Radio Frequency Identification Concepts and
Applications
Bhumika S. Zalavadia
HOD, Diploma Computer
Department, Atmiya Institute of Technology and
Science for Diploma Studies, Rajkot
*Corresponding Author: bszalavadia@aits.edu.in
ABSTRACT:
Radio Frequency
Identification (RFID) is an integral part of our life. Radio Frequency
Identification (RFID) technology uses radio waves (usually 850 MHz to 950 MHz)
to identify people or objects. RFID increases productivity and convenience.
This article gives idea about basic concepts of RFID, the detailed knowledge of
components used in RFID module and the common applications where RFID is used.
In current RFID application areas there are many design issues. This article
also focus on some such design issues and some possible solutions of that.
KEY WORDS: Applications, RFID, RFID reader, RFID tag, security.
1. INTRODUCTION:
RFID is used in the applications such as
animal tracking, in hospitals, preventing theft of automobiles, collecting
tolls without stopping, managing traffic, gaining entrance to buildings,
automating parking, controlling access of vehicles to gated communities, in
corporate campuses and airports, dispensing goods, providing ski lift access,
tracking library books, buying hamburgers, and the growing opportunity to track
a wealth of assets in supply chain management [2].
Radio Frequency
Identification is data
collection technology that uses electronic tags for storing data. Currently
RFID is most commonly used in asset management, inventory system, product
tracking, access control, in social media etc [3].
RFID technology can be considered as up
gradation on bar codes. RFID technologies focus on tags that emit short-range
radio frequency signals. Devices can pick up this signal and that may be
networked to databases of varying sophisticated databases that hold student
account, attendance or other information that is used by a single entity or by
multiple entities [2]. Software integrates information supplied by the tag to
the reader with information held in one or more databases.
2. RFID Module
RFID system consists of
following mandatory components for successful identification of any object or
location.
(1)
Tag
(2)
Reader
or integrator
(3)
Software
Fig : 1 RFID Module [2]
2.1 RFID tags
The tag is also known as an "electronic
label," "transponder" or "code plate," which is made
up of an RFID chip attached to an antenna. Transmitting in the kilohertz,
megahertz and gigahertz ranges, tags may be battery-powered or derive their
power from the RF waves coming from the reader. A radio frequency
identification tag can be attached
to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its
response [4].
Tag is RFID device incorporating a silicon
memory chip usually with on-board rectification bridge and other RF front-end
devices, a wound or printed input/output coil, and at lower frequencies a
tuning capacitor. The tag contains an antenna
connected to a small microchip containing up to two kilobytes of data.
Tags may either be read-only or read-write. Read only tags have a
factory-assigned serial number that is used as a key into a database. In
read-write tags according to the requirement object specific data can be
written into the tag by the system user. Field programmable tags may be
write-once, read-multiple. Blank tags may be written with an electronic product
code by the user. If a tag has no specific identity then it is always
susceptible to manipulation [4].
RFID tags contain at least two parts: an integrated circuit for storing and processing
information, modulation and demodulation of radio frequency signals collecting
power form reader if it is passive tag and some other special functions; and an antenna for receiving and transmitting the
signal. The tag information is stored in a non-volatile memory. The RFID tag
includes either a chip-wired logic or a programmed or programmable data
processor for processing the transmission and sensor data, respectively[4].
RFID tags can be passive, active or battery-assisted
passive.
2.1.1 Active tag
An active tag has an on-board battery and
periodically transmits its ID signal. It can be read at distances
of one hundred feet or more which greatly improves the utility of the device.
It may have other sensors that can use electricity for power. The tag cannot
function without battery power, which limits the lifetime of the tag. This type
of tag is typically more expensive; often costing $25 or more. The tag is
physically larger, which may limit applications. The long-term maintenance
costs for an active RFID tag can be greater than those of a passive tag if the
batteries are replaced. This tag has highest data bandwidth and longest
communication range compared to other types of tag [4].
Fig 2 : Active tags [2]
2.1.2 Passive tag
A passive tag has no battery. But to start
operation of passive tags, they must be illuminated with a power level roughly
three magnitudes stronger than for signal transmission. That makes a difference
in interference and in exposure to radiation. As this tag
functions without a battery it has a useful life of twenty years or more. The
tag is typically much less expensive to manufacture. The tag is much smaller.
