9/30/14
1
Mobile Computing CSE 40814/60814
Fall 2014
What is RFID? • Radio Frequency Iden=fica=on
Computer Science and Engineering -‐ University of Notre Dame
Who Are You?
I am Product X
RFID • RFID is an ADC (automated data collec=on)
technology that uses radio-‐frequency waves to transfer data between a reader and a movable item to iden=fy, categorize, track...
• RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item
• A close cousin to sensor network technology
• Generally, RFID tags are cheaper, but less “intelligent” than sensor nodes
• As things evolve the line between the two technologies is blurring
9/30/14
2
Historical Background • Identification Friend or Foe (IFF) Used by Allied
bombers during World War II • In 1948, concept of “passive RFID” systems
introduced by Harry Stockman • In 1972, Kriofsky and Kaplan designed and patented
an “inductively coupled transmitter-responder” (2 antennas)
• In 1979, Beigel designed/patented “identification device” which combined both antennas into one
• In the 1970s, a group of scientists at the Lawrence Livermore Laboratory (LLL) build a handheld receiver stimulated by RF power for secure access to nuclear facilities
RFID Systems Main components: • Tags (transponders)
-‐ microchip & antenna
• Tag reader – decoder & antenna – the RFID reader sends a pulse of radio energy to the tag and listens for the tag’s response to instruc=ons
– RFID readers are either con=nuously on or they send the radio pulse only in a response to an external event
Varia=ons: – Memory • Size (16 bits -‐ 512 Kbytes) • Read-‐Only, Read/Write or WORM
– Arbitra=on (An=-‐collision) • Ability to read/write one or many tags at a =me
– Frequency • 125KHz -‐ 5.8 GHz
– Price ($0.10 to $250) – Physical Dimensions • Thumbnail to Brick sizes
Tags
9/30/14
3
“Mission Impossible”
Computer Science and Engineering -‐ University of Notre Dame
Tiny Tags • 2007 Hitachi produced RFID device measuring 0.05×0.05 mm, and thin enough to be embedded in a sheet of paper. The data contained on them can be extracted from as far away as a few hundred metres. Human hair comparison.
Active versus Passive
Computer Science and Engineering -‐ University of Notre Dame
Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using
RF from reader
Tag Battery Yes No
Required signal strength
Very Low Very High
Range Up to 100m Up to 3-5m, usually less
Multi-tag reading
1000’s of tags recognized – up to 100mph
Few hundred within 3m of reader, about 3 sec per read => at most 3 mph.
Data Storage Up to 512 KB 16 bits – 1 KB
9/30/14
4
Active Tag
Computer Science and Engineering -‐ University of Notre Dame
Passive Tag
Computer Science and Engineering -‐ University of Notre Dame
Frequency Ranges
Computer Science and Engineering -‐ University of Notre Dame
9/30/14
5
Low Frequency: Load Modulation
Computer Science and Engineering -‐ University of Notre Dame
High-Frequency: Backscatter Modulation
Computer Science and Engineering -‐ University of Notre Dame
Codes
Computer Science and Engineering -‐ University of Notre Dame
RFID tag
Bar code
9/30/14
6
Bar Code
Computer Science and Engineering -‐ University of Notre Dame
EPC: Electronic Product Code
Transmitting EPCs
Creating EPCs
EPC
Computer Science and Engineering -‐ University of Notre Dame
9/30/14
7
Communication and Collisions • Very simple packet formats – General structure:
– Usually reader-‐to-‐tag and tag-‐to-‐reader format somewhat different.
