Friday, October 31, 2014

Introduction



Radio Frequency Identification (RFID) these is a set of technologies that allow for short range, contact-less reading of information from a low cost, compact, data source. By definition it Is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic inductions from magnetic fields produced near the reader.
It can also be used to identify individuals in order to allow or prevent access or to provide information about their whereabouts.

RFIDs can be used as part of systems for logistics and delivery tracking, security or for managing safety inspections. Many types of RFID exist, but at the highest level RFID devices, can be divided into two classes: active and passive.


Active tags require a power source—they’re either connected to a powered infrastructure or use energy stored in an integrated battery. One example of an active tag is the transponder attached to an aircraft that identifies its national origin. Passive RFID is the main interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label.

How it works!




An RFID system consists of two main components:

  1. Transceiver: RFID Reader
  2. Transponder: RFID Tag

The transceiver responsibility is to interrogate the transponder using its antenna. Hence, the RFID tag sends back its data to the reader and eventually to the backend server which the data is processed and responded accordingly.
While the tag is held within the reader’s coverage, the reader transmits radio frequency energy to stimulate the tag, which is oftenly called “Excite” or “Awakening” of the tag. The reader’s read range depends on number of factors such as the frequency used, polarization of both antennas used in the reader and tag, as well as the placement of the tag.


The transponder consists of two components itself:

  1. IC: Microprocessor
  2. Antenna

The RFID tag is a bundle consist of both microchip and antenna. tags are mainly designed to stick to the object which needs to be traced or read, therefore the size of tags has been shrinking over time as technology going forward upgrading.
After the reader excites the tag, signals sent by the reader is picked up by the tag’s antenna and responded oftenly with additional data which can be a track identification, serial number or even a customized information.

Tags: in Details



RFID tags may be one of two types:

  1. Active Tags
  2. Passive Tags

Active tags are packed with its own power source which amplifies their range of readability and results the readers at much farther distance to recieve the signals. However, passive tags do not require any power source and its power is supplied by the reader’s signals upon interrogation.




Active Tags: Advantages
  • Higher distance in terms of coverage and readability
  • Might consist of other sensors as the components power source is supplied internally
  • Higher data bandwidth

Active tags: Disadvantages
  • Higher cost of production
  • Larger in size and limitation in its application and usage
  • Requirement of maintenance and replacement of its battery

Passive Tags: Advantages
  • Unlimited applications due to its small size
  • Functional without the need of a battery
  • Less expensive

Passive Tags: Disadvantages

  • The tag can be read at a very short distance
  • Basic functionality as it’s often not possible to be equipped with other sensors
  • The tag remains readable even after the product is sold or terminated from process

Case Study



Adoption of RFID in the medical industry has been widespread and very effective. Hospitals are among the first users to combine both active and passive RFID. Many successful deployments in the healthcare industry have been cited where active technology tracks high-value, or frequently moved items, where passive technology tracks smaller, lower cost items that only need room-level identification. For example, medical facility rooms can collect data from transmissions of RFID badges worn by patients and employees, as well as from tags assigned to facility assets, such as mobile medical devices. RFID has made its way into almost all the day to day operations of a Healthcare facility. Let’s take a look at these areas and see how the different RFID technologies are being used and why.

1. Patient tracking
RFID is being used to track and authenticate patients, from newborn babies to seniors suffering from dementia and everything in between. The technologies that are being used for patient tracking include almost all the RFID technologies. LF and HF are used for applications such as bedside care and mother and baby matching. UHF is being used to monitor patient movement and establish geo-fencing as required. Active technology is a more robust form of movement and motion tracking.

2. Asset Management
By using RFID to tag high demand items like pumps many institutions have reported fewer shortages of these critical items when required and less time lost searching for these items. By using UHF technology any critical piece of equipment can be tagged and tracked throughout a facility making them easy to locate when required. Asset tracking saves valuable people time as well as valuable capital funds.

3. Facilities Management
A Healthcare facility is like a small city. There is a complete army of engineers that keep things running and maintained. RFID is being use to tag key service points that need regular maintenance. The RFID tag when read tells the service technician what and how to perform the service. An RFID driven maintenance program ensures all equipment is serviced on time and according to specification.

Current and Future of RFID


RFID Technology has developed from basic identification business solutions to more, complex, advanced solution systems. These systems give more room for business to be track, trace, locate, monitor, control, utilize and control their business assets. The future for RFID is thus to develop more control from further distances, becoming ubiquitous , more intelligent and thus making objects not only communicate with us, but to be smart and think for themselves and us. The future of identification technologies is to make them more complex, applying advancing technologies such as Virtual Reality and Remote Access, to make tagged assets work for us in wider ranges, collected more and varied data.

RFID applications will continue to include active sensors including;
  • Vehicular Services Parking
  • Libraries self-check in rental services and minimizing labor cost
  • Security building secure access controls, documentation and passports
  • SMART home control - systems to manage home/business energy consumption/production
  • Toll/road-collection/charging and control measures.


