22-05-2012, 04:59 PM
Design and Application of Radio Frequency Identification Systems
Design and Application.pdf (Size: 540.7 KB / Downloads: 75)
Abstract
The recent world, development of effective technologies for linking the object
wireless information is being prompted in various fields. Radio frequency identification
(RFID) is the latest technology for automatic identification which allows the transmission
of a unique serial number wirelessly. The purpose of this paper is to review RFID systems
and its various components infrastructure. The components and features are still under
research and being integrated in existing systems to create a marketable and potential new
system. To achieve higher performance; low cost, low power RFID tag with efficient anticollision
technique which provides a large throughput and flexible security mechanism is
required. The review has shown different types of readers, antennas and tags which would
becomes a bottleneck to reduce the RFID cost. The paper has shown details the entire
components where RFID researchers will get benefit for the development of future
technology. The challenges of RFID system design with the entire components (Reader,
Tag and Antenna) and its advantages, disadvantages are briefly explained.
Introduction
RFID (Radio Frequency Identification) is an automatic identification method. The great appeal of
RFID technology allows storing and reading the data without requiring either contact or a line of sight
Design and Application of Radio Frequency Identification Systems 439
between the tag and reader. RFID consists of three basic component such as transponder (tag),
interrogator (reader) and antenna. In a typical communication sequence, RFID system performs a number of functionalities between reader and tag. RFID reader emits a continuous RF carrier sine
wave. When a tag enters the RF field of the reader, the tag receives energy from the field. Further,
receiving sufficient energy, it begins to modulate the carrier signal to the data storage on the tag. The
modulating carrier signal is resonated from the tag to the reader. The reader detects the modulating
signal from the tag, and decodes signal in order to retrieve the data from the tag. However, the
information relays to the host computer where more manipulation data will be stored and finally will
be displayed to the user. RFID is basically based on wireless communication making use of radio
waves, which is a part of the electromagnetic spectrum (Wenting et al., 2007).
RFID Privacy, Legislation and Security
According to consumer scenarios, it has been updated the performance ability to use RFID to track a
customer's movement around the global market. This concept is not new for modern consumers.
Nowadays a number of customers are familiar with closed circuit television (CCTV) tracking.
However, RFID tracking logs are significantly smaller than CCTV output and are machineprocessable.
According to S. J. Engberg et al. (2004) approaches, as an invasion of privacy, many
people are accepted RFID tracking technology. Furthermore, there have more advantage when
shopkeeper encoded the records that are traceable to identifiable customers. It has been occurred when
RFID tag’s unique ID can be send to reader. Reader also can make a link to the back-end RFID
infrastructure, connect the unique ID to detail tag information and the purchase transaction. T. Weber
(2004) further has improved RFID system security. Weber says if RFID systems attempts to improve
security at the heart of the design then these kinds of privacy invasion would not be possible. Ari Juels
(2005) presented four essential factors for RFID privacy concerns such as wireless barcode
manifestation; RFID tags wireless barcode verity; RFID tags hypothetical scanning range; and RFID
tags on products for harvesting inventory information. Based on this approach, Ron Weinstein (2005)
presented a number of new security system such as RFID building control access system, usage of ID
card for automatic fare payment in mass-transit systems (smart trip card). Nowadays, many
organizations are using these modern technologies for solving security systems. Presently a number of
companies especially privacy enhancing technologies are trying to leverage and achieve legislatively
dictate security and privacy goals. M. R. Rieback et al. (2005) presents a number of uniting legislation
for RFID privacy enhancing technologies such as visibility of RFID tags and readers, access and
modification of RFID tag data, usage of privacy-enhancing technologies, visibility of high level query,
consent withdrawal, confidentiality of personal data and the contribution of technology.
Discussion and Conclusion
This paper provides various methodologies to design RFID systems. Various components of RFID
systems infrastructure, RFID standards, privacy, legislation, and security have been discussed along
with their advantages and disadvantages. Cryptographic algorithm for modification and restoring RFID
privacy has been explained. There has shown details trusted agent and PKI method to provide the
relationship and secure communication such as confidentiality, data integrity, non-reputation and
authentication between entities. While reviewing the optical RFID tag system we find two major
advantages such as better penetration of obstructing materials and easier electronic manipulation. The
study shows that circularly polarized metallic patch antennas feed structure with the probe feed are
placed in between the antennas radiating patch and ground plane. The feed structure, a cone-truncated
square patch antenna with a thick air-layer substrate, which can be excited with good impedance
matching and good CP radiation characteristics. The study shows that the user interface RFID reader
data delivery makes delay on network infrastructure. It has been reviewed RFID major application such
as vehicle tracking, container tracking, object tracking, supply chain management tracking, asset
tracking, library management, access control and environmental conditions monitoring.