rfid tag - technology and scenarios

42
RFID TAG THE WORLD OF OBJECTS Davide Del Monte – www.diplod.it – Complex Adaptive Systems 2008 – Management Engineering – unimore – http://www.ingre.unimore.it/

Upload: davide-del-monte

Post on 12-Jan-2015

7.231 views

Category:

Technology


3 download

DESCRIPTION

Presentation about RFID technology, some interesting scenarios and actual applications. Pervasive computing in a tagged world.

TRANSCRIPT

  • 1. RFID TAG THE WORLD OF OBJECTS Davide Del Monte www.diplod.it Complex Adaptive Systems 2008 Management Engineering unimore http://www.ingre.unimore.it/

2.

  • What is RFID technology
  • Detection of interactions with RFID tagged Objects
  • Inferring activities from interaction: ADL (activities of daily living)
  • RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors
  • Applications in the real world
  • Java experiments with Alien reader

Outline Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 3. What is RFID Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 4. What is RFID

  • RFID =R adioF requencyId entification
  • An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radiowaves. Some tags can be read from several meters away and beyond the line of sight of the reader.

Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 Wikipedia definition of RFID 5. Components and types of RFID tag

  • Antenna:for receiving and transmitting the signal
  • Integrated Chip
  • Plastic Inlay
  • Maybe sensor, battery, external memory
  • TYPES
  • Passive : no battery, t he electrical current induced in the antenna by the incoming radio frequency signal provides just enough power in the tag to power up and transmit a response
  • Active :internal power source, which is used to power theintegrated circuitsand broadcast the signal to the reader
  • Semipassive :similar to active tags in that they have their own power source, but the battery only powers the microchip and does not broadcast a signal.

Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 125/134 kHz 13,56 MHz 868/915 MHz >2,4 GHz international standard for RFID:Epc Gen2Electronic Product Code Generation 2: From Wikipedia 6. Communication in passive tags Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Image from Alien Guide Image from Alien Guide 7. RFID vs BAR CODE

  • Is possible to attach a tag on many surfaces
  • Estimated production for 2008: 2-3 billion
  • No line-of-sight
  • Many informations and/or applications
  • Can be reprogrammed in the field to reflect current information
  • Cheap: 0,20 $
  • Now everything has a bar code
  • Requires line-of-sight
  • Only ID information
  • Data is fixed at the moment the label is printed
  • Cost free
  • RFID
  • BAR CODE

Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 ..but RFID are not only for identification scope.. 8.

  • I sense a disturbance in the force: unobtrusive detection of interactions with RIFID-tagged objects
  • K.P. Fishkin, B. Jiang, M. Philippose, S. Roy
  • Intel research Seattle 2004
  • Department of Electrical Engineering, University of Washington

Detection of interactions with RFID tagged Objects Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 9. Idea

  • A novel method to infer interactions with passive RFID tagged objects is described. The method allows unobtrusive detection of human interactions with RFID tagged objects without requiring any modifications to existing communications protocols or RFID hardware. The object motion detection algorithm was integrated into a RFID monitoring system and tested in laboratoryand home environments.

Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 10. Tagged objects and movements

  • Existing readers support a poll command, wherein the reader transmitsN pollcommands per second to tags and reports the number of received responses for each tag.
  • We therefore define aresponse rate as the ratio of responses to polls. C [0..1]
  • When 0, the tag cannot be seen at all. When 1, the tag is alwaysseen.
  • The response rate can be used to approximatethe RF signal strength
  • The algorithm detect interaction reliably, and as quickly as possible after the event has occurred

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 11. Response rate

  • Left: The response rate at 4 different distances, with N=20.
  • Right: The relationship between mean and standard deviation of response rate (N=10)

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore

  • Left:Response rate as a function of distance from the reader antenna
  • Right: Response rate as a function of angle between the reader and tag antenna

12. Experiments and scenarios

  • The first scenario represents a typical living-room interaction. Four items were tagged: a hardbound book, a magazine, a deck of cards, and a TV remote control.
  • A sequence of typical interactions with these objects were performed, 30 interactions in total: objects were picked up and/or put down 23 times, an object was motioned with while in the hand 3 times, and a hand was waved in front of each object, for a total of 4 interactions.
  • Two readers were used, bothwall-mounted, on perpendicular walls

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore All 23 pick up / put down events were detected, all 3 motions with an object were detected, and all 4 hand-waves were correctly labeled as occlusions: 100% accuracy by the algorithm. No false positives occurred.