– Typically 2 byte CRC
Computer Science and Engineering -‐ University of Notre Dame
Sync Header Command Data CRC
Collisions
• When mul=ple tags receive a query from the reader, they will all respond. => Responses will “collide” at the reader
• Many readers feature “simultaneous read” capabili=es – Must resolve collisions
• Basic link layer problem (e.g., Ethernet) – But here the algorithm must be very simple
• Problem in wireless in general: collision detec=on at sender not possible
• Problem in RFID: no “carrier sense” of tag possible
Collision Resolution for RFID
Two common approaches: Sloned Aloha (with back-‐off) Binary tree algorithm (reader polls tags “bit by bit”)
9/30/14
8
Application Scenarios • Track the movement of consumer product goods • Animal iden=fica=on/tracking/coun=ng • Toll collec=on • Implanta=on of RFID chips into
people, e.g., Alzheimer pa=ents
Computer Science and Engineering -‐ University of Notre Dame
Applications • Keyless entry • Proximity cards • Supply chain management
Computer Science and Engineering -‐ University of Notre Dame
Implants • It is the most controversial application • Small glass cylinders approximately 2 or 3mm wide and
between 1 and 1.5cm long • Consists of a microchip, a coiled antenna, and a capacitor • Implanted typically under the skin of arm or the back of the
neck
Computer Science and Engineering -‐ University of Notre Dame
9/30/14
9
Concerns • Clandes=ne tracking • Inventorying
Computer Science and Engineering -‐ University of Notre Dame
Benetton Controversy (2003)
Computer Science and Engineering -‐ University of Notre Dame
Walmart Controversy (2003)
9/30/14
10
Instant Checkout
Computer Science and Engineering -‐ University of Notre Dame
“Chip to remove shopping blues”"—Post-Courier, January 1994!
“Tiny microchip identifies groceries in seconds.”!
—Chicago Tribune !!
“Checkout in one minute”"—The Times, London !!
“Scanning range of four yards”"—NY Times !!
“1.5¢ electronic bar code announced”"—San Francisco Chronicle !!
The Hype Cycle
Computer Science and Engineering -‐ University of Notre Dame
Visibility
Time Technology
Trigger
Peak of Inflated Expectations
Trough of Disillusionment
Slope of Enlightenment
Plateau of Productivity
RFID Today!
Walmart • In 2003, Walmart made the retail industry's ini=al steps with a Radio Frequency Iden=fica=on (RFID) supplier requirement when it announced a pallet and case level tagging ini=a=ve. Currently, over 600 suppliers are par=cipa=ng in the ini=a=ve. Today, Walmart requires that its top suppliers must be RFID compliant, at the pallet and outer case level. Many suppliers have already been no=fied regarding their target compliance dates. As =me progresses RFID benefits will con=nue to surface as well as the technology will become cheaper and easier to integrate.
Computer Science and Engineering -‐ University of Notre Dame
9/30/14
11
Case Studies • AIRBUS A-‐380 – The world’s largest passenger aircrap has been equipped with 10,000 radio frequency tags which will help speed up maintenance and improve safety.
– The double-‐decker plane which accommodates 555 passengers has passive RFID chips on removable parts such as seats, life jackets, brakes and other parts, which are subject to rou=ne service or replacement. RFID tagging will make the checking of these parts quicker and more accurate and provide a database of informa=on about each item.
Computer Science and Engineering -‐ University of Notre Dame
Case Studies • Volkswagen – Volkswagen is Europe's largest producer of cars, and the fourth largest in the world, and each year over 35,000 vehicles are displayed at and collected from the company's unique Autostadt (Auto City) facility at Wolfsburg in Germany.
– When Volkswagen wanted a way to quickly locate a car in the holding lot and then track its progress through pre-‐delivery, it was decided to adopt a system using RFID tags. All tasks involved in the delivery process are recorded and stored on the tag, which is hung from the rear view mirror. Every =me the car moves through a process sta=on, workers know its loca=on and current status –automa=cally.
Computer Science and Engineering -‐ University of Notre Dame
Near-Field Communication (NFC) • NFC, is one of the latest wireless
communication technologies. As a short-range wireless connectivity technology, NFC offers safe yet simple communication between electronic devices.
