towards the internet of things: an introduction to rfid
TRANSCRIPT
4th International Workshop on RFID Technology - Concepts, Applications,
Challenges
[email protected] Instituto Superior Técnico, Technical University Lisbon, Portugal
Towards the Internet of Things: An introduction to RFID
Miguel Pardal
José Alves Marques
4th International Workshop on RFID Technology - Concepts, Applications, Challenges
June 8th 2010
The Internet of Things
http://www.flickr.com/photos/crispyfried/76719715/
The Internet of Things
• Machine-centric
• Connects low-end devices
• Trillions (1012) rather than billions (109) of nodes
• Universal Identification
– EPC
• Universal Addressing
– IPv6
[Elgar Fleisch 10]
From local to global scope
Business applications
• Track & Trace – Monitor physical goods and keep history
• Industries:
– Warehousing – Maintenance – Pharmaceuticals – Medical Devices – Agriculture – Food – Retailing – Defense
[ Sybase.pt ]
Supply Chains
Automatic data capture
Other RF technologies
[ How stuff works ] [ PWKits ]
RFID tags
•LF (Low Frequency): [30 .. 300] kHz •HF (High Frequency): [3 ..30] MHz
•Inductive coupling •Load modulation
•UHF(Ultra-High Frequency): [300..3 000] MHz •MW (Microwaves): [2,5 .. 5,8 GHz]
•Wave coupling •Backscatter
RFID antennas and readers
RFID in action
[Roussos06]
RFID supply chain = EPC supply chain
Architecture Framework
RFID middleware is easy…
• All readers
• Read all tags
• At all times
NOT
Credits: Carlos Perdigão, IST
cannot
Why?
Credits: Christian Floerkemeier, MIT
Subscribe, Configure, Notify, Publish
[Floerkemeier07a]
Simulation
Credits: Carlos Perdigão, IST
Experimental setup
Credits: Nova Ahmed, Georgia Tech
Trials
Credits: Schuitema supermarkets, RFID Journal
RFID security is easy…
• All readers
• Read all tags
• At all times
NOT
Credits: Metro Group, RFID Journal
should not
Threats
[Garfinkel05]
Security
• Privacy
– Misbehaving readers, well-behaving tags
• Authentication
– Well-behaving readers, misbehaving tags
• Basic tags versus Advanced tags
– Attack model
• Infrastructure security
– ONS, EPCIS
Privacy approaches
• Physical protection – Shielded containers – Personal jamming devices – Downgrading tag abilities
• Killing and sleeping • Renaming
– Discarding serial numbers – Pseudonyms – Re-encryption by trusted partners
• Proxying – “transparent” readers – audit / watchdog
• Distance measurement – Distance as a measure of trust
[Ari Juels 06]
Conclusions
• RFID is a set of technologies – No “one-size-fit-all” tag and reader
• All readers cannot read all tags at all times – RFID middleware challenges – Physical layout matters
• All readers should not read all tags at all times – RFID security challenges – Trade-offs have to be carefully considered
• Towards the Internet of Things
– RFID allows things and places in the physical world to automatically generate data for information systems
4th International Workshop on RFID Technology - Concepts, Applications,
Challenges
[email protected] Instituto Superior Técnico, Technical University of Lisbon, Portugal
Extras
Internet of Things @ IST
Completed work
• Nuno Rodrigues
– RFID Logistics integration with Navision ERP
• Guilherme Pereira
– Open-source RFID track and trace
Ongoing work
• Ricardo Carapeto
– Smart luggage security
• Pedro Ferreira
– BizTalk EPCIS interface
• Carlos Perdigão
– Federated track & trace
• Miguel Pardal
– Scalable and secure Discovery services
Ongoing work
Future work
• RFID Toys
– Robot warehouse control
• RFID Virtual Lab
– IDE integration
Radio
• ISM radio bands
– Frequencies differ in world regions
• Europe, Americas, and Asia
• LF/HF RFID or UHF RFID?
– Operating principles are different
– Near-field far-field boundary
• Lambda / 2 PI
Near-field RFID
• LF (Low Frequency): [30 .. 300] kHz
• HF (High Frequency): [3 ..30] MHz
• Inductive coupling
• Load modulation
Shower Analogy
Far-field RFID
• UHF(Ultra-High Frequency): [300..3 000] MHz
• MW (Microwaves): [2,5 .. 5,8 GHz]
• Wave coupling
• Backscatter
Lighthouse Analogy
Range
Credits: C. Floerkemeier, MIT
Tag components
Credits: Rafsec OY, [Sarma01]
Manufacturing trade-off
• Cost
• Range
• Functionality
Pick 2
Tag categories
• Passive or battery-less – Use only power provided by the RFID reader’s signal – Smaller, more flexible – $ 0.20
• Semi-passive or battery-assisted
– Use a battery to boost response signal – $ 5
• Active or battery-powered
– Have additional processing capabilities and autonomy because they have more power e.g. sensors
– Longer range – $ 30
Legal ownership ≠ Physical possesion
Software Layers
Discovery: follow-the-chain vs directory
Authentication approaches
• Password
– Use kill secret key to authenticate
• Yoking
– Read sets of tags at same time and record
– Evidence tracks in a trusted third party.
[Ari Juels 06]