  • A second experimentwas then performed with the same tagged objects but this time time using only a single wall-mounted reader. This time 9 pick up / put down events were performed and 3 interactions where one object was placed atop another

All 9 pick up / put down events were detected, and one of the 3 placements were detected: the other two were not. No false positives occurred. Overall, 10 of 12 events were detected, for an accuracy of 83%. 13. Parameters and conclusions

  • One dificult of measuring any RFID technique is that RFID signal streght is impacted by many variables:
    • Flooring
    • Distance between tag and reader
    • Number of tags and their placement on object
    • Number of readers and thier deployment topology
    • Number of nearby tags
    • Number of objects moved simultaneously
    • Tag orientation
    • Amount and direction of tag rotation
    • Tag type
    • Type of reader
  • As ubiquitous computer matures, it will be possibile to detect interaction thanks to increasingly unobtrusive sensor networks

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 14.

  • M. Philipose, K.P. Fishkin, M. Perkovitz (Intel research center)
  • D.J. Patterson, D. Fox, H. Kautz (university of Washington)
  • D. Hhnel (university of Freiburg)

Inferring activities from interaction with objects Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 15. Idea

  • The idea is to infer activities from interactions with object, combining the RFID tag data with time and sequences of activities.
  • PROACT The system has three components: specialized sensors to detect object interactions, a probabilistic engine that infers activities given observations from sensors, and a model creator that lets us easily create probabilistic models of activities.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 16. Prototype and models

  • To sense tags,the user wears a prototype glove with an RFID-detecting antenna in thepalm
  • Activities are represented as linear sequences of activity stages
  • For example,we can model the making of tea as a three-stage activity: boil the water; steep the tea in the water; and flavor the tea with milk, sugar, or lemon
  • Is possible to convert activities in a probabilistic model.
  • Thesemodels are typically difficult to createwithout intensive hand tuning

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 17. Create the model

  • Once we specify the objects involved in each stage, we must define the objectinvolvement probabilities
  • these describe the probability of using the object in that activity state ( what percentage of sandwiches involve ham?)
  • PROACTautomatically determines these probabilities
  • Authors postulatedthat if an activityA occurs on n1 Web pages (the best extant approximation of human discourse), andn2 pagescontain the activity and an objectT, thenthe involvement probability forT in Ais approximately equal ton2/n1.These numbers are obtained via theGoogleAPI

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 18. Experiments

  • Tests are made by having 14 subject (3 male,11 female) perform ADLs, wearing the prototype glove. Each spent roughly 45 minutes in a house with RFID tagged object.
  • They went into the house and performed 12 tasks, in anyorder, without observation

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 19. Results

  • When PROACT correctly claimed an activity occurred, it scored a true positive (TP); an incorrect claim scored a false positive (FP). If an activity occurred and PROACT didnt report it, PROACT scored a false negative (FN). The Table shows theresults for each ADL.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore PROACT correctly inferred that an activity occurred 88 percent of the time Applications are possible in health-care: ADL monitoring of elders with earlystage dementia 20. Other studies Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore A Scalable Approach to Activity Recognition Based on Object Use The ability to recognize human activities from sensory information is essential for developing the next generation of smart devices. Many human activity recognition tasks are from a machine learning perspective quite similar to tagging tasks in natural language processing. FromRelational Transformation-Based Tagging for Human Activity Recognition 21.

  • R. Raskar, P. Beardsley, J. Van Baar, Y. Wang, P. Dietz, J. Lee, D. Leigh, T. Willwacher (Mitsubischi Electric Research Labs, Cambridge)

RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 22.

  • Each tag is augmented with a photo sensor to significantly extend the functionality and support radio frequency identity and geometry (RFIG) discovery

Objects become self-describing Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 23. Augmented reality

  • At the mitsubishi lab they are working on handheld system to project information on tagged object and reproduce an augmented reality
  • On the objects there is a photo sensor that detects the light to allow programming on rfid tags

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 24.

