out, only the transponder response to a challene sent

    by the transceiver can be read. (n a typical application, the vehicle security

    system enerates a @5 bit random number &the challene*, and sends it to

    the transponder usin 2ulse idth odulation &2*. (n the transponder

    the challene is shifted into the challene reister. 'or a short period of 

    time, enery is provided by the transceiver and the encryption loic

    enerates a =@ bit response &sinature*.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    22/40

    RFID

    d

    'i.@. Crypto !ransponder :ystem

    !he response R is a function of the encryption key Ge , the challene

    RA

  • 8/21/2019 SEED -RFID

    23/40

    RFID

    d

    transponder and reader or after reception of the transponder response. (f 

    e9pected and calculated response are e%ual, the information is sent to the

    enine manaement computer. (n time critical applications, the challene

    and the response can be enerated after immobili8ation and stored for the

    ne9t cycle.

    !he advantaes of this system are obviousD

    • )ependin on the challene the response is dierent every time. !heauthentication procedure is dynamic.

  • 8/21/2019 SEED -RFID

    24/40

    RFID

    d

    !he transponder is a comple9 loical and mechanical micro system

    desined to operate at very lo# po#er. )urin enery transfer less than µ A 

    is consumed by the transponder (C. !his allo#s a capacitor to be chared

    over a considerable distance #ithin a reasonable amount of time, typically

    less than 45ms. Even durin the encryption process, the current

    consumption is belo# ?µ A. !herefore, the typical ma9imum read rane is

    comparable to standard Read nly systems.

    'i. 4. 2lastic ede !ransponder

    Deign O34e!ti2e

    !he )iital :inature !ransponder #as based on many established

    circuit blocks and assembly techni%ues to ensure compatibility to e9istin

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    25/40

    RFID

    d

    transceiver hard#are and to keep e9istin %uali"ed automated production

    lines.

     Apart from the desin challenes for the (C desinD

    aintain lo# po#er consumption despite the lare number of ates for

    encryption

    • Geep #irin of the encryption circuitry to a minimum

    • Geep chip si8e to a minimum,

     A considerable eort has been spent to ensure

    •  A hih level of cryptoraphic security

    • 'ast transaction times for the challene/response cycle

    • Ho# data processin eort for the encryption alorithm in the car

    security system

    • Reliability in the application in terms of hihly sophisticated

    supervision circuitry in the transponder.

    En!r$&tion

     All encryption alorithms are theoretically breakable. An alorithm is

    computationally secure if it cannot be broken #ithin a reasonable amount of 

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    26/40

    RFID

    d

    time respectively #ith reasonable resources. (n this conte9t 0reasonable$ is

    open to interpretations. Current assumptions for attacks aainst

    immobili8er systems areD

    • !he attacker #ill not spend more than "ve minutes in the vehicle

    • !he key is not loner than ten days available for analysis

    • !he key is not loner than ten days available for analysis

    • !he attacker is familiar #ith cryptoanalytical techni%ues.

    )ictionary attacks can be used if the key #as available to the attacker

    for a

    certain period of time to build a dictionary of challene response pairs. (n

    the vehicle, the attacker hopes for a challene that is already in his

    dictionary to reply #ith the correct response and start the enine.

    :tatistical calculations sho# that even if the key is available for 5

    days and the dictionary is built at a rate of four responses per second, the

    probability for a successful attack #ithin "ve minutes in the car is only

    5.@7L. !akin into consideration that this eort has to be repeated for each

     vehicle, it can be understood that this method is uneconomic for the thief.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    27/40

    RFID

    d

    Cryptoanalysis makes use of the kno#lede of the alorithm. !hose

    attackers try to "nd a mathematical solution to the problem of "ndin the

    encryption key #ith a limited amount of challene response pairs. !he

    alorithm in the )iital :inature !ransponder has been developed to

    frustrate these cryptoanalytical methods.

    Read/Write Cr$&to Tran&onder -or S.ort C$!%e Ti*e

    !he !G44?A-22 is a complete transponder interatin all important

    functions for immobili8er and identi"cation systems. (t consists of a plastic

    cube #hich accommodates the crypto (C and the antenna reali8ed as tuned

    HC-circuit. (t is a R/ crypto transponder for applications #hich demandhiher security levels than those #hich standard R/ transponders can

    ful"ll. 'or this reason it has an additional encryption alorithm block #hich

    enables a base station to authenticate the transponder. Any attempt to fake

    the base station #ith a #ron transponder #ill be reconi8ed immediately.

