Vikram Shankar, Jeff Pettinato Intel Corporation
Transcript of Vikram Shankar, Jeff Pettinato Intel Corporation
Infrastructurefor RFID ILT
Vikram Shankar, Jeff PettinatoIntel Corporation
ILT WorkshopSmart Labels USAFebruary 21, 2008
2
Presentation OutlinePresentation Outline
• Situation Analysis– Infrastructure Areas of Interest– Infrastructure Attributes of Interest
• Security• Areas to address for promoting RFID usage• Emerging trends• Recommendations• Discussion
3
Infrastructure Areas of InterestInfrastructure Areas of Interest
Applications/databases to process combination of RFID/non-RFID information.
Enables delivery of relevant data from thereaders to the data analytics system.
Combination of readers, antennas, tags, PLCs, and data networking gear.
Enables timely and secure sharing ofinformation with business partners1
32
4
4
Infrastructure Attributes of InterestInfrastructure Attributes of Interest1. Ease of installation and maintenanceRemote configuration of devices, antenna set up
5. Exception detection and resolutionRobustness to missing or incorrect datadue to non-reads and extended reads
2. Task executionComplexity of tasks that canbe executed automatically
4. Modularity & StandardizationAbility to mix and match features andcapabilities to an organization’s needs
3. SecuritySkimming, dataintegrity,vulnerability toviruses andworms
5
Security is a key focus area for RFID SystemsSecurity is a key focus area for RFID Systems
• Security issues are similar to most other IT deployments, but:– Greater amount of data shared provides more opportunity for mischief– Over-the-air communication with minimal encryption provides fairly easy
access to a larger system
• Security Focus Areas:– RFID Hardware:
• Over the air communication is susceptible to snooping and jamming• Limited computing capability of tags supports only minimal encryption
– Reader-Middleware Communication: Similar to IT– Middleware-Data Analytics Communication: Similar to IT– B2B Communication:
• Greater exposure to threats such as viruses and worms• Impact to operations when partner organizations’ networks are breached
… but security issues are similar to most other IT deployments!
6
Critical Technology NeedsCritical Technology Needs
Easier ways to deploy and manage theRFID infrastructure
• Should not need highly specialized worker• Automatic health monitoring
Security• Reduce vulnerability to attacks• Reduce impact of infrastructure outages at partner organizations
Inter-company data exchange• Better compatibility through
standards• Out-of-the-box solutions for fast and
low cost deployment
7
Emerging TrendsEmerging TrendsOpen Source software development efforts* Lower cost due to reusable libraries and typically less restricting licensing* Quicker time-to-market, again because of reuse* More secure and robust due to a larger community of developers and testers
Cost of deployingreaders expected toreduce* Integrated circuits willreplace discrete components* Smaller readers with lowerspace requirements(installation issues)
Wider use of multi-protocol readers* Global supply chain
Emerging Trends are in the Right Direction andwill accelerate RFID adoption
Importance of middleware expected to reduce* Enterprise applications assume some functionality* Readers become smarter
8
Near Term Recommendations (2008 Near Term Recommendations (2008 –– 12) 12)
•Enable a portfolioof open sourcesoftware closelylinked to standards.
•Participate in testbeds to validateboth standards andsoftware
Fund test beds•Identify and helpcloseimplementationgaps
•Validate opensource ROI and
deploy in products
Provide test beds tovalidate opensource
Enableinteroperability ofproducts byharmonizingstandards across allgeographies
N/A•Adopt standards inproducts
•Develop multi-protocol readers
Validate and helprefine Standardsbased on lessonslearned
Adoption ofstandards
Consolidate projects and realign talent andeffort to bring projects to fruition faster
Availabilityof opensourcesoftware andmiddleware
Standards BodiesFunding Agencies
(NSF, MITI, 5thFramework, etc.)