  • Applications and most common uses for RFID

..but we arent Neo. In the real world? Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 25. Antitheft systems and human implants

  • Most common use of RFID tag is for antitheft systems
  • Implantable RFID chips designed for animal tagging are now being used in humans. Night clubs inBarcelona ,Spainand inRotterdamuse an implantable chip to identify their VIP customers, who in turn use it to pay for drinks.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Seewww.amal.net From Wikipedia 26. Passport and payment methods

  • RFID tags are being used inpassportsissued by many countries. The first RFID passports (" E-passport ") were issued byMalaysiain 1998. In addition to information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country.
  • Italian passport have an RFID tag since 26 thOctober 2006
  • Throughout Europe, and in particular in Paris (system started in 1995 by theRATP ), Lyon and Marseille in France, Porto and Lisbon in Portugal, Milan, Turin, and Florence in Italy, and Brussels in Belgium, RFID passes conforming to theCalypso (RFID)international standard are used for public transport systems.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 27. Logistic and Domotic

  • Inventory systems:in an academic study [19]performed at Wal-Mart, RFID reduced Out-of-Stocks by 30 percent for products selling between 0.1 and 15 units a day.
  • Product Tracking: integrated supply chain from warehouse to consumer. See the story How and why you will talk to your tomatoes
  • Domotic systems for findind object
  • Tag environments, question tags for environmental conditions ( ubiquity of RFID tags)

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 28. Yes.. Also my car!

  • I bought a Nissan Micra on august 2003
  • I can open my car without inserting the key.. I have an intelligent key!
  • Why? TheTexas Instruments Digital Signature Transponder(DST) is a cryptographically-enabledradio-frequency identification(RFID) device used in a variety of wireless authentication applications. The largest deployments of the DST include theExxon-Mobil Speedpasspayment system (approximately 7 million transponders), as well as a variety of vehicle immobilizer systems used in many late model Ford, Lincoln, Mercury, Toyota, and Nissan vehicles.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Wikipedia definition of DST 29. And much more..

  • Lap scoring (racing)
  • Animal Identification
  • E-tickets
  • Hospital
  • Musea, libraries
  • schools and universities
  • Theprivacyis a real problem:a primary security concern surrounding technology is the illicit tracking of RFID tags. Tags which are world-readable pose a risk to both personal location privacy and corporate/military security.
  • Privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore From Wikipedia 30.

  • Test I made at DISMI

Java Experiments with Alien Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 31.

  • The reader has two antennas and is connected to a notebook via TCP/IP port
  • Orange labels are RFID tags

Alien reader Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 32.

  • To connect Alien with the notebook you have to specify the IP address

Setting IP Address Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 33. MessageListenerTest

  • Instantiating the reader at a network address andspecifying a network address for replies.
  • AutoStopTimer is the time for reading tags. This is a critical value!
  • // Instantiate a new reader object, and open a connection on the NET
  • AlienClass1Reader reader = new AlienClass1Reader();
  • reader.setConnection("192.168.0.2",23);
  • reader.setUsername("alien");
  • reader.setPassword("password");
  • reader.open();
  • // Set up Notification.
  • reader.setNotifyAddress("192.168.0.1",service.getListenerPort());
  • reader.setNotifyFormat(AlienClass1Reader.XML_FORMAT);// Listener only supports XML messages
  • reader.setNotifyTrigger("TrueFalse");// Notify whether there's a tag or not
  • reader.setNotifyMode(AlienClass1Reader.ON);
  • // Set up AutoMode
  • reader.autoModeReset();
  • reader.setAutoStopTimer( 4000 );// Read for 4 second
  • reader.setAutoMode(AlienClass1Reader.ON);

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 34. MessageReceived

  • If there are tags in the antennas area, the system reports a message with the tags identification number, the time when the tag was discovered, and last time the tag was seen.
  • The main method only initializes the class MessageListenerTest
  • public void messageReceived(Message message){
  • System.out.println(" Message Received:");
  • if (message.getTagCount() == 0) {
  • System.out.println("(No Tags)");
  • } else {
  • for (int i = 0; i < message.getTagCount(); i++) {
  • Tag tag = message.getTag(i);
  • System.out.println(tag.toLongString());
  • }
  • }
  • }
  • //Main metod
  • public static final void main(String args[]){
  • try {
  • MessageListenerTest test = new MessageListenerTest();
  • } catch (Exception e) {
  • System.out.println("Error:" + e.toString());
  • }
  • }

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 35.

