SEED -RFID
-
Upload
shishir-kant-singh -
Category
Documents
-
view
213 -
download
0
Transcript of SEED -RFID
-
8/21/2019 SEED -RFID
1/40
Embedded / Robotics / Communication | SEED Organization
SEED RFID
-
8/21/2019 SEED -RFID
2/40
RFID
d
INTRODUCTION
Almost every product in the market has a barcode printed on it.
Barcodes are machine-readable parallel bars that store binary information,
revealin information about the product. !hus, it acts as the product
"nerprint. As #e o to the supermarket to buy thins, the checkout person
runs our selection over the scanner to scan the barcode, there$s an audible
beep, and #e are told ho# much money #e o#e.
But the days of barcode are numbered. !he reason is that a
technoloy called radiofre%uency identi"cation &R'()* is catchin on R'()
tas are bein used by corporations to track people and products in +ust
about every industry. !hey transform everyday ob+ects like caro
containers, car keys, and even clothes on the rack at a shoppin mall into
mini nodes on a net#ork. )atabases then record the location and status of
these net#ork nodes to determine product movements.
!his technoloy can completely replace barcodes.
!he automotive industry makes use of small R'() tas that oer a hih
level of security at lo# cost.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
3/40
RFID
d
A lot of developments are takin place in R'() technoloy that #ill chane
the course of the industry, particularly in the supply chain area.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
4/40
RFID
d
TRANSPONDER
A ta is any device or label that identi"es the host to #hich it is
attached. (t typically does not hinder the operation of the host or adverselyaect its appearance.
!he #ord transponder is derived from the #ords transmitter and
responder. !he ta responds to a transmitted or communicated re%uest for
the data it carries.
'i. !ransponder Block )iaram
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
ANALOG CIRCUITRY
D R*SFER
+,ER S++/
DIGITAL CIRCUITRY
,*R,/ /,2I
SERI /,2I
I*ER*/
/,2I34IR,+R,ES,R
EE+R,4
R,4
R4
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
5/40
RFID
d
!he transponder memory may comprise of read-only &R*, random
access &RA*, and non-volatile prorammable memory for data storae
dependin on the type and sophistication of the device. !he R-based
memory is used to accommodate security data and the transponder
operatin system instructions #hich in con+unction #ith the processor or
processin loic deals #ith the internal 0house-keepin$ functions like
response delay timin, data 1o# control and supply s#itchin. !he RA-
based memory is used for temporary data storae durin transponder
interroation and response. !he non-volatile prorammable memory may be
of several types of #hich the electrically erasable prorammable read-only
memory &EE2R* is the most common. (t is used to store the transponder
data and needs to be non-volatile to ensure that the data is retained #hen
the device is in its %uiescent or po#er-savin 0sleep$ state.
)ata buers are further components of memory used to temporarily
hold the incomin data follo#in demodulation and outoin data for
modulation and interface #ith the transponder antenna. !he interface
circuitry provides the facility to direct and accommodate the interroation
"eld enery for po#erin purposes in passive transponders and trierin
of the transponder response. !he transponder antenna senses the
interroatin "eld and serves as the means for transmittin the transponder
response for interroation.3
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
6/40
RFID
d
CLASSIFICATION OF TAGS
n the basis of the presence of battery, tas can be classi"ed into
active or passive tas.
Active tas are po#ered by an internal battery and are enerally
read/#rite devices. !hey contain a cell havin a hih po#er to #eiht ratio
and are capable of operatin over a temperature rane of -45 to 675 deree
Celsius. Active tas have a "nite life time. A suitable cell coupled to suitable
lo# po#er circuitry can ensure functionality of ten or more years dependin
on operatin temperatures, read/#rite cycles and usae. !hey have reater
si8e and increased cost compared to passive tas.
2assive tas operate #ithout an internal battery source, derivin thepo#er to operate from the "eld enerated by the reader. !hey are hence
lihter than active tas and have reater life time. !hey have shorter read
ranes compared to active tas. !hey are also constrained in their ability to
store data and perform #ell in electromanetically noisy environments.