    'or authentication, the base station transmits a challene to the

    transponder. !his challene is encrypted by both (C and base station .Both

    should posses the same secret key. nly then the result can be e9pected to

    be e%ual. !he on-chip =5 Mbit EE2R&5 blocks of = bits*can be read

    and #ritten block#ise by a base station !#o or four blocks contain the ()

    code and si9 memory blocks are used to store the crypto key as #ell as the

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    28/40

    RFID

    d

    read or #rite options.=4 k8 is the typical operational fre%uency of a

    system usin this transponder.

    Tran&onder Antenna

    !he antenna consists of a coil and a capacitor for tunin the circuit to

    the nominal carrier fre%uency of =4k8.!he coil has a ferrite core for

    improvin the distance of read, #rite and prorammin operations.

    'i. ?. Analo 'ront End &A'E*

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    29/40

    RFID

    d

    !he A'E includes all circuits directly connected to the coil. (t

    enerates the (C$s po#er supply and handles the bidirectional data

    communication #ith the base station. (t consists of the follo#in blocksD

    • Recti"ers to enerate a )C supply voltae from the AC coil voltae

    • Clock e9tractor.

    • 'ield ap detector for data transmission from the base station to the

    (C.

    Contro%%er 

    !he controller has the follo#in functionsD

    • Control memory access.

    • andle correct #rite data transmission.

    • Error detection and error handlin.

    • Control encryption operation.

    • Control adaptation of resonance fre%uency.

    Po1er on reet

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    30/40

    RFID

    d

    (t is a delay reset #hich is triered #hen the supply voltae is

    applied.

     Ada&t

    !he (C is able to minimi8e the tolerance of the resonance fre%uency

    bet#een the base station and the transponder by on-chip capacitors in

    parallel to the HC circuit of the transponder.

    'itrate Generator 

    !he bitrate enerator can deliver bitrates of R'/= and R'/?@ for data

    transmission from the (C to the base station.

    'it De!oder 

    !he bit decoder forms the sinals needed for #rite operation and

    decodes the received data bits in the #rite data stream

    Mod#%ator 

    !he modulator consists of t#o data recorders. anchester and

    biphase modulation are possible.

    ,V Generator 

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    31/40

    RFID

    d

     Joltae pump #hich enerates about >J for prorammin of the

    EE2R.

    Me*or$ 

    !he memory is a =5-bit EE2R #hich is arraned in 5 blocks of 

    = bits each. All = bits of a block are prorammed simultaneously. !he

    prorammin voltae is enerated on-chip.

    Cr$&to Cir!#it

    !he crypto circuit uses an alorithm to encrypt the challene #hich is

    #ritten to the chip. !he computed result can be read by the base station.

    Comparin the encryption results of the base station and the (C, a hih

    security authentication procedure is established.

    Writing Data into the IC

     A #rite se%uence of the (C is sho#n belo#.

    ritin data into the transponder occurs by interruptin the R' "eld

    #ith short aps. After the start ap the #rite op-code &5* is transmitted.

    !he ne9t = bits contain the actual data. !he last @ bits denote the

    destination block address. (f the correct number of bits has been received,

    the actual data is prorammed into the speci"ed memory block.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    32/40

    RFID

    d

    'i. 7. rite protocol to proram the EE2R

    Write Data Decoding

    !he time elapsin bet#een t#o detected aps is used to encode the

    information. As soon as a ap is detected, a counter starts countin the

    number of "eld clock cycles until the ne9t ap #ill be detected. )ependin

    on ho# many "eld clocks elapse, the data is rearded as $5$ or $$.!he

    re%uired number of "eld clocks is sho#n in "ure .A valid $5$ is assumed if 

    the number of counted clock periods is bet#een ? and =, for a valid $$ it

    is @> or ?@ respectively. Any other value bein detected results in an error

    and the device e9its #rite mode and returns to read mode.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    33/40

    RFID

    d

    'i. >. rite data decodin scheme

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    34/40

    RFID

    d

     APPLICATIONS

    2rinciple areas of applications of R'() includeD

    . !ransportation

    =. anufacturin and processin.

    . :ecurity.

    !e9as (nstruments Radio 're%uency (denti"cation &!(-R'id* :ystems

    has introduced its ne# R'() ta for te9tile rental and dry cleanin

    applications. !(-R'id tas provide more accurate identi"cation and reater

    accountability as #ell as improved handlin throuh each stae of cleaninand processin to "nal customer delivery.

    R'() system allo#s booksellers to ain such information as the rane

    of books a shopper has bro#sed, the number of times a particular title #as

    picked up, and even the lenth of time spent 1ippin throuh paes.