It may be as small as the size of a grain of rice. These tags have almost unlimited
applications in consumer goods and other areas. The tag can be read only at
very short distances, typically a few feet at most. This greatly limits the
device for certain applications. With this tag it may not be possible to
include sensors that can use electricity for power. The tag remains readable
for a very long time even after the product to which the tag is attached has
been sold and is no longer being tracked [5].
Fig 3 : Passive tags [2]
2.1.3 Battery assisted passive tag
Passive
can also be battery-assisted (BAP) with has a small
battery on board and is activated in the presence of an RFID reader. When the
battery is discharged, BAP RFID tags continue working as common passive RFID
tags. BAP tags are usually more expensive than “comparable” passive tags and
cheaper than active tags. As for active RFID tags, battery can be a limiting
factor for usage in extreme environmental conditions [5].
2.1.4 RFID tags past and present
RFID technology has been around since 1970,
but until recently, it has been too expensive to use on a large scale.
Originally, RFID tags were used to track large items, like cows, railroad cars and airline luggage that were shipped over long distances, these
original tags, called inductively
coupled RFID tags which were complex systems of metal coils, antennae
and glass. Inductively coupled RFID tags were powered by a magnetic field
generated by the RFID reader. Electrical current has an electrical component
and a magnetic component and it is electromagnetic.
Because of this, you can create a magnetic field with electricity, and you can
create electrical current with a magnetic field. The name "inductively
coupled" comes from this process -- the magnetic field inducts a current in the wire [9].
Classification of tags
Class 1:
This class includes passive, read-only tag with
one-time, field programmable non
volatile memory.
Class 2: This
class includes passive tag with up to 65 KB of read-write memory.
Class 3: This
class includes a semi-passive tag,
with up to 65 KB read-write memory.
Class 4: This
class includes an active tag that uses a built-in battery to power
a transmitter that broadcasts a signal to a reader.
Class 5: This class includes an active RFID tag with read-write memory that can
communicate with other Class 5 tags or devices.
2.2 RFID reader
RFID reader is very
important part of the RFID module. It works as both transmitter and receiver.
It can send and receive information from tag. It reads information from tag
using an antenna attached with tag using radio waves and passes this data using
communication interfaces to host computer. The host computer stores that
information for future use for taking necessary actions. When passive tag is
used in the system reader pass some signals to tag to make it active so that
tag can respond the reader [4].
Fig : 4 RFID
reader [2]
Fig : 5
RFID reader [2]
Above figure shows sample
readers. Readers also come in different sizes and features.
Readers (interrogators) can
be at a fixed point such as
·
Entrance/exit
·
Point of sale
·
Warehouse
Readers can also be mobile, joined,
hand-held, or wireless
The
RF field generated by a tag reader (the energy transmitter) has three purposes:
1. Induce enough power into
the tag coil to energize the tag.
Passive
tags have no battery or other power source; they must derive all power for
operation from the reader field. 125 kHz and 13.56 MHz tag designs must operate
over a vast dynamic range of carrier input, from the very near field (in the
range of 200 VPP) to the maximum read distance (in the range of 5 VPP).
2. Provide a synchronized
clock source to the tag.
Many
RFID tags divide the carrier frequency down to generate an on-board clock for
state machines, counters, etc., and to derive the data transmission bit rate
for data returned to the reader. Some tags, however, employ onboard oscillators
for clock generation.
3. Act as a carrier for return
data from the tag.
Backscatter
modulation requires the reader to peak-detect the tag's modulation of the
reader's own carrier.
2.3 Software
The information which is transmitted to or
received by the reader from tag using radio waves should be converted to the
logical form understood by the host computer. For this host computer uses
different software in different computer languages. This software can be within
reader or can be with host computer. For example if the data received from tag
is ID of any product then software checks whether product with that particular
ID exists in the database or not. If it exists then it takes further required
actions. If it doesn’t exist then it prints required messages on user interface
[5].
2.4 Sequence of communication in RFID module
•
Host Manages Reader(s) and Issues Commands
•
Reader and tag communicate via radio frequency
signal
•
Carrier signal generated by the reader (upon request
from the host application)
•
Carrier signal sent out through the antennas
•
Carrier signal hits tag(s)
•
Tag receives and modifies carrier signal
–
sends back modulated signal
•
Antennas receive the modulated signal and send them
to the Reader
•
Reader decodes the data
•
Results returned to the host application
3. RFID
frequencies
RFID uses different frequency bands for
different applications. Some examples are given below [3].