R'() tas can also be classi"ed on the basis of couplin into
inductively and capacitively coupled tas.
(nductively coupled R'() tas consist of the silicon microprocessor
#hich vary in si8e dependin on their purpose and metal coil #hich is made
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
7/40
RFID
d
of copper or aluminum #ire that is #ound into a circular pattern on the
transponder. !his coil acts as the ta$s antenna. !he ta transmits sinal to
the reader #ith the read distance determined by the si8e of the coil
antenna. (t also consists of an encapsulatin material of lass or polymer
that #raps around the chip and coil. (nductively coupled R'() tas are
po#ered by the manetic "eld enerated by the reader .!he ta$s antenna
picks up the manetic enery and the ta communicates #ith the reader.
!he ta then modulates the manetic "eld in order to retrieve and transmit
data back to the reader. )ata #hich is transmitted back to the reader is
directed to the host computer. !hese tas are e9pensive due to the silicon,
the coil antenna and the process that is needed to #ind the coil around the
surface of the ta.
Capacitively coupled R'() tas consist of an R'() chip and an
antenna made from t#o plate electrodes. !he readin mechanism bet#een
the ta and the reader is throuh capacitive couplin. 2lacin the ta in an
electric "eld po#ers the ta. !he "eld radient across the ta results in a
chare buildup bet#een the plates and hence a potential dierence #hich is
used to eneri8e the small silicon (C at its center.
)ata stored in data carriers re%uire some orani8ation and additionslike data identi"ers and error detection bits to satisfy recovery needs. !his
is kno#n as source encodin. :tandard numberin systems such as
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
8/40
RFID
d
;CC/EA< can be applied to data stored in tas. !as are basically used to
carry
.identi"ers, in #hich a numeric or alphanumeric strin is stored for
identi"cation purposes or as an access key to data stored in a computer or
information manaement system.
=. 2ortable data "les in #hich information is orani8ed for communication.
!as can be obtained that can store sinle bits to kilobits. !he sinle bit
devices are used for surveillance purposes. Retail electronic article
surveillance &EA:* is the typical application #hich activates an alarm in the
interroatin "eld. !hey can also be used for countin applications.
)evices characteri8ed by data storae capacities upto => bits are
suicient to hold a serial or identi"cation number toether #ith parity
check bits. !hese devices may be manufacturer or user prorammable. !as
#ith data storae capacities upto 4= bits are user prorammable and
suitable for accommodatin identi"cation and other speci"c data like serial
numbers, packae content, key process instructions and results of earlier
interroation/response transactions. !as #ith storae capabilities of ?@
kilobits are carriers of portable data "les. By increasin the capacity, facility
can be provided for orani8in data into "elds or paes that may be
selectively interroated durin the readin purpose. )ata transfer rates are
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
9/40
RFID
d
linked to carrier fre%uency. !he hiher the fre%uency, the hiher the
transfer rates. )ependin on the memory, the ta contains data that can be
read-only #rite once read many &R* or read /#rite. Read-only tas are
lo# capacity devices prorammed at source usually #ith an identi"cation
number. R devices are user prorammable devices. Read/#rite devices
are also user prorammable but allo# the user to chane data stored in a
ta. 2ortable prorammers may also be present that allo#s in-"eld
prorammin of the ta #hile attached to the item bein identi"ed or
accompanied.
READER/INTERROGATOR
!he reader/interroators can dier considerably in comple9ity
dependin on the type of tas bein supported and functions to be ful"lled.
!he overall function is to provide the means of communicatin #ith the ta
and facilitatin data transfer. 'unctions performed by readers include sinal
conditionin, parity error checkin and correction. nce the sinal from a
transponder has been correctly received and decoded, alorithms can be
applied to decide #hether the sinal is a repeat transmission and may then
instruct the transponder to stop transmittin. !his is kno#n as Command
Response 2rotocol and is used to circumvent the problem of readin
multiple tas in a short span of time. ;sin interroators in this #ay is also
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
10/40
RFID
d
referred to as ands )o#n 2ollin. A more secure, but slo#er ta pollin
techni%ue is called ands ;p 2ollin #hich involves the interroator
lookin for tas #ith speci"c identities and interroatin them, in turn. A
further approach uses multiple readers, multiple9ed into one interroator
but results in cost increase.
