SlideShare a Scribd company logo
1 of 43
Download to read offline
An introduction to RFID



 Miguel.Pardal@IST .utl.pt

         June 7th 2010
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
RFID tags
RFID antennas and readers
Other RF technologies




How stuff works                           PWKits
RFID in action




                 [Roussos06]
Radio
• ISM radio bands
  – Frequencies differ in world regions
     • Europe, Americas, and Asia


• LF/HF RFID or UHF RFID?
  – Operating principles are different
  – Near-field far-field boundary
     • Lambda / 2 PI
Near-field RFID
• LF (Low Frequency): [30 .. 300] kHz
• HF (High Frequency): [3 ..30] MHz

• Inductive coupling
• Load modulation
Shower Analogy
Far-field RFID
• UHF(Ultra-High Frequency): [300..3 000] MHz
• MW (Microwaves): [2,5 .. 5,8 GHz]

• Wave coupling
• Backscatter
Lighthouse Analogy
Range




        Credits: C. Floerkemeier, MIT
Tag components




        Credits: Rafsec OY, [Sarma01]
Manufacturing trade-off

• Cost

• Range                Pick 2

• Functionality
Tag categories
• Passive or battery-less
   – Use only power provided by the RFID reader’s signal
   – Smaller, more flexible
   – $ 0.20

• Semi-passive or battery-assisted
   – Use a battery to boost response signal
   – $5

• Active or battery-powered
   – Have additional processing capabilities and autonomy because they
     have more power e.g. sensors
   – Longer range
   – $ 30
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Business applications
• Track & Trace
   – Monitor physical goods and keep history

• Industries:
   –   Warehousing
   –   Maintenance
   –   Pharmaceuticals
   –   Medical Devices
   –   Agriculture
   –   Food
   –   Retailing
   –   Defense

                                               Credits: Sybase.pt
Software Layers
Architecture Framework
RFID middleware is easy…
• All readers
• Read all tags
• At all times




                           Credits: Carlos Perdigão, IST
NOT
         RFID middleware is easy…
   • All readers
cannot
   • Read all tags
   • At all times




                                Credits: Carlos Perdigão, IST
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
NOT
         RFID middleware is easy…
   • All readers
cannot
   • Read all tags
   • At all times




                                Credits: Carlos Perdigão, IST
Why




      Credits: Christian Floerkemeier, MIT
Subscribe, Configure, Notify, Publish




                                   [Floerkemeier07a]
Simulation




             Credits: Carlos Perdigão,
                                   IST
Experimental setup




                     Credits: Nova Ahmed,
                              Georgia Tech
Trials




         Credits: Schuitema supermarkets,
                              RFID Journal
NOT
            RFID security is easy…
   • All readers
should not
   • Read all tags
   • At all times




                                 Credits: Metro Group, RFID Journal
Threats




          [Garfinkel05]
Security
• Privacy
   – Misbehaving readers, well-behaving tags

• Authentication
   – Well-behaving readers, misbehaving tags

• Infrastructure security
   – Network
   – Servers
      • ONS, EPCIS
Conclusions
• RFID is a set of technologies
   – No “one-size-fit-all” tag and reader
• All readers cannot and read all tags at all times
   – RFID middleware challenges
• All readers should not read all tags at all times
   – RFID security challenges


• RFID allows things and places in the physical world to
  automatically generate data
   – An Internet of Things
Outline
  • RFID Technology
  • Business Applications
    – Software and standards
  • Challenges

  • @IST
Internet of Things @ IST
Completed
• Nuno Rodrigues
  – RFID Logistics integration with Navision ERP



• Guilherme Pereira
  – Open-source RFID track and trace
Ongoing

• Ricardo Carapeto
  – Segurança de bagagens inteligentes


• Pedro Ferreira
  – Interface EPCIS para BizTalk


• Carlos Perdigão
  – Rede federada de rastreio de bens
Ongoing

• Miguel Pardal
  – Scalable and secure Discovery services
Proposals
• RFID Toys
  – Sistema de controlo de armazém robótico




• RFID Virtual Lab
  – Simulador RFID
Miguel.Pardal@IST .utl.pt

More Related Content

Viewers also liked

Tecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesTecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesMiguel Pardal
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFIDMiguel Pardal
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Miguel Pardal
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainMiguel Pardal
 
Cost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsCost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsMiguel Pardal
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of thingsMiguel Pardal
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classMiguel Pardal
 

Viewers also liked (7)

Tecnologia de segurança para Web Services
Tecnologia de segurança para Web ServicesTecnologia de segurança para Web Services
Tecnologia de segurança para Web Services
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chain
 
