advanced security and mobile networks w.buchanan (1)bill/asmn/unit10_rfid.pdfw.buchanan (2) unit 10:...
TRANSCRIPT
W.Buchanan (2)
Uni
t 10:
Loc
atio
n an
d ID
Location-basedtravel information
Location-basedtravel updates
Taggingprisoners
Stock control
Location-based map services
Automatedtolls Pet/child
tracking
Emergency servicesLocation-basedstatistics Military Information
Some Applications of Location-based Services
W.Buchanan (3)
Uni
t 10:
Loc
atio
n an
d ID
Tracking by GPS
A key factor in tracking isfor the system to automaticallydetect the object that it is tracking.
Solution: RFID
A key factor in tracking isfor the system to automaticallydetect the object that it is tracking.
Solution: RFID
Tracking by wireless transmitter
Tracking by mobilephone
Types of Tracking
W.Buchanan (4)
Uni
t 10:
Loc
atio
n an
d ID
RFID (Radio Frequency ID)Identifying Objects
Software Security
W.Buchanan (5)
Uni
t 10:
Loc
atio
n an
d ID
Frequencies used: less than135kHz, 13.56MHz, 860-930MHz, 2.45GHz, 5.8GHz
LFLF MFMF HFHF VHFVHF UHFUHF Microwave
Radio wave propagationFrom 50kHz to 2.5GHz
Microwave
LF radio AM radio FM radio TV signals Radar/ Satellite/Wireless
135kHz 13.56MHz(globally defined standard)
860-930MHz 2.45GHz
Propagate well over large distances Line-of-sight communications
Low range (<0.5m) Med range (1m) High range (5m) Med range (1m)
Low read rate High read rateLarge antenna Small antennaRelatively large Relatively small
Radio Spectrum
W.Buchanan (6)
Uni
t 10:
Loc
atio
n an
d ID
50kHz-2.5GHz
RF TagRF Reader
Automatedtolls Pet
tracking
RFID Applications
Stock control
Automatedcheckout
RemoteTelemetry(temperature, pressure,humidity, and so on).
Automatedpayments
ID cards
Anti-fraud
W.Buchanan (7)
Uni
t 10:
Loc
atio
n an
d ID
RF Reader
Electronic Product Code (EPC)- Information on product.- Manufacturer.- Unique identity.
Tags can be:- Read-only.- WORM (Write Once-Read Many)- Volatile Read/Write
Tag information
50kHz-2.5GHz
RF Tag
Automatedtolls
Stock control
Pet tracking
Automatedcheckout
W.Buchanan (8)
Uni
t 10:
Loc
atio
n an
d ID
RF Reader
Time: Description (EPC): Location:Temperature: Pressure:Humidity:etc.
Typical storage of details to the database
50kHz-2.5GHz
RF Tag
Automatedtolls
Pet tracking
Stock control
Automatedcheckout
W.Buchanan (9)
Uni
t 10:
Loc
atio
n an
d ID
RF TagRF Reader
50kHz-2.5GHz
Stock control
Microchip
Active Tags contain their own power supply
- these tend to be larger thanpassive tags
Coiled antenna
Active Tag
W.Buchanan (10)
Uni
t 10:
Loc
atio
n an
d ID
RF TagRF Reader
Stock control
Microchip
Passive Tags use the power Generate from the reader.
- these tend to be smaller thanactive tags
Radio powercoupled into tag
Coiled antenna
Passive Tag
W.Buchanan (11)
Uni
t 10:
Loc
atio
n an
d ID
Active tags: Larger, more reliable, more radio power, continuous transmission ofSignal. Larger range (<100m).
Passive tags: Smaller,less radio power. Lastlonger. Limited range (<5m)
Active location: This provides additional informationon the actual location of thetag.
Short-range: Require lesspower.
Long-range: Require morepower.
W.Buchanan (12)
Uni
t 10:
Loc
atio
n an
d ID
The main classes are:
Class Known as Memory Power Source Application0 EAS None Passive Ant-theft ID1 EPC Read -Only Any Identification2 EPC Read-Write Any Data logging3 Sensor Tags Read-Write Semi-Passive/Active Sensors4 Smart Dust Read-Write Active Ad Hoc networking
Class 0.These are factory programmed. Which have a simple tag which is preprogrammed with data, such as a simple ID number (EPC). The memory cannot be updated after it is manufactured. A typical application is EAS (electronic article surveillance) and in anti-theft devices. They are passive and only transmit when an antenna field is present.
Class 1. These are factory or user programmed, where they programmed once only, either a manufacture or by the user. A typical application is in ID badges.
