Internet of Things (IoT) and RFID

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of an RFID reader in an RFID system?

  • To store the data transmitted by the tag.
  • To encode the information received from the tags.
  • To decode and transmit power to the tag. (correct)
  • To modulate the radio frequency signals.

Which of the following best describes the role of the 'EPC Manager' within an Electronic Product Code (EPC)?

  • It determines the version number of the EPC and its format.
  • It identifies the company that produced the product, derived from the company's assigned prefix. (correct)
  • It denotes the specific serial number of an individual item.
  • It references the precise category of a product without any prefix.

What is the main purpose of implementing an anti-collision protocol in RFID systems?

  • To allow multiple tags to be read or written simultaneously without signal interference. (correct)
  • To improve the speed of data transfer between the tag and reader.
  • To prevent unauthorized access to the data stored on RFID tags.
  • To increase the read range of the RFID system.

What fundamental difference distinguishes active RFID tags from passive RFID tags?

<p>Active tags have their own power source, while passive tags harvest power from the reader. (A)</p> Signup and view all the answers

In the context of RFID technology, what does the term “load modulation” refer to?

<p>A technique used by tags to vary the magnetic field, influencing the reader's coil current. (D)</p> Signup and view all the answers

Which of the following is a potential security concern associated with RFID technology?

<p>Clandestine or unauthorized tracking of individuals or items. (A)</p> Signup and view all the answers

How does Near Field Communication (NFC) primarily facilitate data exchange between devices?

<p>Via magnetic field induction over a short distance. (C)</p> Signup and view all the answers

In an Electronic Product Code (EPC), what information is contained in the 'Serial Number' component?

<p>The serial number uniquely identifies a specific item. (B)</p> Signup and view all the answers

Which application is most suited for active RFID tags, given their capabilities?

<p>Monitoring temperature-sensitive goods during long-haul transportation. (C)</p> Signup and view all the answers

What is the function of the 'Header' within the structure of an Electronic Product Code (EPC)?

<p>To define the version of the EPC standard being used. (D)</p> Signup and view all the answers

What characteristic of low-frequency RFID makes it suitable for specific applications?

<p>Its relative insensitivity to interference from liquids and metals. (D)</p> Signup and view all the answers

What is the primary purpose of implementing "RSA Blocker Tags" in an RFID system?

<p>To prevent unwanted reading of other RFID tags. (C)</p> Signup and view all the answers

How does the Binary Tree Algorithm resolve tag collisions in RFID systems?

<p>By querying tags bit-by-bit to isolate and read individual tags. (B)</p> Signup and view all the answers

What is the main advantage of using Near Field Communication (NFC) for mobile payments?

<p>NFC provides secure and simple communication between devices within a short range. (B)</p> Signup and view all the answers

In the context of RFID tags, what does the acronym 'WORM' stand for?

<p>Write Once Read Many (D)</p> Signup and view all the answers

What is backscatter modulation, as used in high-frequency RFID systems?

<p>A method to reflect or absorb the incident radio-frequency energy to transmit data. (B)</p> Signup and view all the answers

Which of the following is a typical application of RFID technology in the healthcare industry?

<p>Tracking and managing medical equipment and supplies. (A)</p> Signup and view all the answers

How does Near Field Communication (NFC) improve the functionality of smart objects?

<p>By facilitating simple configuration and initiation of wireless network connections. (B)</p> Signup and view all the answers

What is a primary limitation of passive RFID systems compared to active RFID systems?

<p>Passive systems have a shorter read range due to their reliance on the reader's power. (C)</p> Signup and view all the answers

What is the typical frequency range for Near Field Communication (NFC) technology?

<p>13.56 MHz (B)</p> Signup and view all the answers

Outside of personal privacy, what is a major concern around using RFID for inventory?

<p>The ability for unauthorized price changes. (B)</p> Signup and view all the answers

What is the purpose of a "RFID Zapper"?

<p>To disable RFID tags. (B)</p> Signup and view all the answers

Which of the following is described as the most controversial application of RFID tags?

<p>Human implants. (D)</p> Signup and view all the answers

What frequency ranges is high-frequency RFID?

<p>10-15MHz, 850-950MHz (D)</p> Signup and view all the answers

In what year was passive RFID invented?

<p>1948 (C)</p> Signup and view all the answers

What is the primary application of re-label RFID tags and dual-use RFID tags?

<p>To allow for customer modification of information directly on an RFID tag. (C)</p> Signup and view all the answers

What is enabled via 'P2P mode' in NFC applications?

<p>Two devices can communicate with each other. (D)</p> Signup and view all the answers

Which of the following is not a use of NFC Technology?

