Radio frequency identification (RFID) has been around for decades. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them.A major push came when retailing giant Wal-Mart dramatically announced that it would require its top 100 suppliers to supply RFID-enabled shipments by January 2005. Though the bottom line story of that deployment has yet to surface.
Following obvious questions will strike on anybody's mind:
• What is RFID, and how does it work?
• What are some applications of RFID?
• What are some challenges and problems in RFID technology and implementation?
• How have some organizations implemented RFID?
TECHNICAL OVERVIEW
The basic premise behind RFID systems is that you mark items with tags. These tags contain transponders that emit messages readable by specialized RFID readers. Most RFID tags store some sort of identification number; for example a customer number or product SKU (stock-keeping unit) code. A reader retrieves information about the ID number from a database, and acts upon it accordingly. RFID tags can also contain writable memory,which can store information for transfer to various RFID readers in different locations. This information can track the movement of the tagged item,making that information available to each reader.
RFID tags fall into two general categories, active and passive, depending on their source of electrical power.Active RFID tags contain their own power source, usually an on-board battery. Passive tags obtain power from the signal of an external reader. RFID readers also come in active and passive varieties, depending on the type of tag they read.
Active tags transmit a stronger signal, and readers can access them from further away.The on-board RFID offers tantalizing benefits for supply chain management, inventory control, and many other applications. Power source makes them larger and more expensive, so active RFID systems typically work best on large items tracked over long distances. Low-power active tags are usually slightly larger than a deck of playing cards.Active tags can remain dormant until they come in range of a receiver or can constantly broadcast a signal. Because of their on-board power source,active tags operate at higher frequencies—commonly 455 MHz,2.45 GHz, or 5.8 GHz—depending on the application’s read range and memory requirements.Readers can communicate with active RFID tags across 20 to 100 meters.
Passive tags, on the other hand, are very inexpensive; they can cost as little as 20 cents apiece, and new technologies are constantly making them cheaper to integrate into common materials and products.Because passive tags are inexpensive, they will likely be the basis of most of the growth in RFID implementations. In addition to their low cost, passive tags can also be quite small. Current antenna technology limits the smallest useful passive tag to about the size of a quarter. The larger the tag, the larger the read range. Currently, passive RFID tags contain about 2 Kbits of memory. This is too small to hold much more complex information than identification and history information. The technology behind RFID is constantly improving, so the amount of information and capabilities of RFID tags will increase over time, allowing RFID tags to eventually contain and transmit much more information. A passive-tag reader can constantly broadcast its signal or broadcast it on demand.
When a tag comes within the reader’s range, it receives an electromagnetic signal from the reader through the tag’s antenna. The tag then stores the energy from the signal in an on-board capacitor, a process called inductive coupling.When the capacitor has built up enough charge, it can power the RFID tag’s circuitry, which transmits a modulated signal to the reader. That return signal contains the information stored in the tag. The communication between the reader and passive tag uses one of two methods to modulate the ID signal.
In low-frequency (less than 100 MHz) tags pass information by releasing energy from the capacitor to the tag coils in varying strengths over time, which affects the radio frequency emitted by the tag. The reader detects these varying waves and can use these variances to demodulate the code. Figure below shows this load modulation.
In higher-frequency (greater than 100 MHz) tags,the tag transmits the signal using back scatter, in which the tag’s circuit changes the resistance of the tag’s antenna. This change in resistance causes a transmission of RF waves, which the reader can pick up and demodulate. Passive tags typically operate at frequencies of 128 KHz,13.6 MHz,915 MHz, or 2.45 GHz, and have read ranges of a few inches to 30 feet. Frequency choice depends on the system’s environment,what material the signal must travel through, and the system’s required read range.
RFID tags can be encased in many materials.Plastics are a very common material for RFID, forming identification cards for building access,credit cards,or bus fares.Tags can also go on the back of labels printed on standard ink jet printers, for placement on inventory.
STANDARDS:
Several RFID standards exist, and their applications are under debate within the RFID development community. These standards cover:
• identification, the coding of unique item identifiers, or other data on the RF tag;
• data and system protocols, effectively the middleware of an RFID system;
• the air interface, that is, the wireless communication between the reader and the tag;
• application support, which provides advice about how to implement the technology;
• testing, compliance, and health and safety, that is, the rules that govern RFID operations; and
• terminology.
The International Standards Organization (ISO) has three standards for RFID: ISO 14443 (for contactless systems), ISO 15693 (for vicinity systems, such as ID badges), and ISO 18000 (to specify the air interface for a variety of RFID applications). A not-for-profit organization, EPCglobal, has developed a widely accepted standard for product identification. The Electronic Product Code (EPC) standard covers the air interfaces, the format for the product identification data stored in an RFID tag, and the middleware and databases storing information about the tags.
APPLICATION:
RFID applications are numerous and far reaching. The most interesting and widely used applications include those for supply chain management,security,and the tracking of important objects and personnel. Supply chain management In supply chain management, RFID tags are used to track products throughout the supply chain—from supplier delivery, to warehouse stock and point of sale. New applications target tracking from checkout through customer billing. A central database records product movement, which manufacturers or retailers can later query for location, delivery confirmation, or theft prevention. For this application, RFID basically serves as a replacement for the bar code scanners used to track products and shipments in similar ways.