RANGE AND POWER LEVELS
!he rane that can be achieved in an R'() is determined byD
. !he po#er available at the reader/interroator to communicate #ith the
tas.
=. !he po#er available #ithin the ta to respond.
. !he environmental conditions and structures, the former bein more
sini"cant at hiher fre%uencies includin the sinal to noise ratio.
Althouh the level of available po#er is the primary determinant of
rane, the manner and eiciency in #hich that po#er is deployed also
in1uences the rane. !he "eld or #ave enerated from an antenna e9tends
into space surroundin it and its strenth diminishes #ith respect to
distance. !he antenna desin determines the shape of the "eld or
propaatin #ave delivered so that rane is also in1uenced by the anle
subtended bet#een the ta and antenna.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
11/40
RFID
d
(n the space free of any obstruction or absorption mechanism, the
strenth of "eld reduces in inverse proportion to the s%uare of the distance.
'or a #ave propaatin throuh a reion in #hich re1ections can arise from
the round and from obstacles, the reduction in strenth can vary as an
inverse fourth po#er of the distance. here dierent paths arise in this
#ay, the phenomenon is called multi-path attenuation. At hiher
fre%uencies, moisture presence can cause absorption #hich can further
aect the rane. here a number of re1ective obstacles are to be
encountered #ithin the applications under consideration, #hich may vary
from time to time, it may also be necessary to establish the implications of
such chanes throuh an appropriate environmental evaluation.
!he po#er #ithin the ta is enerally much less than that from the
reader, re%uirin sensitive detection capability #ithin the reader to handle
the return sinals. (n some systems, the reader constitutes a receiver and is
separate from the interroation source or transmitter, particularly if the up-
link &from transmitter to ta* carrier is dierent from the do#n-link &from
ta to reader*.
55-455m po#er are values %uoted for R'() systems, #hereas the
actual values should be con"rmed #ith the appropriate reulatory
authorities in the countries #here the technoloy is bein applied. !he form
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
12/40
RFID
d
in #hich the po#er is delivered, pulsed or continuous, and the associated
values are also indicated by the authority.
RFID SYSTEM
An R'() system consists of R'() tas, a means of readin or
interroatin the tas and a means of communicatin the data to a host
computer or information manaement system. !he system #ill also include
a facility for enterin or prorammin data into tas, if it is not done at the
source by the manufacturer. !here may also be present antennas for
communication bet#een the a and the reader.
'i.=. R'() :ystem
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
RF 4,D/E,*R,/
4,D/E
,S
REDER*E**
R*S+,*DER (2)
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
13/40
RFID
d
!he reader sends out a radio fre%uency #ave to the ta and the ta
broadcasts back its stored data to the reader. !he system has t#o antennas,
one for the ta and the other on the reader. !he data collected from the ta
can either be sent directly to a host computer throuh standard interfaces
or it can be stored in a portable reader and later updated to the computer
for data processin. !he automatic readin and direct use of ta data is
called 0automatic data capture$.F>3
hen the ta #hich is battery free, is to be read, the reader sends out a
po#er pulse to the antenna lastin for about 45ms.!he manetic "eld
enerated is collected by the antenna in the transponder that is tuned to the
same fre%uency. !his received enery is recti"ed and stored on a capacitor
#ithin the transponder. hen the po#er pulse has "nished, the transponderimmediately transmits back its data, usin the enery stored #ithin its
capacitor as its po#er source. !he data is picked up by the receivin
antenna and decoded by the reader unit. nce all the data has been
transmitted, the storae capacitor is dischared resettin the transponder
to make it ready for the ne9t read cycle. !he period bet#een transmission
pulses is called sync time and lasts bet#een =5ms and 45ms dependin on
the system set up.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
14/40
RFID
d
!he transmission techni%ue bet#een the transponder and the reader
is ':G.!his approach has ood resistance to noise and is cost eective to
implement.