<p>Toll collection. (D)</p> Signup and view all the answers

Where is an NFC chip usually implanted?

<p>The neck or arm. (A)</p> Signup and view all the answers

What is the key enabler for contactless communication in NFC technology?

<p>The interface of a smartcard and a reader into a single device. (B)</p> Signup and view all the answers

Which of these best describes the speed that NFC enables?

<p>106 kbit/s to 848 kbit/s (A)</p> Signup and view all the answers

What component in the RFID tag has the ability to read or write one or many tags at a time?

<p>Arbitration (C)</p> Signup and view all the answers

What is the greatest range an RFID tag can have?

<p>20-200m (C)</p> Signup and view all the answers

Flashcards

Internet of Things (IoT)

A network of physical objects embedded with sensors, software, and other technologies for connecting and exchanging data with other devices and systems over the Internet.

What is RFID?

A technology that uses radio waves to identify and track objects. It involves tags and readers.

Identification Friend or Foe (IFF)

Used by Allied bombers during World War II for aircraft identification.

RFID Tag

A component of RFID systems that transmits data.

Signup and view all the flashcards

RFID Reader

A component of RFID systems that reads data from tags.

Signup and view all the flashcards

Active RFID Tags

RFID tags that require an internal power source.

Signup and view all the flashcards

Passive RFID Tags

RFID tags that draw power from the reader's radio waves.

Signup and view all the flashcards

Low Frequency: Load Modulation

Variation in resistance of a circuit causing changes in the reader's current flow, uses ones and zeros transmitted by tag.

Signup and view all the flashcards

High-Frequency: Backscatter Modulation

Amplitude variations of a reflected signal corresponding to transistor patterns.

Signup and view all the flashcards

Low frequency (100-500 KHz) RFID applications

Access control, animal identification, inventory control.

Signup and view all the flashcards

High frequency RFID applications

Access control and smart cards.

Signup and view all the flashcards

Ultra-high frequency RFID applications

Railroad car monitoring, toll collection systems, and vehicle identification.

Signup and view all the flashcards

Bar Code

Visually represents data, manufacturer, and product information.

Signup and view all the flashcards

Electronic Product Code (EPC)

A code that identifies the manufacturer, product type, and individual item.

Signup and view all the flashcards

Collisions in RFID

A system where all tags respond to query, can cause information collisions.

Signup and view all the flashcards

Binary Tree Algorithm

Tags split into 0/1, reader polls each branch, collisions are resolved progressively.

Signup and view all the flashcards

RFID Applications

Three scenarios: tracking products, animal tracking, toll collection.

Signup and view all the flashcards

More RFID Applications

Examples include keyless entry, proximity cards, and supply chain management.

Signup and view all the flashcards

RFID Implants

Small cylinders implanted under skin for identification

Signup and view all the flashcards

Instant Checkout

Enables scanning of a shopping basket without individual item scans.

Signup and view all the flashcards

Concerns with RFID

Clandestine tracking and inventorying using RFID.

Signup and view all the flashcards

Unauthorized Reading

Scanning closed boxes, reading credit card info

Signup and view all the flashcards

Unauthorized Writing

Changing UPC/price, killing a tag

Signup and view all the flashcards

RFID Zapper

A device that can burn a tag using overcurrent

Signup and view all the flashcards

RSA Blocker Tag

Placed to prevent RFID reading

Signup and view all the flashcards

Put Tag to Sleep

Tag can be woken up later , tags can be reused.

Signup and view all the flashcards

Re-label Tag and Dual-Use Tag

Over writing a tag with new info

Signup and view all the flashcards

Authentication

Reader has to know PIN to access

Signup and view all the flashcards

Near-Field Communication (NFC)

A short-range wireless technology for simple communication between electronic devices (4cm or less)

Signup and view all the flashcards

How NFC works

Uses RFID tech, magnetic induction between electronic devices.

Signup and view all the flashcards

NFC is aimed at..

Mobile phones, contactless payment.

Signup and view all the flashcards

Three main uses of NFC

Card emulation, reader mode, and P2P mode.

Signup and view all the flashcards

NFC Applications

Used for mobile payments, electronic ticketing, and data transfer.

Signup and view all the flashcards

Study Notes

Internet of Things (IoT)

  • Internet of Things (IoT) is the concept of connecting everyday devices to the internet, allowing them to communicate and exchange data.