IndustryUniversity &
ResearchConsortia
Recommended ActionNear Term
Need(2008-12)
Using Industry Standards and Open Source Are Critical toAccelerating RFID Cost Reduction and Adoption Rates
9
Long Term Recommendations (2012+)Long Term Recommendations (2012+)
Deliver standard,easy-to-use andconfigurablesolutions; Adoptglobal standards
Train RFID-savvystudents for bothengineering andadvanced research
Tailor standards to lowcost price points byintelligently reducingrequirements
Fund centers ofexcellence toenable the iNEMIILT roadmap
•Participate in CoE•Commercialize andproduce low cost ILTtechnologies
•Create Centers ofExcellence (CoE)•Develop lowcomplexity/cost en-cryption algorithms
Low costtechnologysolutions forILT
Encouragetechnologies that willuse “white space”frequencies
Fund centers ofexcellence toenable the iNEMIILT roadmap
Develop antennasthat can beconfigured on-the-flyfor any of a broadrange of frequencies
Create Centers ofExcellence (CoE)for tunableantennas
Tunableantennas
University &ResearchConsortia
Encourage plug-and-play philosophy andbuild into thestandards
N/A
Databases and business applications thatare tolerant of incomplete or incorrect data
Deploymentcomplexity
Standards BodiesFundingAgenciesIndustry
Recommended ActionLong Term
Needs(2012+):
There is a Huge Opportunity for Consortia and Universities to DoHighly Applicable Research and Create “Centers of Excellence”
12
Infrastructure Technology Needs (1)Infrastructure Technology Needs (1)
Plug and playRFID devices
Dynamic quick-change informationsystems
Autonomicinfrastructuremanagement andfailure recovery
Attributes
Humaninterfaces forset-up andmaintenancemade easyenough forregular IT staff
Databases andinformationsystems todetect missing orincorrect dataand to takecorrective action
Centralizedequipmentfailure predictionand preemptivemaintenance
Attributes
Automaticchannel statecomprehension
Read range self-configurationbased on inputcriteria
Requires highlytrained RFIDprofessionals
Infrastructure set-up
Technologiesthat enable easyand rapidprocess changeswithout the needfor extensivesoftwarereimplementation
Data analysis andoutlier recognitionalgorithms
Conduit for datacollection andexchange
Infrastructure featuresandcapability
Self-awaredevices andinfrastructure
Equipmentperformance andhealth analyticsFailure predictionalgorithms
Remote device-by-devicediagnostics andlimitedreconfiguration
Infrastructure HealthMonitoring
Tech. NeedsTech. NeedsAttributesFeaturesLong-Term (2017)Mid-term (2012)State of the Art
13
Infrastructure Technology Needs (2)Infrastructure Technology Needs (2)
Globalinformationexchangestandards
Out-of-the-boxcompatibilitybetween partnersin the entiresupply chain
informationexchangestandards
Compatibilitybetweenimmediatetrade partners
Limited or case-by-casecompatibility
Inter-companyDataexchangeandcompatibility
Inferenceengines toaggregateshared data tocheck ifinformation canbe inferred fromshared data
Prevent breach ofsecurity andprivacy throughinference
Open,standardizedmechanismsthat do notdepend onalgorithmsecrecy
More securetag-readercomm. (whenneeded)Openencryptionalgorithms formulti-vendorcompatibility
Proprietaryencryptionalgorithms fortag-readercommunica-tionthat depend onsecrecy ofalgorithm
SecurityAttributesAttributes Tech. NeedsTech. NeedsAttributesFeatures
Long-Term (2017)Mid-term (2012)State of the Art
14
Open Source EffortsOpen Source Efforts
1. RadioActive Foundation is currently working on three projects: Neutrino, Fusion, andGraviton. Fusion is a middleware that gathers data from tags and readers and delivers thatdata to enterprise information systems; Neutrino is a software suite that enables the exchangeof EPC data between business partners; and Graviton is a simulator for RFID hardware fromvarious manufacturers.
2. LogicAlloy is developing a middleware that implements the Application Level Events (ALE)interface. ALE is an interface standard from EPC Global that provides a layer of abstractionbetween the data providers such as RFID readers and the data subscribers such asenterprise information systems (e.g. Warehouse Management software).
3. FirstOpen is developing a middleware called Singularity Middleware and is also working onEPC-IS.
4. Pramari is developing a reader emulator called Rifidi. The emulator will enable rapiddevelopment of RFID applications by allowing developers to test their applications againstemulated scenarios and hardware rather than real hardware.
5. The University of Arkansas is developing a middleware called TagCentric that collects datafrom a network of RFID readers and sends to a database.
6. Open Source Innovation has received a grant from the UK government to develop opensource RFID solutions.
7. Several RFID vendors have joined together to develop the LLRP Toolkit – a set of opensource libraries for the implementation of the Low Level Reader Protocol based applications.
8. Accada is a rapid prototyping platform that implements the EPC Network specifications.
15
Open Source NeedsOpen Source Needs
Short term (1-3 years)Development andimplementation ofmicrowave air interfaceprotocols
Lack of standards for2.4 GHz and 5.8 GHz
Tag protocols
Short to medium term(1-5 years)
Software must beimproved to meetproduction graderequirements ofreliability, maintain-ability and security
Lack of open sourceproduction-readybusiness logic software
Business-to-businessinformation exchange
Short to medium term(1-5 years)
•Discovery services•Object naming services•Pedigree
EPC architecture
TimelineDevelopment NeedsGaps