SYSTEM PERFORMANCE
Reading ditan!e" !he actual readin distance depends on the
transponder type, electromanetic noise, transponder orientation, antenna
type. (n eneral, a =mm lass transponder can be read #ith a stationary
reader and ate antenna from a distance of about m.Harer transponders
can achieve ranes upto =m #ith handheld readers oerin lo#er ranes
upto =45mm.
Data a!!#ra!$" A ?-bit cyclic redundancy check alorithm is used to
ensure that only valid data is sent from the reader to its associated
controller.
Antenna e%e!tion" f the antenna types, the one ivin larer read
ranes is selected. Electromanetic noise aects the readout pattern.
Tran&onder orientation" 'or ma9imum rane, the antenna orientation
#ith respect to the transponder must be optimi8ed for ma9imum couplin.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
15/40
RFID
d
!he orientation in line #ith a ferrite antenna produces the larest read
ranes from =mm lass transponder.
Reading &eed" any applications re%uire that that transponder must
remain in the readin rane. :ince a standard stationary reader completes
one cycle in abut =5ms, transponders must remain in the boundaries of a
readout pattern for at least that amount of time.
IMMO'ILI(ER SYSTEM
(mmobili8ers are the security systems in automobiles. !he latest
eneration of R'() transponders called crypto transponders can be used as
the chief part of immobili8ers.
'i. . (B(H(IER !RA
-
8/21/2019 SEED -RFID
16/40
RFID
d
Gey-based immobili8er systems consist of four main components. !he
core of the system is the transponder , a battery less device #hich is
available in various form factors and #ith dierent functionalities. 'or
operation, the transponder has to be supplied #ith enery from an e9ternal
source. !he transceiver enerates a hih fre%uency manetic "eld #hich is
radiated by an antenna coil. !he enery activates the transponder and it
sends a data stream in form of a modulated R' sinal. !his sinal is
demodulated by the transceiver and then passed to the controller for data
processin. )ierent physical principles for R'() systems have been
established on the market. Concernin the transmission of enery, t#o
dierent systems can be distinuished.
F#%% D#&%e) S$te*+ !he enery for the transponder and the data sinal
enerated by the transponder are transmitted at the same time.
,a%- D#&%e) S$te*+ !he transmission of the enery for the transponder
and the data sinal from the transponder are done consecutively. !he
transponder stores enery in a capacitor and as soon as the transmitter is
s#itched o, the enery is used to transmit data. !he dierent techni%ues
have an impact on system desin and readin rane, but have no impact on
the system.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
17/40
RFID
d
Cr$&togra&.i! 'a!gro#nd
'rom the cryptoraphic point of vie#, the problem of immobili8ation
consists of t#o dierent tasks, the identi"cation of the driver and provin
his identity, the authentication. :everal cryptoraphic means are applicable
for driver authentication.
0no1%edge
!he authentication is based on the kno#lede of a secret, for e9ample
a pass#ord or 2(< &2ersonal (denti"cation
-
8/21/2019 SEED -RFID
18/40
RFID
d
Authentication by means of possession is the most common method
and #ill also be #idely spread in future. !he simplest implementation is the
possession of a mechanical key. A much hiher security is oered if the key
contains an electronic ta such as a transponder. !o start the vehicle, the
mechanical key and the code in the transponder must match.
All cryptoraphic systems described above are based on static
authentication procedures, #hich mean the security system of the car can
verify the identity of the key but the electronics in the key cannot check the
identity of the communication partner. A mutual authentication procedure
#hich also allo#s the key to verify the identity of the communication
partner is one feature that #ould improve the security level of the system.
A much hiher level of security can be achieved #ith a simple
symmetrical alorithm kno#n as challene / response protocol. !he security
system of the vehicle can check the identity of the key by sendin a %uestion
&a challene* and verifyin the ans#er &response*. !he correct ans#er can
only be iven if a secret is kno#n that is shared by both partners. !his
challene/response
concept has several advantaes. )urin normal use, the secret is not
e9chaned and both challene and response vary from cycle to cycle.