Radio Frequency Identification (RFID)

  • Radio Frequency IDentification (RFID) uses radio waves to identify and track objects.
  • RFID is a technology that uses radio waves to automatically identify and track tags attached to objects.
  • An RFID reader transmits a radio signal that activates the RFID tag, which then transmits data back to the reader

Historical Background of RFID

  • Identification Friend or Foe (IFF) system was used by Allied bombers during World War II.
  • Passive RFID was introduced in 1948.
  • In 1972, an "inductively coupled transmitter-responder" with 2 antennas was created.
  • In 1979, an "identification device" combined both antennas into one.
  • In the 1970s, scientists at Lawrence Livermore Laboratory (LLL) developed a handheld receiver powered by RF for secure access to nuclear facilities.

RFID Systems Components

  • Tags (transponders) are a key component, consisting of a microchip and antenna.
  • A tag reader, with a decoder and antenna, sends an energy pulse and awaits a response.
  • Tag readers can be continuously active or activated by an external event.

RFID Tags Variations

  • Variations in memory size range from 16 bits to 512 Kbytes.
  • Tags can be Read-Only, Read/Write, or Write Once Read Many (WORM).
  • Arbitration (Anti-collision) is the ability to read/write one or many tags at a time.
  • Frequency ranges from 125KHz to 5.8 GHz.
  • Price ranges from 0.10to0.10 to 0.10to250.
  • Physical dimensions range from thumbnail size to brick sizes.

Tiny RFID Tags

  • In 2007, Hitachi produced an RFID device measuring 0.05×0.05 mm, thin enough to be embedded in paper.
  • The data can be extracted from a few hundred meters away.

Active RFID

  • Active RFID tags use internal batteries.
  • Active tags have a "self-powered" function that uses an interrogator RF beam for wake-up and communication.
  • Active tags have a greater range of 20-200m.
  • Active tags have a very low required signal strength.
  • Active tags have a data storage of up to 512 KB.
  • Active tags can have a 10yr life.
  • Active tags have multiple sensor capabilities.
  • Active tags can recognize 1000's of tags recognized up to 100mph.

Passive RFID

  • Passive RFID tags are powered by energy transferred using RF from the reader.
  • Passive tags do not use batteries.
  • Passive tags have a data storage of 16 bits – 1 KB.
  • Passive tags have a very high required signal strength.
  • Passive tags have limited range of <10m (frequency dependent).
  • Passive tags allow communication & power from interrogator RF beam.
  • Passive tags can recognize a few hundred tags within 3m of reader, about 3 sec per read => at most 3 mph.

Radio Frequency (RF) Modulation

  • Modulation is how information is added to the carrier signal (RF radio frequency)
  • Modulation works by modulating the properties of a wave like its amplitude, frequency or phase depending on what information is being transmitted, and in order to receive the information transmitted you need a demodulator to extract the data that was inserted in the signal at transmission.

Low Frequency, Load Modulation

  • Integrated circuit sends a signal to an oscillator, which creates an alternating current in the reader's coil.
  • That current generates an alternating magnetic field that serves as a power source for the tag.
  • The field interacts with the coil in the tag, inducing a current that causes charge to flow into a capacitor, where it is trapped by the diode.
  • Charge accumulates which increases the voltage across it and activates the tag's integrated circuit, which transmits its identifier code.
  • Variations in the resistance of the circuit, due to the transistor turning on and off, cause the tag to generate its own varying magnetic field, which interacts with the reader's magnetic field.
  • Variations in current flow in the reader coil are sensed by a device that converts this pattern to a digital signal.
  • This technique, called load modulation, causes magnetic fluctuations that change the current flow from the reader to its coil in the same pattern as the ones and zeros transmitted.

High Frequency, Backscatter Modulation

  • An integrated circuit sends a digital signal to a transceiver.
  • A radio-frequency signal is generated that is transmitted by a dipole antenna.
  • The electric field of the propagating signal gives rise to a potential difference across the tag's dipole antenna.
  • The potential difference causes current to flow into the capacitor, whose resulting charge is trapped there by the diode.
  • The voltage across the capacitor turns on the tag's integrated circuit where it sends a series of digital high- and low- voltage levels.
  • The transistor gets turned on or off by the highs and lows of the digital signal.
  • The highs and lows alternately cause the antenna to reflect back or absorb some of the incident radio- frequency energy from the reader.
  • The variations in the amplitude correspond to the pattern of the transistor turning on and off.
  • The reader's transceiver detects the reflected and converts them to a digital signal that is relayed to the integrated circuit.

RFID Frequency Ranges and Characteristics

  • LOW (100-500 KHz): Short to medium read range, inexpensive, low read speed, used for access control, animal identification, and inventory control.
  • HIGH (10-15MHz, 850-950MHz): Short to medium read range, potentially inexpensive, medium reading speed, used for access control and smart cards.
  • ULTRA-HIGH (2.4-5.8 GHz): Long read range, high reading speed, line of sight required, expensive, used for railroad car monitoring, toll collection systems, and vehicle identification.