• It enables exchange of data between devices over a distance of 4 cm or less.
• NFC operates at 13.56 MHz and rates ranging from 106 kbit/s to 848 kbit/s.
32
9/30/14
12
How NFC Works • NFC is based on RFID technology that uses
magnetic field induction between electronic devices in close proximity.
• For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag. The tag is essentially an integrated circuit containing data, connected to an antenna, that can be read or written by the reader.
NFC • The technology is a simple extension of the ISO/IEC14443
proximity-‐card standard (contactless card, RFID) that combines the interface of a smartcard and a reader into a single device.
• An NFC device can communicate with both exis=ng ISO/IEC14443 smartcards and readers, as well as with other NFC devices, and is thereby compa=ble with contactless infrastructure already in use for public transporta=on and payment.
• NFC is primarily aimed at usage in mobile phones. By 2013, one in five phones will have NFC (predicted by Juniper Research).
• Japan is early adopter of NFC.
34
Uses and Applications There are currently three main uses of NFC: • Card emulation: The NFC device behaves
like an existing contactless card. • Reader mode: The NFC device is active and
reads a passive RFID tag, for example for interactive advertising.
• P2P mode: Two NFC devices communicating together and exchanging information.
9/30/14
13
NFC Applications • Mobile ticketing in public transport: an extension of
the existing contactless infrastructure, such as Mobile Phone Boarding Pass.
• Mobile payment, electronic money. • Smart poster: the mobile phone is used to read RFID
tags on outdoor billboards. • Electronic =cke=ng. • Travel card, iden=ty documents. • Electronic keys: replacements for physical car keys,
house/office keys, hotel room keys, etc. • NFC can be used to configure and initiate other
wireless network connections such as Bluetooth, Wi-Fi or Ultra-wideband.
36
Comparison with Bluetooth • NFC and Bluetooth are both short-range
communication technologies which are integrated into mobile phones. To avoid a complicated configuration process, NFC can be used for the set-up of wireless technologies, such as Bluetooth.
• NFC sets up faster than standard Bluetooth, but is not much faster than Bluetooth low energy. With NFC, instead of performing manual configurations to identify devices, the connection between two NFC devices is automatically established quickly — in less than a tenth of a second. The maximum data transfer rate of NFC (424 kbit/s) is slower than that of Bluetooth V2.1 (2.1 Mbit/s).
9/30/14
14
• With a maximum working distance of less than 20 cm, NFC has a shorter range, which reduces the likelihood of unwanted interception. That makes NFC particularly suitable for crowded areas where correlating a signal with its transmitting physical device (and by extension, its user) becomes difficult.
• In contrast to Bluetooth, NFC is compatible with existing passive RFID (13.56 MHz ISO/IEC 18000-3) infrastructures. NFC requires comparatively low power, similar to the Bluetooth V4.0 low energy protocol. However, when NFC works with an unpowered device (e.g. on a phone that may be turned off, a contactless smart credit card, a smart poster, etc.), the NFC power consumption is greater than that of Bluetooth V4.0 Low Energy. Activation of the passive tag needs extra power.
Security • Unauthorized Reading: – Compe=tors can scan closed boxes and find out what is inside
– Someone can read your RFID enabled credit card – Metal foil used in US passport to avoid reading when closed
• Unauthorized Wri=ng: – Can change UPC/price of an item – Can kill a tag Solu=on: Reader authen=ca=on: Passwords can be sniffed.
• RFID Zapper: Can burn a tag by overcurrent • RSA Blocker Tag: placed near another RFID, it prevent is
reading
Privacy What can you do to prevent others from reading your RFID aper
you purchase the item? • Kill the tag. Need authen=ca=on. • Put the tag to sleep. Used for reusable tags. Libraries.
Authen=ca=on to put to sleep and to awaken. • Re-‐label: Customer can overwrite customer specific
informa=on. Manufacturer specific informa=on can remain. • Dual Labeling: One tag with customer specific informa=on.
