auto-id.ppt
TRANSCRIPT
![Page 1: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/1.jpg)
Low cost RFID and the EPC
Sanjay Sarma, Steve Weis,Dan Engels
MIT
![Page 2: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/2.jpg)
outline
• RFID and the Auto-ID Center• Protocols• Security issues
![Page 3: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/3.jpg)
Part I Outline
• What and why of RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status
![Page 4: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/4.jpg)
RFID System
![Page 5: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/5.jpg)
RFID
![Page 6: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/6.jpg)
outline
• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status
![Page 7: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/7.jpg)
why low cost?
4
![Page 8: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/8.jpg)
low cost rfid
time
5
10
15
20
die
size
/cos
t, ce
nts
handling costSilicon: 4c/mm2
![Page 9: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/9.jpg)
why is rfid expensive today?
increased chip size greater functionality
reduce functionality(Networking & software)
reduce chip size(handle small chips)
![Page 10: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/10.jpg)
Cheap protocol
0
10
20
30
40
50
60
70
80
90
100
905 910 915 920
Frequency (MHz)
No
ise
Gaussian Fit 0.8912 1002 Meters, 4 KHz,SQW, 1 dBm
![Page 11: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/11.jpg)
context-aware router context-aware
router
context-aware router
context-aware router
sensor
context-aware router
context-aware routercontext-aware
routercontext-aware router
context-aware router
context-aware router
context-aware router
sensor sensor sensor
01. 203D2A. 916E8B. 8719BAE03C
Manufacturer 24 bits
Product 24 bits
Serial Number 40 bitsHeader 8 bits
the hypothesis or bet
• Place unique number on tagElectronic Product Code, EPC64 bit, 96 bit, and upwards
• Develop manufacturing technology for small chips and tags
• Move data on the networkNetwork service for resolving EPCNetwork architecture for gathering and routing data
![Page 12: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/12.jpg)
outline
• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status
![Page 13: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/13.jpg)
Low cost RFID
Antenna Manufacture
Antenna/IC Assembly
Conversion to Package
End users
IC Manufacture
20¢ 5¢ 5¢ 20¢
IC Design
$X MillionNumber of tags
1-2¢ 1¢ 1¢ 1¢
IC Design
$X Million Billions
![Page 14: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/14.jpg)
Slicing and Dicing
• Standard saw-dicing wasteful• Instead, use separation
by thinning
C. Landesberger, S. Scherbaum, G. Schwinn, H. Spöhrle: “New Process Scheme for Wafer Thinning and Stress-free Separation of Ultra Thin IC’s,” Proceedings of Microsystems Technologies 2001, Mesago, Stuttgart, pp. 431-436, 2001.
![Page 15: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/15.jpg)
Antenna
• Screen printing• Etching• Forming
M. Feil, C. Adler, G. Klink & M. König: “Interconnection Techniques for Ultra Thin ICs and MEMS Elements”, Proceedings of Microsystems Technologies 2001, Mesago, Stuttgart, pp. 437-442, 2001.
![Page 16: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/16.jpg)
vibratory Assembly
Chip Assembl
yChip Design
Label Converting
Inlet Assembly
Silicon Manufacturi
ng
Antenna Manufacturin
g
End UserLabel / Tag Manufacturi
ng
Wafer Treatment
Orientation Check
Courtesy Philips
![Page 17: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/17.jpg)
vibratory assembly
Chip Assembl
yChip Design
Label Converting
Inlet Assembly
Silicon Manufacturi
ng
Antenna Manufacturin
g
End UserLabel / Tag Manufacturi
ng
Wafer Treatment
Vacuum cylinder
Courtesy Philips
![Page 18: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/18.jpg)
conversion
• Paper/package/label industry expertise• Scales well with mass production• Capital equipment expenditure
software
paperhardware
![Page 19: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/19.jpg)
outline
• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status
![Page 20: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/20.jpg)
Architecture: Local
Reader
01.203D2A.916E8B.8719BAE03C
Tag Local database
Reader
Local network
DataProcessing
![Page 21: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/21.jpg)
Architecture: Global
01.203D2A.916E8B.8719BAE03C
Reader
Local database
Reader
Local network
Local system
ONS
Internet<PML> <TIME=2000.4.28:10:05.05HRS>
<EPC= 01.203D2A.916E8B.8719BAE03C > <TEMPERATURE=15 DEG C> </EPC> </TIME></PML>
01.203D2A.916E8B.8719BAE03C ????
Quality control specialist
XQL
PML Server
18.72.100.100
18.72.100.100
PML
<PML> … … ... <MaximumTempearture> 40 DEG C </MaximumTempearture> <MinimumTemperature> 5 DEG C </MinimumTempearture></PML>
DataProcessing
![Page 22: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/22.jpg)
23AB.36C2.AB21.6733
Tag
Reader
Local database
Reader
Local network
Local system
ONS
Internet<PML> <TIME=2000.4.28:10:05.05HRS>
<EPC= 01.203D2A.916E8B.8719BAE03C > <TEMPERATURE=15 DEG C> </EPC> </TIME></PML>
01.203D2A.916E8B.8719BAE03C ????