Standard Se!#rit$ Ar!.ite!t#re #ing RFID
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
19/40
RFID
d
Jarious security systems usin R'() transponders have been
established on the market.
'i9ed Code :ystems are the most commonly used. )urin
initiali8ation, the controller learns dierent identi"cation codes stored in
the transponders that belon to a vehicle. hen the driver places the
inition key in the lock cylinder, the "9ed code in the transponder is read
and compared to the codes stored in the memory of the controller.
!he level of security depends to a reat e9tend on the type of
transponder used. !here are #rite once transponders on the market #hich
are delivered unprorammed. 2rorammin is done by the user.
Commercially available readers/#riters allo# to pick up the code in the
transponder #hile a#ay from the vehicle and to proram an unprorammed
unit. !hus a copy of the "9ed code has been enerated #hich cannot be
distinuished from the oriinal. !rue Read nly systems on the market are
factory prorammed #ith a uni%ue identi"cation number. !hese systems do
not allo# copies. o#ever, it is possible to emulate the data sinal on the
radio fre%uency level. !he eort to desin an emulator is considerable and
re%uires R' desin kno#lede.
Rollin Code :ystems operate in the same #ay as "9ed code systems
e9cept that the secret code in the key is only valid for a certain period of
time, typically from one inition cycle to the other. !he :ystem :ecurity
Controller reprorams the transponder hich is a Read/rite type*
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
20/40
RFID
d
periodically. !he secret is chaned, but in terms of cryptoraphics the
procedure is still a static authentication. !o uarantee the reliability of the
system, resynchroni8ation procedures have to be implemented in case the
transponder prorammin fails or the transponder is reprorammed by
mistake #hile a#ay from the vehicle. Especially these procedures for
resynchroni8ation are the most critical issues in such systems.
A simple mutual authentication can be provided by pass#ord
protected transponders. !he transponder #ill deny access to the secret data
information stored in its memory unless a pass#ord is presented and thus
the identity of the reader proven. !he lenth of the pass#ord can vary
dependin on the re%uired security level. !he pass#ord is usually
transmitted in plain te9t and can be picked up or uessed if the transponderis available. )ependin on the lenth of the pass#ord, the time to uess the
pass#ord can vary from several minutes to several years. A limitation of the
system is the total transaction time #hich can be unacceptable for practical
use in the application.
Combined Rollin Code / 2ass#ord :ystems can also be implemented
usin pass#ord protected :ecured Read rite !ransponders. !hey provide
a hiher level of security.
Cr$&to Tran&onder
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
21/40
RFID
d
Crypto !ransponders are the second eneration of transponders for
use in immobili8ers. !he ne# eneration of crypto transponders developed
by !e9as (nstruments is based upon the !(R(: ! half duple9 R'()
technoloy and is compatible to all standard R' interfaces of the !(R(: !
product rane.
S$te* O2er2ie1
!he )iital :inature !ransponder &):!* is a crypto device #hich
oers the challene/ response functionality. )urin initiali8ation, the vehicle
security system and the transponder e9chane a secret encryption key. !he
key cannot be read out, only the transponder response to a challene sent
by the transceiver can be read. (n a typical application, the vehicle security
system enerates a @5 bit random number &the challene*, and sends it to
the transponder usin 2ulse idth odulation &2*. (n the transponder
the challene is shifted into the challene reister. 'or a short period of
time, enery is provided by the transceiver and the encryption loic
enerates a =@ bit response &sinature*.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
22/40
RFID
d
'i.@. Crypto !ransponder :ystem
!he response R is a function of the encryption key Ge , the challene
RA
-
8/21/2019 SEED -RFID
23/40
RFID
d
transponder and reader or after reception of the transponder response. (f
e9pected and calculated response are e%ual, the information is sent to the
enine manaement computer. (n time critical applications, the challene
and the response can be enerated after immobili8ation and stored for the
ne9t cycle.
!he advantaes of this system are obviousD
• )ependin on the challene the response is dierent every time. !heauthentication procedure is dynamic.