Potential ideas for long-term application

  • Identification
  • Payments
  • Vehicles
  • Buildings
  • Animals

Identification: This area is all about thinking of ways RFID can assist people control. With advancements in tags and their capabilities (power, read range, manageability, size and more) identification tools could be used for more things and in greater ways such as advancing secure access. Joining existing things like passports, NFC payments and I.D badges could be more powerful, smaller, controllable and smarter/more capable I.D cards, badges and enabling gadgets. I. D's could also combine recognition technologies (fingerprint, retina, face etc) and provide new ways to recognize individual people, vehicles or animals, as well as items.

Payments: Already there are NFC chipped cards (e.g Barclays/Oyster and Stadium Cards) which can process small payments with a 'touch and go' recognition system. More and more credit and debit cards will become chipped and capable of using NFC based payment systems. More and more shops, tourist attractions and payment places should apply RFID/NFC card payment projects. This could also be applied in mobile phones – doubling up as a credit card. These could then also become automatic, removing all physical operations (no need to touch and go, simply enter).

Vehicles: With cars, vans, Lorries and bikes tagged and chipped, drivers could be taxed for their personal use of vehicles in the future, as well as be set up to automatically to pay for road tolls, taxes, hiring and parking fees. This could also be applied for petrol, servicing and more. Future information systems could communicate with cars to inform about parking spaces, traffic, routes (like GPS). Sensor-based chips could help manage car parts, fuel, oil etc. as well as future possibilities for automatic driving and controls relating to this.

Buildings: Through SMART and Super RFID the office, home or any building or zone could use future RFID to maximize its controls and management. An IOT/RFID building could have all of its gadgets controlled by one gadget device, be automatic (triggered on and off by a tag) with smart measures installed to manage all of the building's equipment and conditions – for you. This could also mean that you could control your home/business even when you are not there, and/or control the data it collects.

Animals: Like people, vehicles and objects the same sort of advancements can be applied to animal, livestock and pet RFID. This could allow for advanced and open identification, control and management. Tagging/chipping would allow for tracking, tracing, monitoring, controlling and managing; be it human, animal, vehicle, object or other.

Security Concerns

By the use of RFID, it is necessary to know that there is security and privacy risks and it is addressed by both organizations and individuals. RFID tags, they are the only no, listen, to be able to respond, are considered "dumb" device Who transmits a request signal in question. This, launched a risk of unauthorized access, Modification of the tag data. In other words, tags that are not protection is likely to be vulnerable to Eavesdropping, traffic analysis, spoofing and denial of service attacks. We will continue to look at each Order to of these:
Eavesdropping (or skimming) Radio signal is transmitted from the tag, the reader is able to detect several meters Other by radio receiver away. It is possible that an unauthorized user to gain If legitimate transmission to access data contained in the RFID tag is not correct Protected. Person having a unique RFID reader that can query the missing tag Appropriate access control, to intercept the contents of the tag.

Traffic analysis
Even if the tag data is protected, in order to track predictable, it is possible to use a traffic analysis tool Over a period of time, tag response. It is possible to build a picture of that analyzing and correlation to the data Exercise, social interaction and financial transactions. Abuse of traffic analysis Will give a direct impact on privacy.

Spoofing
Based on the data collected from eavesdropping and traffic analysis, it is possible, I run the tag spoofing. For example, the software package is executed, "RFDump", and is known as 11 The notebook personal computer or portable information terminal, allows the user to perform a read, or If they are not properly protected and write tasks on most standard smart tag. SoftwareA parody of the data I will allow the intruder to overwrite the existing RFID tag data. By To valid spoofing Tag intruder trick RFID system, it is possible to change the ID of the tag acquired There is a fraud or not detected advantage. One example is trying to save money by purchasing Expensive goods that had their RFID price tag has been disguised to display the cheap price

As RFID has been used increasingly in the fields of retail and manufacturing, RFID tagging of products of popular items such as level of such clothing and electronics raise Public concerns about personal privacy. People are concerned about how their data is Whether they are subject to more direct marketing, or whether they could have been used  Physically tracked by RFID chip. For individual identity, which can be coupled to a unique RFID Tag, individuals are profile and can be tracked without their knowledge or consent. Because they are, for example, washing clothes with a RFID tag, does not remove the chip It is designed to withstand a year of special wear. It is possible that all And individual shopping, given a specified number, owns are tracked, even of individual Products, as far as the RFID tag is embedded, leave the store. RFID reader can They detect the presence of sufficiently closer these RFID tags to receive signals.

Conclusion

The need of replacement of barcodes or other optically read technologies to RFID tags can be addressed in todays life as barcodes are in need of direct sight to be read, while RFID tags do not need to be on the surface of objects. besides, the read time of RFID tags is less than 100 milliseconds and larger numbers of tags can be read in parallel whereas barcodes can be read one by one.
In conclusion, RFID provides variety of options and choices to consumers such as Chipless RFID tags, Factory programmed or even Field programmed tags over older technologies and it rises the demands of consumers.