Cost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systemsCost model for RFID-based traceability information systems
Cost model for RFID-based traceability information systems
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of things
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 

Similar to An introduction to RFID

Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID
RFIDRFID
RFIDdont
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptxAdityaRaut39
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in librariesNabi Hasan
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification Suman Dey
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And ApplicationFishEyeBox
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentationblkirkwood
 

Similar to An introduction to RFID (20)

Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
RFID
RFIDRFID
RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptx
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 

More from Miguel Pardal

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Miguel Pardal
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Miguel Pardal
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)Miguel Pardal
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Miguel Pardal
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsMiguel Pardal
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasMiguel Pardal
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityMiguel Pardal
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Miguel Pardal
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsMiguel Pardal
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentationMiguel Pardal
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Miguel Pardal
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)Miguel Pardal
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10Miguel Pardal
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)Miguel Pardal
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginnersMiguel Pardal
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discoveryMiguel Pardal
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigaçãoMiguel Pardal
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentationMiguel Pardal
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesMiguel Pardal
 

More from Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentes
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

An introduction to RFID

  • 1. An introduction to RFID Miguel.Pardal@IST .utl.pt June 7th 2010
  • 2. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 3. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 6.
  • 7. Other RF technologies How stuff works PWKits
  • 8. RFID in action [Roussos06]
  • 9. Radio • ISM radio bands – Frequencies differ in world regions • Europe, Americas, and Asia • LF/HF RFID or UHF RFID? – Operating principles are different – Near-field far-field boundary • Lambda / 2 PI
  • 10. Near-field RFID • LF (Low Frequency): [30 .. 300] kHz • HF (High Frequency): [3 ..30] MHz • Inductive coupling • Load modulation
  • 12. Far-field RFID • UHF(Ultra-High Frequency): [300..3 000] MHz • MW (Microwaves): [2,5 .. 5,8 GHz] • Wave coupling • Backscatter
  • 14. Range Credits: C. Floerkemeier, MIT
  • 15. Tag components Credits: Rafsec OY, [Sarma01]
  • 16. Manufacturing trade-off • Cost • Range Pick 2 • Functionality
  • 17. Tag categories • Passive or battery-less – Use only power provided by the RFID reader’s signal – Smaller, more flexible – $ 0.20 • Semi-passive or battery-assisted – Use a battery to boost response signal – $5 • Active or battery-powered – Have additional processing capabilities and autonomy because they have more power e.g. sensors – Longer range – $ 30
  • 18. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 19. Business applications • Track & Trace – Monitor physical goods and keep history • Industries: – Warehousing – Maintenance – Pharmaceuticals – Medical Devices – Agriculture – Food – Retailing – Defense Credits: Sybase.pt
  • 22.
  • 23.
  • 24. RFID middleware is easy… • All readers • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 25. NOT RFID middleware is easy… • All readers cannot • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 26. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 27. NOT RFID middleware is easy… • All readers cannot • Read all tags • At all times Credits: Carlos Perdigão, IST
  • 28. Why Credits: Christian Floerkemeier, MIT
  • 29. Subscribe, Configure, Notify, Publish [Floerkemeier07a]
  • 30. Simulation Credits: Carlos Perdigão, IST
  • 31. Experimental setup Credits: Nova Ahmed, Georgia Tech
  • 32. Trials Credits: Schuitema supermarkets, RFID Journal
  • 33. NOT RFID security is easy… • All readers should not • Read all tags • At all times Credits: Metro Group, RFID Journal
  • 34. Threats [Garfinkel05]
  • 35. Security • Privacy – Misbehaving readers, well-behaving tags • Authentication – Well-behaving readers, misbehaving tags • Infrastructure security – Network – Servers • ONS, EPCIS
  • 36. Conclusions • RFID is a set of technologies – No “one-size-fit-all” tag and reader • All readers cannot and read all tags at all times – RFID middleware challenges • All readers should not read all tags at all times – RFID security challenges • RFID allows things and places in the physical world to automatically generate data – An Internet of Things
  • 37. Outline • RFID Technology • Business Applications – Software and standards • Challenges • @IST
  • 39. Completed • Nuno Rodrigues – RFID Logistics integration with Navision ERP • Guilherme Pereira – Open-source RFID track and trace
  • 40. Ongoing • Ricardo Carapeto – Segurança de bagagens inteligentes • Pedro Ferreira – Interface EPCIS para BizTalk • Carlos Perdigão – Rede federada de rastreio de bens
  • 41. Ongoing • Miguel Pardal – Scalable and secure Discovery services
  • 42. Proposals • RFID Toys – Sistema de controlo de armazém robótico • RFID Virtual Lab – Simulador RFID