•
-
8/21/2019 SEED -RFID
24/40
RFID
d
!he transponder is a comple9 loical and mechanical micro system
desined to operate at very lo# po#er. )urin enery transfer less than µ A
is consumed by the transponder (C. !his allo#s a capacitor to be chared
over a considerable distance #ithin a reasonable amount of time, typically
less than 45ms. Even durin the encryption process, the current
consumption is belo# ?µ A. !herefore, the typical ma9imum read rane is
comparable to standard Read nly systems.
'i. 4. 2lastic ede !ransponder
Deign O34e!ti2e
!he )iital :inature !ransponder #as based on many established
circuit blocks and assembly techni%ues to ensure compatibility to e9istin
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
25/40
RFID
d
transceiver hard#are and to keep e9istin %uali"ed automated production
lines.
Apart from the desin challenes for the (C desinD
aintain lo# po#er consumption despite the lare number of ates for
encryption
• Geep #irin of the encryption circuitry to a minimum
• Geep chip si8e to a minimum,
A considerable eort has been spent to ensure
• A hih level of cryptoraphic security
• 'ast transaction times for the challene/response cycle
• Ho# data processin eort for the encryption alorithm in the car
security system
• Reliability in the application in terms of hihly sophisticated
supervision circuitry in the transponder.
En!r$&tion
All encryption alorithms are theoretically breakable. An alorithm is
computationally secure if it cannot be broken #ithin a reasonable amount of
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
26/40
RFID
d
time respectively #ith reasonable resources. (n this conte9t 0reasonable$ is
open to interpretations. Current assumptions for attacks aainst
immobili8er systems areD
• !he attacker #ill not spend more than "ve minutes in the vehicle
• !he key is not loner than ten days available for analysis
• !he key is not loner than ten days available for analysis
• !he attacker is familiar #ith cryptoanalytical techni%ues.
)ictionary attacks can be used if the key #as available to the attacker
for a
certain period of time to build a dictionary of challene response pairs. (n
the vehicle, the attacker hopes for a challene that is already in his
dictionary to reply #ith the correct response and start the enine.
:tatistical calculations sho# that even if the key is available for 5
days and the dictionary is built at a rate of four responses per second, the
probability for a successful attack #ithin "ve minutes in the car is only
5.@7L. !akin into consideration that this eort has to be repeated for each
vehicle, it can be understood that this method is uneconomic for the thief.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
27/40
RFID
d
Cryptoanalysis makes use of the kno#lede of the alorithm. !hose
attackers try to "nd a mathematical solution to the problem of "ndin the
encryption key #ith a limited amount of challene response pairs. !he
alorithm in the )iital :inature !ransponder has been developed to
frustrate these cryptoanalytical methods.
Read/Write Cr$&to Tran&onder -or S.ort C$!%e Ti*e
!he !G44?A-22 is a complete transponder interatin all important
functions for immobili8er and identi"cation systems. (t consists of a plastic
cube #hich accommodates the crypto (C and the antenna reali8ed as tuned
HC-circuit. (t is a R/ crypto transponder for applications #hich demandhiher security levels than those #hich standard R/ transponders can
ful"ll. 'or this reason it has an additional encryption alorithm block #hich
enables a base station to authenticate the transponder. Any attempt to fake
the base station #ith a #ron transponder #ill be reconi8ed immediately.
'or authentication, the base station transmits a challene to the
transponder. !his challene is encrypted by both (C and base station .Both
should posses the same secret key. nly then the result can be e9pected to
be e%ual. !he on-chip =5 Mbit EE2R&5 blocks of = bits*can be read
and #ritten block#ise by a base station !#o or four blocks contain the ()
code and si9 memory blocks are used to store the crypto key as #ell as the
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
28/40
RFID
d
read or #rite options.=4 k8 is the typical operational fre%uency of a
system usin this transponder.
Tran&onder Antenna
!he antenna consists of a coil and a capacitor for tunin the circuit to
the nominal carrier fre%uency of =4k8.!he coil has a ferrite core for
improvin the distance of read, #rite and prorammin operations.