    Nillete ,al-art, and !esco #ill install specially desined shelves that can

    read R' #aves emitted by microchips embedded in millions of their

    products. !he shelves can scan the contents of the shelves and, via

    computer, alert store employees #hen supplies are runnin lo# or #hen

    theft is detected.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    35/40

    RFID

    d

    R'() tas loaded #ith biometric information #ill be embedded in passports

    to ensure travelers comply #ith security reulations.

    R'() technoloy is also bein used to improve luae handlin in airports.

    Certain speci"c applications of R'() includeD

    . 'leet manaement.

    =. (nventory and asset manaement.

    . arehouse automation.

    @. a8ardous material manaement.

    4. 2ackain, security and access control.

    ?. :mart card payment systems.

     ADVANTAGES

    • R'() technoloy permits no line of siht readin.

    • Robustness and reliability under diicult environmental conditions.

    !hese tas can be read throuh #ater, sno#, concrete, bricks,

    plastics, #ood, and most non-metallic materials

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    36/40

    RFID

    d

    •  Available in a #ide variety of physical forms, shapes, si8es and

    protective housins.

    • R'() tas can be read at very hih speeds.

    (n most cases the response time is less than 55ms.

    )iiculty in duplicatin, oers a hih deree of security.

    DISADVANTAGES

    • Cot

    R'() solutions cost much hiher than the conventional barcodes. A 

    lare fraction of its cost lies in the soft#are infrastructure and the

    enterprise application and interation

    • La! o- tandardization+

    :tandardi8ation has not been provided across many fronts, ranin

    from the dierent data formats used to interpretability bet#een R'()

    readers and tas from dierent vendors to interference bet#een R'()

    products from dierent manufacturers.

    • RFID 1i%% .#rt &ri2a!$ 

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    37/40

    RFID

    d

    R'() transponders are forever part of the product, and desined to

    respond #hen a sinal is received.

    CONCLUSION

    R'() tas #ill soon be trackin millions of consumer products

    #orld#ide. anufacturers #ill kno# the e9act location of each product they

    make from the time it is made until it is used and tossed in the recycle bin

    or trash can. !he crypto transponders #ill be #ell suited for future

    eneration vehicle entry systems.

    !he R'() tain #ill take o #hen the cost of the tas drops to one

    percent of the cost of the product it is applied to, and that date is

    some#here near.

    =554 is the date that researchers say #hen radio fre%uency tain

    becomes viable and until then, #e must #ait and see.

    Hon checkout lines at the rocery store are one of the biest

    complaints about the shoppin e9perience. !his is mainly due to the time

    consumin use of ;2C barcodes. !hese codes act as product "nerprintsmade of machine-readable parallel bars that store binary data.

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    38/40

    RFID

    d

    Created in O75s to speed up the checkout process, barcodes have certain

    disadvantaesD

    • (t is a read-only technoloy, #hich means it cannot send information.

    • (t can easily be fored.

    • Barcode scannin is time consumin.

    !o overcome these, the barcodes are bein replaced by smart labels,

    also called radiofre%uency identi"cation tas.

    R'() tas are intellient barcodes that can literally talk to a

    net#orked system to track every product that is bouht.

    !he automotive industry also makes use of R'() battery less

    transponders that oer a hih level of security at lo# cost. !he theft of 

     vehicles #ith electronic immobili8ers decreased to about one-tenth

    compared to those #ithout immobili8ers. !his is based on the R'()

    technoloy.

    R'() is a technoloy that uses radio sinals for automatic

    identi"cation by transmittin data in a machine-readable form usin

    radiofre%uency as the carrier medium.

    !his paper ives an in-depth kno#lede about R'() technoloy and

    its applications

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/http://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    39/40

    RFID

    d

    Conta!t Detai% "

    STUDENT EMPOWERMENT AND EDUCATION DEVELOPMENT

    5SEED6

     111+eed7india+org 

     Regd. OficeD M 7/7-B, P-Block, :harda 5=4 Branch Ofice: M 4-A, A#adhpuri, Ganpur- =5>5=@

    Email-idD seedindia.5Qmail.com

    Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0

    http://www.seed-india.org/mailto:[email protected]://www.seed-india.org/http://www.seed-india.org/mailto:[email protected]://www.seed-india.org/

  • 8/21/2019 SEED -RFID

    40/40

    RFID

    d

    ebsiteD ###.seed-india.or

    2hone O55@ &Handline*  6O-O@457?5?5

    http://www.seed-india.org/http://www.seed-india.org/