·
Low Frequency: 125-134.2 KHz and 140-148.5 KHz. This frequency range is
generally used for applications like vehicle tracking or animal tracking
·
Medium Frequency: 7.400 MHz to 8.800 MHz
·
High Frequency: 13.55 MHz to 13.567 MHz The second range is for item
tracking or in smartcard.
·
Ultra High Frequency: 860 MHz - 960 MHz
·
Super
High Frequency: 2.45 GHz to 2.454 GHz
4. RFID
Application Overview
Radio Frequency Identification (RFID) systems
use radio frequency to identify, locate and track people, assets, and animals.
There are almost as many RFID applications as there are business types [6].
Automotive
Auto-makers have added security and
convenience into an automobile by using RFID technology for anti-theft
immobilizers and passive-entry systems [6].
Animal Tracking
Ranchers and livestock producers use RFID
technology to meet export regulations and optimize livestock value. Wild
animals are tracked in ecological studies, and many pets that are tagged are
returned to their owners.
Some animals with serious diseases can be
controlled to keep them within some specific range so that we can prevent to
spread that disease more. Unique RFID tag can be attached with such animals.
Required data like ID, disease name, animal name can be stored in the database.
If such animal try to go out of the specific range then software can give some
warning message and we can easily track the animal and prevent them to go
outside the range [7].
Asset Tracking
Hospitals and pharmacies meet tough product
accountability legislation with RFID; libraries limit theft and keep books in
circulation more efficiently; and sports and entertainment entrepreneurs find
that "smart tickets" are their ticket to a better bottom line and
happier customers [7].
Contactless Payments
Blue-chip companies such as American Express,
ExxonMobil, and MasterCard use innovative form factors enabled by TI RFID
technology to strengthen brand loyalty and boost revenue per customer [7].
Supply Chain
Most of the retailers have discovered that
RFID technology can keep inventories at the optimal level, reduce out-of-stock
losses, limit shoplifting, and speed customers through check-out lines [2].
Animal tracking
Hospitals
In hospitals RFID can be used to track the
location of different staff members and medical instruments [6].
Library
Libraries have used RFID to
replace the barcodes on library items. The tag can contain identifying
information or may just be a key into a database. An RFID system may replace or
supplement bar codes and may offer another method of inventory management and
self-service checkout by patrons [6].
Infrastructure management and protection
Company can introduce RFID technology to
identify and locate underground infrastructure assets such as gas pipelines, sewer lines, electrical cables,
communication cables, etc [7].
Transportation and logistics
Logistics and transportation are major areas
of implementation for RFID technology. Yard management, shipping and freight
and distribution centers use RFID tracking technology. In the railroad industry, RFID tags mounted
on locomotives and rolling stock identify the owner, identification number and
type of equipment and its characteristics. This can be used with a database to
identify the lading, origin,
destination, etc. of the commodities being carried [8].
Security
and Control
RFID tags can be attached to ID cards and vehicles. By
doing this, secure zones can be created which allow only authorized personal or
vehicle to enter or leave [7].
E-Passport
This is the next generation passport. RFID chip is
implemented on each passport. This chip holds the digital information and
biometric data of passport holder [4]. Also, the recent visiting records are
also stored digitally in the chip. The main purpose is to reduce fraud, make
immigration control faster and enhance level of security [8].
Patrolling Log Applications
RFID can be used in auditing and controlling security
persons themselves. Checkpoints are provided for patrolling security guards.
Checkpoints are RFID tags, that security guard have to scan during their
patrol. The reader maintains all record. This aids to check
the performance of guards as well as to track events [8].
5. RFID systems design issues
Collision
In many existing applications, a single-read
RFID tag is sufficient and even necessary: animal tagging and access control
are examples. However, in a growing number of new applications, the
simultaneous reading of several tags in the same RF field is absolutely
critical: library books, airline baggage, garment, and retail applications are
a few.
In order to read multiple tags
simultaneously, the tag and reader must be designed to detect the condition
that more than one tag is active. Otherwise, the tags will all backscatter the
carrier at the same time, and the amplitude-modulated waveforms [1].
This is referred to as a collision. No data
would be transferred to the reader. The tag/reader interface is similar to a
serial bus, even though the “bus” travels through the air. In a wired serial
bus application, arbitration is necessary to prevent bus contention. The RFID
interface also requires arbitration [1].
So that only one tag
transmits data over the bus at one time. A number of different methods are in
use and in development today for preventing collisions; most are patented or
patent pending, but all are related to making sure that only one tag talks
(backscatters) at any one time [1].
