Anda di halaman 1dari 34

LOGO

RFID Network
Building an Internet of Things
Liang Dong
leondong@sjtu.edu.cn
Company Name
www.themegallery.com
Contents
Introduction RFID
RFID Network Architecture
RFID Security & Privacy
RFID Applications
Company Name
www.themegallery.com
Contents
Introduction RFID
Company Name
www.themegallery.com

What will the world be if all object can talk?
Company Name
www.themegallery.com
What is Automatic Identification
Real World
Automatic
Identification
Virtual World
0110111000101010101
1101010111010101101
0001011101010001001
0101010000111010101
0101010101000001110
11111101101110100101
01110101011
Company Name
www.themegallery.com
What is Automatic Identification
Various forms of Automatic Identification
Biometric (e.g. Retinal Scans)
Optical Character Recognition (OCR)
Voice Recognition
Bar Codes( e.g. Uniform Product Codes)
Radio Frequency Identification (RFID)
Company Name
www.themegallery.com
What is RFID
Radio Frequency Identification
Describes any system of identification
wherein an electronic device that uses radio
frequency or magnetic field variations to
communicate is attached to an item.
Company Name
www.themegallery.com
RFID Frequency
10 kHz 100 kHz 1 MHz 10 MHz 100 MHz 1000 MHz
300
GHz
Low Freq. EAS
Mid. Freq.
EAS
Cell Phone
RFID:
Item
Management
Data
Modem
AM
Radio
Toys
Garage
Door
CB FM
RFID:
Access Control
Animal ID
RFID:
Toll Roads
& Item
Managemen
t
Microwav
e
EAS
TV
Data
Terminal
RFID &
I.C. Cards
2.45 GHz
LF HF UHF Microwave
Company Name
www.themegallery.com
Whats wrong with Bar-code
Barcode is prevalent in commercial world.
However, there are shortcomings of bar
codes
Line-of-sight
One-at-a-time
Manual
handling
Limited range
Limited data
Company Name
www.themegallery.com
Radio Frequency Identification
Radio Frequency Identification offer the
potential to eliminate these shortcomings
Non-line-of-sight
100(s) at a time
Automatic
handling
Several meter
50 bits -Kbits
Company Name
www.themegallery.com



What are some of the potential issues
associated with the creation of an
Internet of things?
Company Name
www.themegallery.com
Example: Supply Chain
Company Name
www.themegallery.com
Contents
RFID Network Architecture
Company Name
www.themegallery.com
RFID Network Architecture
The RFID Network Architecture is
composed of four fundamental elements:
Electronic Product Code (EPC)
Hardware System (RFID tags and readers)
RFID middleware
Object Name Service (ONS)
Company Name
www.themegallery.com
Electronic Product Code
Numerous identification coding standards
exist:
Universal Product Code (UPC)
International Standard Book Number (ISBN)
IP Address
MAC Address
EPC aims to uniquely identify physical
objects over the world

Company Name
www.themegallery.com
Electronic Product Code
Standard EPC is 96 bit
EPC is comprised of four distinct numbers
Version
Domain Manager Number (P&G, Pepsi)
Object Class Number (Pepsi Cola)
Serial Number
Company Name
www.themegallery.com
Hardware--Reader and Tag
Company Name
www.themegallery.com
RFID Tag
Company Name
www.themegallery.com
Chip of RFID Tag
Company Name
www.themegallery.com
RFID Tag
Company Name
www.themegallery.com
RFID Reader
Passive tags must have radio transmitters
somewhere to power them
It's the reader's role to know how to talk to
tags, how to create low-level data from
reads, and how to send these data to
middleware
Company Name
www.themegallery.com
RFID Reader
Label
Transmitter
Receiver
C
o
n
t
r
o
l
l
e
r
Some application illustrations will be given shortly
Normally a very weak reply is obtained
Chip
Energy
Data
Tag
Company Name
www.themegallery.com
Reader and Tag Collision
Two collision-related issues:
Reader Collision Interference caused by an
overlap in reader signals
Tag Collision Interference caused when
more than one tag responds to a signal at the
same time


Company Name
www.themegallery.com
RFID Middleware
In order to reduce network traffic, modular
components of RFID Middleware will be
used to process, filter, and digest events.
Company Name
www.themegallery.com
Object Naming Service (ONS)
Since only the EPC is stored on an items
tag, computer systems need a way of
matching the EPC to information about the
item
ONS is an automated networking service
similar to Domain Name Service (DNS)
and built over top of the DNS framework

Company Name
www.themegallery.com
Contents
RFID Application
Company Name
www.themegallery.com
Networking the Physical World
RF Tag
Networked
Tag Readers
Middleware
ONS
Company Name
www.themegallery.com
RFID Network:Trace and Track
Manufacture
Database A
ONS
Retailer
Database
Send
1.2.3.4
Register
1.2.3.4 is in Database A
ONS Finding
Where can I find
information of 1.2.3.4
Middleware
Middleware
Verify Receiving
Information
ONS return:
Database A
Receive
1.2.3.4
A
B
Company Name
www.themegallery.com
Contents
RFID Security and Privacy
Company Name
www.themegallery.com
RFID Bill of Rights for consumer
The right of the consumer
to know what items possess RFID tags
to remove or deactivate the RFID tag once a
product is purchased
to know where, when, and why an RFID tag is
being read
to know what information is being stored
inside an RFID tag
Company Name
www.themegallery.com
Vulnerability
Tag
Data on the tag is stored unencrypted
Without physical supervision, anyone on the
premises with physical access to tags can
remove a tag or switch one tag with another
Reader
The data traffic from tag to reader is not
encrypted
Readers do not authenticate the tags

Company Name
www.themegallery.com
Possible Countermeasures
Tag
Using rewritable tags only where appropriate
With proper access control (physical or
encryption)
Reader
Communication between readers and tags
can be encrypted.
Readers should require proper authentication
and authorization to allow access to their
services

Company Name
www.themegallery.com
Resource
http://www.epcglobalinc.org/Official Organization of EPC
standards
MIT Auto-ID lab http://autoid.mit.edu/CS/
Garfinkel, Simson. "The Trouble with RFID."
http://www.thenation.com/doc/20040216/garfinkel/.
Gagne, Martin. "Identity-Based Encryption: A Survey. "RSA
Laboratories CryptoBytes 6, no.1 (2003): 1019.
Palmer, Mark. "Seven Principles of Effective RFID Data
Management." Enterprise Systems Journal, 3 August 2004,
http://www.esj.com/enterprise/article.aspx?EditorialsID=1076.
Sozo, Inoue and Hiroto Yasuura. "RFID Privacy Using User-
Controllable Uniqueness." Kyushu University, 1 November 2003.


LOGO
www.themegallery.com

Anda mungkin juga menyukai