One with manufacturer specific informa=on. • PIN: The reader needs to provide a PIN.
The user can change the PIN. • Distance-‐Sensi=ve: Tag is designed so that the informa=on
provided depends upon the distance • Blocker: A device that generates random signal and prevents
others from reading your RFIDs.
9/30/14
15
Range of Attacks • Nominal reading range: Standard power reader • Rogue reading range: More powerful readers can read from longer distance
• Tag-‐to-‐Reader Eavesdropping Range: Passively listen to response with a more sensi=ve receiver
• Reader-‐to-‐tag Eavesdropping Range: Passively listen to query with a more sensi=ve receiver. Can do this from very far.
• Detec=on Range: Can just detect the presence of a tag or a reader. Important in defense applica=ons where important weapons or targets are tagged.
Types of Attacks • Sniffing and eavesdropping: Passively listening with very sensi=ve readers. Compe==on can find what you are shipping/receiving
• Spoofing: Copy tag for use on other items • Replay: Unauthorized access by recording and replaying the response. Garage door openers.
• Denial of Service: Frequency jamming • Blocking: Aluminum foils
Future Devices and Use • On November 15, 2010 Eric Schmidt announced at
the Web 2.0 Summit that Android will support NFC starting from version 2.3 ("Gingerbread"). The first Android handset which supports this technology is the Nexus S.
• On January 25, 2011, Bloomberg published a report stating that Apple was actively pursuing development of a mobile payment system employing NFC. New generations of iPhone, iPod and iPad products would reportedly be equipped with NFC capability which would enable small-scale monetary transactions.
9/30/14
16
New Trend: Mobile Payments
mybanktracker.com
paymentscouncil.org.uk tomnoyes.wordpress.com
katu.com iranmobin.com
Predicted Mobile Spending
http://money.cnn.com/2011/01/24/pf/end_of_credit_cards/
Types of Mobile Payments
• Mobile-to-mobile payments • Mobile devices as credit card processors • Mobile devices used as credit cards
9/30/14
17
Mobile-to-Mobile Payments
n Merchant applica=ons allowing instantaneous transfer of funds from one account to another via smartphone
n Examples: n Paypal Bump
n Bump phones together to receive account info n Or enter email address to download appropriate account info n 1.9% -‐ 2.9% + $0.30 transac=on fee
Mobile Devices as Credit Card Processors
• Square, Inc. – Device acts a mini credit card reader inputting
pertinent transaction information into the phone through Square App
– Cost: 2.75% + $0.15/card swiped; 3.5% +$0.15/card keyed in
• Intuit – Mobile credit card reader – Cost
• Low Volume: $0/month, 2.7% + $0.15/swipe, 3.7% + $0.15/keyed in
• High Volume: $12.95/month, 1.7% + $0.30/swipe, 2.7% + $0.30/keyed in
*Also additional fees for non-qualified transactions
allaexpression.com
http://www.multicellphone.com/category/mobile-payment/page/2/
Mobile Devices as Credit Cards • Near Field Communication (NFC) Technology
– Allows consumers to wave their mobile phone over a point of sale terminal to purchase retail items
– Thought to threaten the existence of the wallet • Companies set to launch pilot programs:
– Wells Fargo – Google – ISIS (partnership between AT&T, Verizon Wireless, T-Mobile, Discover Financial Services and Barclays)
• Costs: – Approximately $200/reader – Phones with microchips would cost an
additional $10 to $15 – Transaction fees?
news.softpedia.com
9/30/14
18
Adoptability of NFC Technology
• Multiple transaction systems (like with credit cards) would need to be put into place before the technology would work
• Banks, merchants, phone makers, and wireless carriers would need to agree on transaction fees and technical specifications
• Security threats • May be useful for small transactions (fast food,
transit costs, etc.), but not predicted to be used for big purchases
Top Related