Cost
The cost of active tag is about $25 or up and
the cost of passive tag is about 7 to 15 U.S. cents. At the moment tags
typically represent upwards of 60% of implementation costs, with other spending
on systems integration and on readers, agreement on standards for tags, devices
and data. This cost should be reduced to improve the utilization of RFID system
[1].
Security
In the system of RFID
there are many issues related with security and privacy. A common concern is the loss of privacy when
companies scan tags to acquire information about customers and then using data
mining techniques to create individual profiles. There are many possibilities
where RFID tags can be
exploited. So some solution should exist to defeat those threats or at least
make them harder to execute [2].
Tracking
The tag can be attached with any product.
When any customer purchases the tag the store keeper easily track the location
of that product as well as the location of that customer. The location
information of the customer can be misused by any person [2].
Attacks against RFID
There are many possible attacks which can
harm RFID system. Attacker can be any
human or any device as well. Some examples are given here,
1. Simple RFID tags do not provide any
protection against being read by a wrong reader. Attacker reads the data coming
from the tag and can use this data later to make attack against the RFID
system. For example if tag is sending total information about any employee of
the company then it is possible to create completer profile of an employee by
the attacker it collects all information from the tag. That results in a loss
of privacy [3].
2. An attacker can
interrupt communication between a reader and a tag. At a later time the
original tag's response can be reused when attacker receives a query from the
reader [3].
3. Most of the tags do not provide any kind
of authentication or access control mechanism.
So an attacker can read easily read the original tag’s data and can copy
that data on the blank tag of same type for later use. The attacker reads the
tag's data from an item at a store and creates a new tag that replaces the tag
for a similar item with raised price [3].
4. An attacker can jam the frequencies used
in any RFID system which will stop the communication between tag and reader. If
the tag is simply wrapped in some metal foil then it does not get enough energy
to respond the queries from reader and communication stops [3].
5. Reader passes data read from the tag to
the host computer using some intermediate interface. If an attacker gets
success to inject some virus in the software then it can crash the database
where actual data is stored. Virus can also change the data in the database
which may not identify the right data [3].
There are some possible solutions which can
improve the RFID system at some extent.
Kill
Command
Kill command can be issued to the tag after
which it stops communication at all. Once there is a successful communication
between the tag and the authenticate reader, kill command can make the system
safe [10].
Encryption
Encryption is the way to convert the original
data into some other form at one side which can be decrypted at the other end
to get the original data. Cryptography provides greater data security by
storing encrypted serial numbers on tags. Encryption can’t stop tracking of the
tag by attacker. But the only advantage here is that if the data or key of the
tag is encrypted then it is not easy for the attacker to read the original data
[1].
Tag passwords
Tag can have passwords. A tag could send
critical information only if it receives the correct password. One another
variation in the password based tag is that tag does not have static password
but its password changes each time it is read by the reader. It implements some
specific logic or algorithm to get new password. An attacker could not know the
password and so when it tries to read the tag with wrong password, the tag
simply does not respond at all [10].
1.
http://www.bridge-project.eu/data/File/BridgesecuritypaperDL_9.pdf
2.
http://en.wikipedia.org/wiki/Radio-frequency_identification
3.
http://www.rfidjournal.com
4.
RFID handbook by Claus Finkenzeller
and Dorte Muller
5.
RFID (Radio Frequency Identification):
Principles and Applications by Stephen A. Weis
6.
Ron Weinstein, “RFID: A
Technical Overview and Its Application to the Enterprise,” IT Pro-fessional, Vol. 7, No. 3, June 2005, pp. 27-33.
7.
Roy Want, “An Introduction
to RFID Technology,” IEEE CS and IEEE ComSoc, Vol. 5,
No. 1, Santa Clara, 2006, PP. 25-33.
8.
Badri Nath, Franklin Reynolds, Roy Want, “RFID
Technology and Applications,” IEEE CS and IEEE ComSoc,
Vol. 5, No. 1, 2006, pp. 22-24.
9.
[Landt01] Jerry Landt,
"Shrouds of Time": outlines history and present of RFID: http://www.aimglobal.org/technologies/rfid/
resources/shrouds_of_time.pdf
10.
http://www.cse.wustl.edu/~jain/cse574-06/ftp/rfid/
Received on 19.02.2014 Accepted on 12.03.2014
©A&V Publications all right reserved
Research J. Engineering and Tech.
5(1): Jan.-Mar. 2014 page 33-37