'i. ?. Analo 'ront End &A'E*
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
29/40
RFID
d
!he A'E includes all circuits directly connected to the coil. (t
enerates the (C$s po#er supply and handles the bidirectional data
communication #ith the base station. (t consists of the follo#in blocksD
• Recti"ers to enerate a )C supply voltae from the AC coil voltae
• Clock e9tractor.
• 'ield ap detector for data transmission from the base station to the
(C.
Contro%%er
!he controller has the follo#in functionsD
• Control memory access.
• andle correct #rite data transmission.
• Error detection and error handlin.
• Control encryption operation.
• Control adaptation of resonance fre%uency.
Po1er on reet
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
30/40
RFID
d
(t is a delay reset #hich is triered #hen the supply voltae is
applied.
Ada&t
!he (C is able to minimi8e the tolerance of the resonance fre%uency
bet#een the base station and the transponder by on-chip capacitors in
parallel to the HC circuit of the transponder.
'itrate Generator
!he bitrate enerator can deliver bitrates of R'/= and R'/?@ for data
transmission from the (C to the base station.
'it De!oder
!he bit decoder forms the sinals needed for #rite operation and
decodes the received data bits in the #rite data stream
Mod#%ator
!he modulator consists of t#o data recorders. anchester and
biphase modulation are possible.
,V Generator
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
31/40
RFID
d
Joltae pump #hich enerates about >J for prorammin of the
EE2R.
Me*or$
!he memory is a =5-bit EE2R #hich is arraned in 5 blocks of
= bits each. All = bits of a block are prorammed simultaneously. !he
prorammin voltae is enerated on-chip.
Cr$&to Cir!#it
!he crypto circuit uses an alorithm to encrypt the challene #hich is
#ritten to the chip. !he computed result can be read by the base station.
Comparin the encryption results of the base station and the (C, a hih
security authentication procedure is established.
Writing Data into the IC
A #rite se%uence of the (C is sho#n belo#.
ritin data into the transponder occurs by interruptin the R' "eld
#ith short aps. After the start ap the #rite op-code &5* is transmitted.
!he ne9t = bits contain the actual data. !he last @ bits denote the
destination block address. (f the correct number of bits has been received,
the actual data is prorammed into the speci"ed memory block.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
32/40
RFID
d
'i. 7. rite protocol to proram the EE2R
Write Data Decoding
!he time elapsin bet#een t#o detected aps is used to encode the
information. As soon as a ap is detected, a counter starts countin the
number of "eld clock cycles until the ne9t ap #ill be detected. )ependin
on ho# many "eld clocks elapse, the data is rearded as $5$ or $$.!he
re%uired number of "eld clocks is sho#n in "ure .A valid $5$ is assumed if
the number of counted clock periods is bet#een ? and =, for a valid $$ it
is @> or ?@ respectively. Any other value bein detected results in an error
and the device e9its #rite mode and returns to read mode.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
33/40
RFID
d
'i. >. rite data decodin scheme
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
34/40
RFID
d
APPLICATIONS
2rinciple areas of applications of R'() includeD
. !ransportation
=. anufacturin and processin.
. :ecurity.
!e9as (nstruments Radio 're%uency (denti"cation &!(-R'id* :ystems
has introduced its ne# R'() ta for te9tile rental and dry cleanin
applications. !(-R'id tas provide more accurate identi"cation and reater
accountability as #ell as improved handlin throuh each stae of cleaninand processin to "nal customer delivery.
R'() system allo#s booksellers to ain such information as the rane
of books a shopper has bro#sed, the number of times a particular title #as
picked up, and even the lenth of time spent 1ippin throuh paes.
Nillete ,al-art, and !esco #ill install specially desined shelves that can
read R' #aves emitted by microchips embedded in millions of their
products. !he shelves can scan the contents of the shelves and, via
computer, alert store employees #hen supplies are runnin lo# or #hen
theft is detected.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
35/40
RFID
d
R'() tas loaded #ith biometric information #ill be embedded in passports
to ensure travelers comply #ith security reulations.