Class 2. This type has a read-write type of memory, and is typically used for data loggers, as they contain a relatively large amount of memory space that can store data.
Class 3. These are used with on-board sensors, and monitor parameters such as temperature, pressure,and humidity. The power supply can be active or passive.
Class 4. These have integrated transmitters (and thus require active power), and can communicate with their neigbours and are thus used in ad-hoc networks.
Passive tags have a range of around 5 meters for UHF, while it can be over 100m for active tags.
Tag classes
W.Buchanan (13)
Uni
t 10:
Loc
atio
n an
d ID
Antenna is approx half the wavelength of the radio wave:
• 2.45GHz. Half wavelength: 0.06m (6 cm). • 900MHz. Half w/l: 0.16m (16 cm). • 13MHz. Half w/l: 11m.
Examples include:Low Frequency passive:• 4 to 5 ft. range with large tags(3.3 in disk)• 1 to 2 ft. range with small tag (1 in.disk)
High Frequency passive:· 19 to 23 in. range with credit size foil· 4 to 6 in. range with 1 in. disk
Low Frequency Active:· 8 to 12 ft. range with 3 in. disk
UHF passive:· 8 to 10 ft. range with credit card size foil (900 MHz)· 2 to 6 ft. range with 3 in. tag (2.4 GHz)·15 to 30 ft. range with 1.5 in. disk
UHF active:· 150 ft. range with 2 in. cube
Dipole
Monopole
Coverage of Different Types
Patch
Radio coverage
This can be reduced if the wire is wrapped around magnetic material
Radiocoverage
W.Buchanan (14)
Uni
t 10:
Loc
atio
n an
d ID
SubstrateThis can be materialssuch as paper, plastic,and so on.
AntennaMicrochip
Gold connection
Epoxycovering
Approximate Size: 95mm x 30mm Tag Type: ePC class 1 compliant Operating frequency: 915 MHz (902-928 MHz ) Read Range: Up to 5 meters Simultaneous ID of Tags: 200 tags per second Tag Power: RF Beam Powered (Passive) Memory Capacity: 96 bits Memory Type: WORM Antenna Dimensions: 13x134mm Orientation Sensitivity: Good Applications: General Purpose
Construction of the tag
W.Buchanan (15)
Uni
t 10:
Loc
atio
n an
d ID
Mastering Computing
Mastering Delphi
Bar codes use aUnique Product Code(UPC). The first one wason a pack of Wrigley's chewing gum on June 26, 1974.
Example Bar Codes
W.Buchanan (16)
Uni
t 10:
Loc
atio
n an
d ID
Bar code readers normally requirea line-of-sight transmission.
They must be viewable on the surfaceof an object.
Bar codes only contain manufacturer and product.
RFID do not require a line-of-sighttransmission.
RFID can be embedded intoa device, and thus more robust.
RFID can contain other Information, such as a uniqueID, manufacturing factory, and so on.
Bar codes v. RFID
W.Buchanan (17)
Uni
t 10:
Loc
atio
n an
d ID ONS (Object Name
Service)
Header. Defines the umber, type and length of all subsequent data. EPC Manager. Identifies the originating entity (manufacturer) of the object/item. Object Class. This is a tracking mechanism for specific groups such as sub-group ID. Object Identification Number. This uniquely identifies the object/item.
Header
0-7 bits
EPC Man.
8-35 bits
Full ID details
Electronic Product Code (EPC)
Object IDNumber
60-96 bits
Object Class
36-59 bits
00036EDE001 0000B1F 00035BFor example, EPC standard:(8bits, 28bits, 24bits, 36 bits)
EPC and ONS
W.Buchanan (18)
Uni
t 10:
Loc
atio
n an
d ID
The Internet then becomesan integrated system of objects:computers, cars, components, and, …
ONS
DNS
PML (Physical Markup Language)<xml><location> <x>1000</x> <y>2000</y></location><manufacturer>xyz fac </manufacturer><id>1234456</id><temperature>20</temperature?… etc
W.Buchanan (19)
Uni
t 10:
Loc
atio
n an
d ID
Reader(Senses tags)
Reader(Senses tags)
Savent(Processes
Tags)
Savent(Processes
Tags)
EPCInformation
Service
EPCInformation
Service
Internaldatabase
ONS(Root)
ONS(Cache)
Eventdata
Organisation
Links to externaldatabases
Static ONS: Maps EPC to Internet Address tofind information on product.
Dynamic ONS: Contains a mapping of currentand previous EPC details, in order for tracking purposes, such as product recalls.