Security and personal identification applications are a major and broad application of RFID. A common use of RFID is in identification cards to control building access. Many organizations use RFID tags embedded in ID cards, which are readable at a building entrance. On a similar note,some credit cards use RFID tags. Other cards use tags for automatic fare payment in mass-transit systems, such as the SmarTrip card for the Washington DC area subway and bus system (http://www.wmata.com/riding/smartrip.cfm). Essentially,these are a replacement for identification cards with magnetic stripes, providing a more reliable way to store identification information—magnetic stripes tend to wear out and lose information over time. RFID tags also have a higher memory capacity than magnetic stripes.
RFID Keys: RFID tags that work with a reader near the car’s ignition switch.The reader will only accept codes stored in certain keys. If the code in a key does not match the reader in the car,the car will not start, making it more difficult to steal vehicles by copying keys.
Movement tracking: Because moving objects can easily carry RFID tags, a common use is to track the movement of people and the information associated with them.Some hospitals now use tags on newborns, to ensure identification and to alert hospital staff should someone attempt to take the baby outside of the hospital without authorization. Some schools are requiring children to wear tag-embedded bracelets or wrist bands while on school grounds, to monitor attendance and to locate lost children. The FDA recently approved a RFID tag that could stay with surgical patients in hospitals and store information on the surgical procedure the person requires, eliminating surprisingly common surgical mistakes (“FDA Approves Surgical ID Tag,”S.Lawrence,eWeek,Nov.2004; http://www.eweek.com/article2/0,1759,1731402,00.asp). Hospitals are also using RFID to track equipment throughout a facility as it moves from room to room.This
helps manage inventory and ensure the proper maintenance of equipment. Libraries also tag books, making it
possible to easily locate a book in the stacks, prevent theft, and automate the checkout process.
CHALLENGES AND ISSUES IN RFID
Although promising, RFID is not without its challenges, which arise from both a technological and usage point of view. Privacy concerns A common concern with RFID is privacy. It is disconcerting for many people to have their movements or buying habits automatically tracked electronically. Many privacy groups are concerned about the ability to identify people as they walk through a store or shopping center via the tags embedded in their clothing and linked to them at the time of purchase. To counter such concerns, RFID proponents propose that retail tags have “kill switches” that disable the tag at the point of sale. Even though a small tag might remain embedded inside a product, once the kill switch is activated, the tag would no longer transmit information.
Many of the privacy concerns regarding RFID are addressable because of the nature of RFID tags themselves. The read range of RFID tags is much too small to allow readers out of personal range to read tags carried on a person or in a vehicle. Also, building materials tend to absorb the relatively weak RF waves transmitted by passive tags,making it extremely difficult to pick up RFID signals through the walls of a home. However, anytime someone automatically stores and tracks personal identification in electronic databases, privacy concerns are very real. RFID tags used in transportation systems—whether for fare collection on mass transit systems or automatic toll payment on bridges and highways—allows for the easy and unprecedented tracking of movement. If you can pay for products in an RFID tag and companies later bill you automatically, it takes all possible anonymity out of the retail process. Companies and government agencies must address these concerns before the public will truly feel comfortable using RFID systems. People will want to see policies about the use of an RFID system and the information it collects. Security Security is another key issue in RFID. An organization that implements RFID in its supply chain does not want competitors to track its shipments and inventory. People who use devices that carry personal financial information, such as credit card or other ID numbers, do not want others to access their accounts. These are significant security vulnerabilities in RFID.
Some researchers have proposed schemes that would require tags to authenticate readers, transmitting information only to authorized readers.The tags would have to store ID numbers for authorized readers, and a reader would have to broadcast its ID to the tag. To protect the reader’s ID—and prevent others from eavesdropping and stealing the information—the reader uses either a fixed or randomly generated number to hash (encrypt) its ID (Gao and colleagues). If the tag cannot authenticate the reader’s identity, the tag will refuse to transmit the information it stores. Like most security tactics, this scheme is vulnerable to attacks,
such as man in the middle, or reverse engineering.
Integration with legacy systems is another challenge to RFID. Several vendors are developing RFID middleware that will link new RFID systems into existing back-end infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If an organization picks a standard that changes or loses its market prevalence, middleware can transform the data from readers into the format supported by back-end systems. Many RFID middleware systems provide hooks into operational monitors,so organizations can monitor their tagged items in real time. Middleware can provide the primary link between RFID readers and databases.
RFID, a technology existing for years, has potential uses in a variety of applications.Though not without issues and challenges, RFID is a promising technology which analysts expect to become ubiquitous in the coming years,helping organizations solve problems in supply chain management, security, personal identification, and asset tracking.
References:
Weinstein, R.; , "RFID: a technical overview and its application to the enterprise," IT Professional , vol.7, no.3, pp. 27- 33, May-June 2005
No comments:
Post a Comment