10-05-2012, 02:31 PM
Design and Application of Radio Frequency Identification Systems
Seminar.pdf (Size: 540.7 KB / Downloads: 87)
Introduction
RFID (Radio Frequency Identification) is an automatic identification method. The great appeal of
RFID technology allows storing and reading the data without requiring either contact or a line of sight
Design and Application of Radio Frequency Identification Systems 439
between the tag and reader. RFID consists of three basic component such as transponder (tag),
interrogator (reader) and antenna. In a typical communication sequence, RFID system performs a
Figure 1: Configuration of RFID system
number of functionalities between reader and tag. RFID reader emits a continuous RF carrier sine
wave. When a tag enters the RF field of the reader, the tag receives energy from the field. Further,
receiving sufficient energy, it begins to modulate the carrier signal to the data storage on the tag. The
modulating carrier signal is resonated from the tag to the reader. The reader detects the modulating
signal from the tag, and decodes signal in order to retrieve the data from the tag. However, the
information relays to the host computer where more manipulation data will be stored and finally will
be displayed to the user. RFID is basically based on wireless communication making use of radio
waves, which is a part of the electromagnetic spectrum (Wenting et al., 2007).
Moreover, RFID follows the standard frequency ranges, which are low frequency (120-135
KHz), high frequency (10-15 MHz), ultra high frequency (UHF) (850-950 MHz), and microwave
frequency (2.45 GHz). Matt Ward and Rob van Kranenburg (2006) says RFID is a wireless
communication device, it follows a number of standards. There are several standard bodies involved in
the development and definition of RFID technologies including: International Organization of
Standardization (ISO); EPCglobal Incorporation; European Telecommunications Standards Institute
(ETSI); Federal Communications Commission (FCC). RFID systems have a number of limitations for
integration, streaming and large volume of data. The accuracy of current RFID is improving, but there
is still erroneous readings error, such as duplicate readings or missing readings. Fusheng Wang and
Peiya Liu (2005) presented RFID data which are normally generated swiftly and automatically. It also
accumulates the data for tracking and monitoring. The generated data volume can be enormous, but the
problem which requires a scalable storage scheme. It is essential to assure the efficient queries and
updates. A. Gupta and M. Srivastava (2004) presented RFID data which integrates with existing
applications for product tracking and monitoring. This requires an RFID data management system that
can be easily configured to be integrated into different applications, with minimum integration cost.
Nowadays, fabrication techniques are also improving, so the reliability and the read range of the
passive RFID system continues to improve the cost effective way. Figure
RFID Standard
RFID systems do not support lack of standards. These standards are normally describes the physical
and the link layers, covering aspects such as the air interface, anti-collision mechanisms,
communication protocols and security functions. Several RFID standards exist and their applications
are under debate within the RFID development community.
440 M.J. Uddin, M.I. Ibrahimy, M.B.I. Reaz and A.N. Nordin
Nowadays, numerous standards are developing for improvement RFID. This can be compared
to developments in barcodes and wireless local area network (WLAN) (Burnell J., 2003). In these case,
it is not achieved widespread and developed until the international standards were adopted for these
systems. In 2004, the food marketing institute of information technology committee tried to recover
standard problems. They invented the national and international formal standards. Ron Weinstein
(2005) classified RFID development standards which have a number of debates. Ron Weinstein also
showed the international standards organization (ISO) three standards for RFID: ISO 14443 (for
contactless systems), ISO 15693 (for vicinity systems), and ISO 18000 (to specify the air interface for
a variety of RFID applications). Moreover, in terms of all important air interfaces ISO 18000 and the
electronic product code (EPC) standard are incompatible. Pedro Peris-Lopez et al. (2006) presented
one special integrated circuit card, ISO 7810, which used special type of identification card without
contact. According to the communication range, three types of card can be distinguished: (i) closecoupled
cards (ISO 10536); (ii) proximity cards (ISO 14443); (iii) vicinity cards (ISO 15693).
RFID Privacy, Legislation and Security
According to consumer scenarios, it has been updated the performance ability to use RFID to track a
customer's movement around the global market. This concept is not new for modern consumers.
Nowadays a number of customers are familiar with closed circuit television (CCTV) tracking.
However, RFID tracking logs are significantly smaller than CCTV output and are machineprocessable.
According to S. J. Engberg et al. (2004) approaches, as an invasion of privacy, many
people are accepted RFID tracking technology. Furthermore, there have more advantage when
shopkeeper encoded the records that are traceable to identifiable customers. It has been occurred when
RFID tag’s unique ID can be send to reader. Reader also can make a link to the back-end RFID
infrastructure, connect the unique ID to detail tag information and the purchase transaction. T. Weber
(2004) further has improved RFID system security. Weber says if RFID systems attempts to improve
security at the heart of the design then these kinds of privacy invasion would not be possible. Ari Juels
(2005) presented four essential factors for RFID privacy concerns such as wireless barcode
manifestation; RFID tags wireless barcode verity; RFID tags hypothetical scanning range; and RFID
tags on products for harvesting inventory information. Based on this approach, Ron Weinstein (2005)
presented a number of new security system such as RFID building control access system, usage of ID
card for automatic fare payment in mass-transit systems (smart trip card). Nowadays, many
organizations are using these modern technologies for solving security systems. Presently a number of
companies especially privacy enhancing technologies are trying to leverage and achieve legislatively
dictate security and privacy goals. M. R. Rieback et al. (2005) presents a number of uniting legislation
for RFID privacy enhancing technologies such as visibility of RFID tags and readers, access and
modification of RFID tag data, usage of privacy-enhancing technologies, visibility of high level query,
consent withdrawal, confidentiality of personal data and the contribution of technology.
RFID Brief History
During the first century Chinese were first used magnetic fields. From the 1600s to 1800s was growing
the base of mathematically related observation for electricity, magnetism and optics. In 1846, the
experimentalist expert Michael Faraday presented the light and radio waves which are the part of
electromagnetic energy (cited in D. J. Land, 2005). In 1864, Scottish physicist James Clerk Maxwell
presents his theory on electromagnetic fields. James has been concluded electric and magnetic energy
travel in transverse waves that propagate at a speed equal to that of light. In 1896, Guglielmo Marconi
invented successfully transmission of radiotelegraphy across the Atlantic, and it became very famous.
In 1906, Ernst F. W. Alexanderson demonstrates the first continuous wave (CW) radio generation and
transmission of radio signals. These signals are the beginning of modern radio communication where
all aspects of radio waves can be controlled.