EPC (Electronic Product Code) Architecture
W.Buchanan (20)
Uni
t 10:
Loc
atio
n an
d ID
Reader(Senses tags)
Reader(Senses tags)
Savent(Processes
Tags)
Savent(Processes
Tags)
EPCInformation
Service
EPCInformation
Service
ONS(Cache)
URI is converted into a DomainName
EPC in URI formaturn:epc:1.47400.11015.583865
URL of PML or WWW server such as:http://gillette.com/cgi-bin/pml.php
PML server
01 000000000000000000010 00000000000011000 000000000000000110010000)
Gillette Mach3 URI
11015.47400.1.onsroot.org
Object MAN ID
WWW server
EPC (Electronic Product Code) Architecture
W.Buchanan (21)
Uni
t 10:
Loc
atio
n an
d ID
Example of PML for sensor data<pmlcore:Sensor>
<pmluid:ID>urn:epc:1:124.162.37</pmluid:ID><pmlcore:Observation>
<pmlcore:DateTime>2002-11-06T13:04:34-06:00</pmlcore:DateTime><pmlcore:Data>
<pmlcore:Text>temp=22,24,25,22,22,23,22</pmlcore:Text></pmlcore:Data>
</pmlcore:Observation></pmlcore:Sensor>
W.Buchanan (22)
Uni
t 10:
Loc
atio
n an
d ID
Manufacture
S
Reader Reader
Readers track thecar in the factory
Reader senseswhen the car leaves the factory
Reader senseswhen the car arrives at the distribution centre
Distribution Centre
Reader
Reader
Reader
ReaderSalesCentre
Reader
S
S
SS
Reader sensesstorage at distribution centre
Reader sensessale
Enhancements to the Supply Chain
W.Buchanan (23)
Uni
t 10:
Loc
atio
n an
d ID
Manufacture
S
Reader Reader
Distribution Centre
Reader
Reader
Reader
ReaderSalesCentre
Reader
Product database
ServiceCentre
ReaderReliability info
Trackinginfo
Sales info
Trackinginfo
ReaderSecurity/Insurance Services
Security/fraudchecking
Stockcontrol
Enhancements to the Supply Chain
W.Buchanan (24)
Uni
t 10:
Loc
atio
n an
d ID
There are many security problems with RFID, such as:
• Obtaining information on the object.• Modifying the data on the object.• Copy the details on the object (to create a duplicate).
And can thus lead to:
• Industrial espionage.• Industrial sabotage. • Counterfeiting.
Security Problems
W.Buchanan (25)
Uni
t 10:
Loc
atio
n an
d ID
Sun Microsystemsat Linlithgow have invested heavily on a new facility to test RFID devices.
RFID Testing at Sun Microsystem, Linlithgow
W.Buchanan (27)
Uni
t 10:
Loc
atio
n an
d ID
• Person Identification.• Food Production Control.• Blood Analysis Identification.• Water Analysis.• Refuse Collection Identification.• Timber Grade Monitoring.• Road Construction Material Identification.• Toxic Waste Monitoring.• Vehicle Parking Monitoring.• Pigeon Flight Monitoring.• Valuable Objects Insurance Identification.• Oil Pipe Identification.• Machine Tool Management• Gas Bottle Inventory Control• Duty Evasion• Asset Management• Stolen Vehicle Identification.• Production Line Monitoring.• Car Body Production• Parts Identification• Access Control• Beer Barrel Stock Control• Security Guard Monitoring
Source:http://www.korteks.com
A few examples of passive RFID applications
W.Buchanan (28)
Uni
t 10:
Loc
atio
n an
d ID
M&S Trail tagged men’s suits, shirts and ties with RFID tags.
The key factor was that the details only contained information on the product, andhad no information on the user, or tracked them. This is key in user adoption, as users are sceptical of technologies which could track them.
At the end of the trail they claimed 100% stock accuracy. Thus ensuring that the rightgoods where delivered where they were required.
One blue suit sold.reorder another!
Reader
Reader
Stock: 6 Blue, 1 Green
M&S Stock Control Trail
W.Buchanan (29)
Uni
t 10:
Loc
atio
n an
d ID S
At present, the RFID tag is thrown-away after sale.
Many organisations feel that RFID is a suspect technology which will allow organisations to track human movement.
M&S have detachable tabs, so the users never have any issues on their usage.
Tesco’s are also trailing the usage of RFID tags, such as this one on a DVD box.
Please retain this label for refund and exchange
Antenna
Detachable Tags at M&S
W.Buchanan (30)
Uni
t 10:
Loc
atio
n an
d ID
Gillette have bought over 500 milliontags for their products, as razors are seenas ‘high shrinkage’ goods, where theirproducts are stolen throughout the supplychain.