  • While Alien is reading it reports the ID number of the tag read, plus other information

Output Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 36. Output

  • Typical output is a sequence of information
  • You can also obtain this information in a XML file
  • This function is very powerfull, you can integrate this informations with a web service to realize different kinds of applications.

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 37. XML Message

  • XML message is obtained with the method getXML() of the object Message.
  • This is the output when a new tag is read by Alien.
  • Message Received:
  • Tag=0000 0000 0000 6101 3407 3649Disc=Fri Mar 07 08:11:50 CET 2008Last=Fri Mar 07 08:11:52 CET 2008Count=9Ant=0
  • XML message:
  • Alien RFID Reader
  • Alien RFID Tag Reader, Model:
  • 192.168.0.2
  • 23
  • 2008/03/07 08:11:55
  • AUTO MODE EVALUATES TRUE
  • 0
  • 0
  • 0000 0000 0000 6101 3407 3649
  • 2008/03/07 08:11:50
  • 2008/03/07 08:11:52
  • 0
  • 9

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 38. Writing Data

  • Is possible to write and update data of RFID tags
  • Programming commands are not enabled by default; to enable it is necessary to pass the command (see later for ASCII commands):
  • Alien >set Function = Programmer
  • Then there are some methods to write data

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore String tagID = "12345678"; reader.setProgAntenna(0); //set the antenna for programming tag reader.eraseTag(); //erase data reader.programTag(tagID); //set new tag ID 39. Session

  • The most basic way to communicate with a reader is to use a method called doReaderCommand(), which sends an ASCII command and returns theASCII response
  • String readerName = reader.doReaderCommand("get ReaderName");
  • Whit few line of code is possible to create a session to comunicate with Alien
  • You can perform the same commands with java methods or with ASCII strings

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 40. Session Code

  • This is the code. When the connection is open, a BufferedReader is created to pass command whit the method doReaderCommand
  • public AlienClass1Communicator() throws Exception {
  • AlienClass1Reader reader = new AlienClass1Reader();// Create reader object
  • // Connect to a networked reader:
  • reader.setConnection("192.168.0.2",23);
  • reader.setUsername("alien");
  • reader.setPassword("password");
  • reader.open();// Open the reader connection
  • // Use stdin for user input
  • BufferedReader in = new BufferedReader(new InputStreamReader(System.in));
  • do {
  • System.out.print(" Alien>");// Show prompt
  • String line = in.readLine();// Grab user input
  • if (line.equals("q")) break;// Quit when "q" is pressed
  • System.out.println(reader.doReaderCommand(line));// Send command, print result
  • } while (true);// Repeat indefinitely
  • System.out.println(" Goodbye.");
  • reader.close();// Close the reader connection
  • }

Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 41.

  • Here I only ask the reader his name, type and version

..and this is the session Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore 42. THANKS Davide Del Monte www.diplod.it Complex Adaptive Systems 2008 Management Engineering unimore http://www.ingre.unimore.it/ Bibliography I Sense a Disturbance in the Force: Unobtrusive Detection ofInteractions with RFID-tagged Objects http://www.intel-research.net/Publications/Seattle/062420041544_244.pdf Inferring Activities from Interactions with Objects. http://192.5.53.208/u/kautz/papers/pervasive_proact_final.pdf A Scalable Approach to Activity Recognition Based on Object Use http://seattleweb.intel-research.net/people/matthai/pubs/iccv07.pdf RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors http://www.merl.com/people/raskar/Sig04/ Alien Technology http://www.alientechnology.com/ EPC http://www.epcglobalinc.org/home Amal Graafstra http://www.amal.net/ Wikipedia http://en.wikipedia.org/wiki/RFID