Quality control specialist
XQL
PML Server
18.72.100.100
18.72.100.100
PML
<PML> … … ... <MaximumTempearture> 40 DEG C </MaximumTempearture> <MinimumTemperature> 5 DEG C </MinimumTempearture></PML>
DataProcessing
01.203D2A.916E8B.8719BAE03C
Inference
Temperature OK
![Page 23: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/23.jpg)
outline
• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data
• Current status
![Page 24: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/24.jpg)
Status of center
ResearchRFID/routing software technology: MIT & Adelaide
Manufacturing /Control Applications: Cambridge
StandardsAir-interface between reader and tags
Software for handling/routing data
Sponsorship48 sponsors
4 continents
![Page 25: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/25.jpg)
field trial
COCA COLA BOTTLERCLEVELAND, TN
JOHNSON & JOHNSONOLIVE BRANCH, TN
KRAFT FOODSFORTH WORTH, TX
GILLETTE DIST. CENTERCHICAGO IL
PILOT TEST FACILITYBENTONVILLE, AR
WAL-MART DEPOTBENTONVILLE, AR.
WAL MART STORECLEVELAND, TN
Warehouse Retail Floor Staging Area Retail Floor
SAM'S DEPOTKANSAS CITY, MO
WAL-MART STOREBROKEN ARROW, OK
SAM'S STORETULSA
P & G FACTORYCAPE GIRADEAU , MO
UNILIVER DIST. CENTERBALTIMORE, MD
P & G DCIOWA CITY, IO
Pilot facility is being used as a mini warehouse
![Page 26: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/26.jpg)
outline
• RFID and the Auto-ID Center• Protocols• Security issues
![Page 27: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/27.jpg)
components
• Signaling• Anti-collision• Functions
![Page 28: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/28.jpg)
Things to keep in mind
• You will not read one tag: you will read many!
• Bandwidth becomes an issue
![Page 29: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/29.jpg)
Line codes
![Page 30: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/30.jpg)
trade-offs
Probability of error
Bandwidth
Collision detection
![Page 31: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/31.jpg)
modulation
• Amplitude Shift Keying• Phase shift keying• Frequency shift keying
100%
10%
Low Time
45%
45%
Reader to Tag ModulationUHFEnvelope
![Page 32: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/32.jpg)
Bandwidth
cos(c)cos(s)cos(c+ s) + cos(c- s)
2=
cc- sc+ s
![Page 33: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/33.jpg)
bandwidth
![Page 34: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/34.jpg)
components
• Signaling• Anti-collision• Functions
![Page 35: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/35.jpg)
anticollision
• Multiple tags in the field
• Need to be sorted• Tags relatively dumb
![Page 36: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/36.jpg)
aloha protocols
State!
![Page 37: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/37.jpg)
tree walking
0
00 01
000 001 010 011
1
10 11
100 101 110 111
000 001 010 011 100 101 110 111
![Page 38: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/38.jpg)
Aloha vs tree-walking
Reader Tag
Symmetric
Reader Tag
Asymmetric
Aloha schemes13.56 MHz ISM
Tree schemes915 MHz ISM
![Page 39: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/39.jpg)
anticollision
• The backbone function • Extract unique ID• Must leverage for any security scheme
![Page 40: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/40.jpg)
components
• Signaling• Anti-collision• Functions
![Page 41: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/41.jpg)
Functions
• Write address• Lock address• Pointer• Read ID (anti-collision)• Read payload• Write payload• Sleep• Wake• Destroy
One time
![Page 42: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/42.jpg)
How to interpret standards
![Page 43: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/43.jpg)
outline
• RFID and the Auto-ID Center• A peek at the protocol• Security issues
• Discussions with: Dan Engels, Peter Cole, Steve Weiss, Ron Rivest
![Page 44: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/44.jpg)
Does protocol compromise privacy?
Not necessarily. Your choice.
You can destroy the tag and opt out
or
You can keep tag for later use
(physics is your friend)
![Page 45: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/45.jpg)
mass hijack of tags
• Could happen in destroy or re-programming
• Physics our friend
Bandwidth limited: 200 tags a second anti-collision
Destroy must be individually addressed
So it takes time to kill
Surveillance
![Page 46: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/46.jpg)
For the future: issues
• Tags are light-weight
• Anyone can read the tags (promiscuity)• The same number shows up all the time• Channel is open and shared
01. 203D2A. 916E8B. 8719BAE03C
Manufacturer 24 bits
Product 24 bits
Serial Number 40 bitsHeader 8 bits
![Page 47: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/47.jpg)
problem: unique and promiscuous
Kill Serial number?• Product still readable• Person can be tracked by constellation
Personalize the number?• Repeated reads yield same number• You could still be tracked by constellation
![Page 48: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/48.jpg)
using keys – iteration 1
• Tag, reader share a key• They challenge each other• They establish trust• The communicate
But wait:
There still needs to be a unique number for anticollision
Key management problem
![Page 49: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/49.jpg)
rolling number
Temporary_number = Key{ID|nonce}
Perform anticollision on Temporary_number
Extract ID
Advantages:
Promiscuous, but who cares
Can’t track
No privacy issue
Disadvantage:
Still a key management problem
Acknowledgement: Peter Cole, Ron Rivest
![Page 50: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/50.jpg)
keyless approach
lock=hash(key)
Tag knows hash and lockLock used as ID and for anticollision
Administrative functionsReader provides keyTag computes computed_lockIf computed_lock == lock,
then tag unlocked, ready for administration until new lock
![Page 51: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/51.jpg)
administering the tag
Problems
Air interface always vulnerable
Grey area of ownership in retail
Solutions
Physical contact for reprogramming
Physical contact reset of memory
(Resurrected duckling, University of Cambridge)
![Page 52: auto-id.ppt](https://reader035.vdocuments.mx/reader035/viewer/2022062514/558bd538d8b42aaf158b45c3/html5/thumbnails/52.jpg)
conclusions
• RFID is here• As more functionality goes on RFID,
security challenges• 0.2 milli-cents per gate, cost is paramount• Minimize data on tag