Codes

  • RFID tags and bar codes are used for product identification.

Electronic Product Code (EPC)

  • Header (8 bits): Identifies the EPC's version number and allows for the evolving of different lengths or types of EPC.
  • EPC Manager (28 bits): Identifies the manufacturer of the product which it derives from the company's prefix.
  • Object Class (24 bits): Refers to the exact type of product which is the GTIN (Global Trade Item Number) without the prefix or the item reference.
  • Serial Number (36 bits): The specific serial number of the individual item.

Communication and Collisions

  • Packet formats are very simple.
  • A general structure is Sync, Header, Command, Data, and CRC.
  • Reader-to-tag and tag-to-reader formats are somewhat different.
  • Typically 2 byte CRC (Cyclic Redundancy Check) is used.

Collisions in RFID Systems

  • All tags respond when receiving a query, which can lead to collisions.
  • Many readers have "simultaneous read" capabilities to resolve collisions.
  • "Carrier sense" is not possible.

Binary Tree Algorithm for Collision Avoidance

  • Tags are polled bit-by-bit to avoid collisions.
  • Example queries and responses:
    • "x": 7 tags respond, resulting in a collision.
    • "0x": 3 tags respond, resulting in a collision.
    • "00x": 1 tag responds.
    • "01x": 2 tags respond, resulting in a collision.
    • "010x": 2 tags respond, resulting in a collision.
    • "0100x": 1 tag responds.
    • "0101x": 1 tag responds
    • "011x": no response
    • "1x": 4 tags respond, resulting in a collision.
    • "10x": 1 tag responds.
    • "11x": 3 tags respond, resulting in a collision.

RFID Application Scenarios

  • Tracking the movement of consumer product goods
  • Animal identification/tracking/counting
  • Toll collection
  • Implantation of RFID chips into people, e.g., Alzheimer's patients

RFID Applications

  • Keyless entry systems
  • Proximity cards
  • Supply chain management

RFID Implants

  • Implants are a controversial application of RFID technology.
  • Small glass cylinders are approximately 2 or 3mm wide and between 1 and 1.5cm long.
  • An implant consists of a microchip, a coiled antenna, and a capacitor.
  • Implants are typically implanted under the skin of the arm or the back of the neck.

Instant Checkout Systems

  • Instant checkout systems use RFID to scan entire shopping baskets.

Concerns about RFID

  • Clandestine tracking
  • Inventorying

Security/Privacy Issues and Solutions

  • Unauthorized Reading can be prevented by using metal foil in passports or by scanning closed boxes outside.
  • The Unauthorized Writing of RFID tags can be prevented with authentication and can be killed.
  • RFID Zapper can burn a tag using overcurrent.
  • RSA Blocker Tag is placed near another RFID to prevent its reading.
  • Authentication requires the reader to know a PIN.
  • Put Tag to Sleep: Can wake up later and reuse the tags.
  • Re-label Tag and Dual-Use Tag: Allows customer to see differed info or customer can over-write tag with useful information.

Near-Field Communication (NFC)

  • NFC is a short-range wireless communication technology.
  • NFC offers safe and simple communication between electronic devices.
  • Exchange of data between devices happens over a distance of 4 cm or less.
  • NFC operates at 13.56 MHz and rates ranging from 106 kbit/s to 848 kbit/s.

How NFC Works

  • NFC is based on RFID technology that uses magnetic field induction between electronic devices in close proximity.
  • Two devices must have an NFC reader/writer and an NFC tag to communicate
  • The NFC tag is essentially an integrated circuit containing data, connected to an antenna, that can be read or written by the reader.
  • NFC combines the interface of a smartcard and a reader into a single device, and is compatible with contactless infrastructure already in use for public transportation and payment using exisiting ISO/IEC14443 smartcards and readers.
  • NFC is primarily aimed at usage in mobile phones
  • There were approximately 600 million NFC-equipped phones in use in 2015 (estimate that 5% are used at least once a month)

NFC Applications

  • Card emulation.
  • Reader mode.
  • P2P mode.
  • Mobile/electronic ticketing
  • Smart objects
  • Electronic keys
  • P2P data transfers
  • NFC configures and initiates other wireless network connections such as Bluetooth or Wi-Fi.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Internet of Things and Smart Cities
37 questions
History and Architecture of IoT
8 questions

History and Architecture of IoT

ThumbsUpArchetype8615 avatar
ThumbsUpArchetype8615
Understanding the Internet of Things (IoT)
41 questions
Use Quizgecko on...
Browser
Browser