R'() technoloy is also bein used to improve luae handlin in airports.
Certain speci"c applications of R'() includeD
. 'leet manaement.
=. (nventory and asset manaement.
. arehouse automation.
@. a8ardous material manaement.
4. 2ackain, security and access control.
?. :mart card payment systems.
ADVANTAGES
• R'() technoloy permits no line of siht readin.
• Robustness and reliability under diicult environmental conditions.
!hese tas can be read throuh #ater, sno#, concrete, bricks,
plastics, #ood, and most non-metallic materials
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
36/40
RFID
d
• Available in a #ide variety of physical forms, shapes, si8es and
protective housins.
• R'() tas can be read at very hih speeds.
(n most cases the response time is less than 55ms.
)iiculty in duplicatin, oers a hih deree of security.
DISADVANTAGES
• Cot
R'() solutions cost much hiher than the conventional barcodes. A
lare fraction of its cost lies in the soft#are infrastructure and the
enterprise application and interation
• La! o- tandardization+
:tandardi8ation has not been provided across many fronts, ranin
from the dierent data formats used to interpretability bet#een R'()
readers and tas from dierent vendors to interference bet#een R'()
products from dierent manufacturers.
• RFID 1i%% .#rt &ri2a!$
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
37/40
RFID
d
R'() transponders are forever part of the product, and desined to
respond #hen a sinal is received.
CONCLUSION
R'() tas #ill soon be trackin millions of consumer products
#orld#ide. anufacturers #ill kno# the e9act location of each product they
make from the time it is made until it is used and tossed in the recycle bin
or trash can. !he crypto transponders #ill be #ell suited for future
eneration vehicle entry systems.
!he R'() tain #ill take o #hen the cost of the tas drops to one
percent of the cost of the product it is applied to, and that date is
some#here near.
=554 is the date that researchers say #hen radio fre%uency tain
becomes viable and until then, #e must #ait and see.
Hon checkout lines at the rocery store are one of the biest
complaints about the shoppin e9perience. !his is mainly due to the time
consumin use of ;2C barcodes. !hese codes act as product "nerprintsmade of machine-readable parallel bars that store binary data.
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
38/40
RFID
d
Created in O75s to speed up the checkout process, barcodes have certain
disadvantaesD
• (t is a read-only technoloy, #hich means it cannot send information.
• (t can easily be fored.
• Barcode scannin is time consumin.
!o overcome these, the barcodes are bein replaced by smart labels,
also called radiofre%uency identi"cation tas.
R'() tas are intellient barcodes that can literally talk to a
net#orked system to track every product that is bouht.
!he automotive industry also makes use of R'() battery less
transponders that oer a hih level of security at lo# cost. !he theft of
vehicles #ith electronic immobili8ers decreased to about one-tenth
compared to those #ithout immobili8ers. !his is based on the R'()
technoloy.
R'() is a technoloy that uses radio sinals for automatic
identi"cation by transmittin data in a machine-readable form usin
radiofre%uency as the carrier medium.
!his paper ives an in-depth kno#lede about R'() technoloy and
its applications
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/http://www.seed-india.org/
-
8/21/2019 SEED -RFID
39/40
RFID
d
Conta!t Detai% "
STUDENT EMPOWERMENT AND EDUCATION DEVELOPMENT
5SEED6
111+eed7india+org
Regd. OficeD M 7/7-B, P-Block, :harda 5=4 Branch Ofice: M 4-A, A#adhpuri, Ganpur- =5>5=@
Email-idD seedindia.5Qmail.com
Student Empowerment and Education Development (SEED)www.seed-india.org051-5!"00#$ "#50%&'0'0
http://www.seed-india.org/mailto:[email protected]://www.seed-india.org/http://www.seed-india.org/mailto:[email protected]://www.seed-india.org/
-
8/21/2019 SEED -RFID
40/40
RFID
d
ebsiteD ###.seed-india.or
2hone O55@ &Handline* 6O-O@457?5?5
http://www.seed-india.org/http://www.seed-india.org/