Gillette Wireless Tags
W.Buchanan (31)
Uni
t 10:
Loc
atio
n an
d ID
Possibility ofsmart shelves,which automaticallydetect products being taken.
System detectsnon-killed products
Tag is ‘killed’at the check-out
Wireless Sensors
W.Buchanan (32)
Uni
t 10:
Loc
atio
n an
d ID
RFID devices are being used in hospitals in the US to track and manage mobile assets. This currently tracks equipment, but is likely to involve the tracking on personnel, so that they can be traced, in emergencies.
Asset Management in Hospitals
W.Buchanan (33)
Uni
t 10:
Loc
atio
n an
d ID
Stolen motorbikes are oftenbroken up and sold as spares
ID Tags embeddedinto the metal of thecastings and components
W.Buchanan (34)
Uni
t 10:
Loc
atio
n an
d ID
ID Tags can be embeddedinto printed circuit boards,as these are commonly used in products.
It can thus be used to trackstolen goods.
Tracking PCB’s
W.Buchanan (35)
Uni
t 10:
Loc
atio
n an
d ID
Reader
Legoland Denmark have found that up to 1600 children can be reported lost in a single year. Thus they have implemented an active RFID system where children wear a bracelet which can be traced around the park. As they are active device there does not have to be many readers around. These use standard IEEE 802.11b communications (2.4GHz). The tag is 1.5inches by 2.5 inches, and is registered with the mobile phone of the parent. It uses triangulation to track children. The method is TDOA (Time Difference of Arrival) - see the previous unit.
The system system can be used for electronic passes, which automatically authenticate users.
Reader
Reader
SMS message: Where is my child?
SMS Message: Next to the Tiger!
Tracker in Legoland
W.Buchanan (36)
Uni
t 10:
Loc
atio
n an
d ID
The LawFrom Business to Business and from Business to User
Software Security
W.Buchanan (37)
Uni
t 10:
Loc
atio
n an
d ID
SupplierSupplier ManufacturerManufacturer DistributionDistribution
SalesSales
Business-to-Business Tracking
With Business-to-BusinessRFID and location findingIs obviously of great benefit.
WAL*Mart now specify that suppliersshould fit RFID to their goods
ProductDatabase
B2B -Business-to-Business
W.Buchanan (38)
Uni
t 10:
Loc
atio
n an
d ID
SupplierSupplier ManufacturerManufacturer DistributionDistribution
SalesSales
ProductDatabase
By adding user details, companiescan find out about users, such aswhich shops theyshop-in, what productsthey buy, and so on.
UserDatabase
Business’s can data mine this information
Business-to-User Tracking
W.Buchanan (39)
Uni
t 10:
Loc
atio
n an
d ID
The legal system often takes a while for laws to be developed on new technologies, but it California it is now a law that prohibit businesses and libraries from using RFID tags attached to consumer products or using an RFID reader that could be used to identify an individual, unless:
“The information collected via RFID can only be in regard to items customers actually are buying, renting or borrowing. Information can't be collected on what customers may have picked up but put back prior to a transaction, on what they're wearing or on items they are carrying in a wallet or purse.”
Fred
Laws on the usage of RFID
Fred bought:
- Green car, Ford’s R Us, 3 Dec 2004.- Biscuits, Safeway, 4 Dec 2004.- Cake, M&S, 4 Dec 2004.
Fred looked at a Red car.Fred picked up Cheese.
W.Buchanan (40)
Uni
t 10:
Loc
atio
n an
d ID
Conductive Inks
Copper antennas arefairly large, even thoughthe RFID chips are small
HELLOThese could be replacedby conductive inks, whichcould act as antennas.
W.Buchanan (41)
Uni
t 10:
Loc
atio
n an
d ID
Batteries can betrickled charged
Thin-film Polymer Batteries
Substrate
Wireless range extendedIntegrated thin-filmpolymer batteries,reduce size of active devices, and range
W.Buchanan (42)
Uni
t 10:
Loc
atio
n an
d ID
ConclusionsThe use of RFID is a definite improvement over the bar code, as it:
- Allows for more information.- Integrates better with the Internet.- Can be reprogrammed.
But… the security of it need to be sorted. In most cases it is, butit is user doubts which must be overcome (as with any new technology). It is unlikely that users will be keen on items whichcan be tracked that they own, unless they feel it is of benefit tothemselves.
The adopt is likely to track objects until sale, after which the tagis taken off.