SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36




         THE RFID TECHNOLOGY AND ITS CURRENT APPLICATIONS
      Elisabeth ILIE-ZUDOR1, Zsolt KEMÉNY2, Péter EGRI3, László MONOSTORI4
          1-4
             Computer and Automation Research Institute, Hungarian Academy of Sciences
                                  Kende u. 13–17, 1111, Budapest
               4
                Department of Production Informatics, Management and Control, BME
                                              Hungary
                             {ilie, kemeny, egri, monostor}@sztaki.hu




Abstract:
      The paper gives an overview of the current state of the art in the radio frequency identification
      (RFID) technology. Aside from a brief introduction to the principles of the technology, a sur-
      vey is given on major classes of RFID tags and readers, commonly used frequencies and
      identifier systems, current and envisaged fields of application, as well as advantages, con-
      cerns and limitations of use.

Keywords:
     RFID principles, advantages, limitations, applications

1. INTRODUCTION
Although the foundation of the Radio Frequency Identification (RFID) technology was laid by past
generations, only recent advances opened an expanding application range to its practical imple-
mentation.
RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto
ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch mem-
ory, smart cards, biometrics etc. Auto ID technologies are a new way of controlling information and
material flow, especially suitable for large production networks.
The RFID technology is a means of gathering data about a certain item without the need of touch-
ing or seeing the data carrier, through the use of inductive coupling or electromagnetic waves. The
data carrier is a microchip attached to an antenna (together called transponder or tag), the latter
enabling the chip to transmit information to a reader (or transceiver) within a given range, which
can forward the information to a host computer. The middleware (software for reading and writing
tags) and the tag can be enhanced by data encryption for security-critical application at an extra
cost, and anti-collision algorithms may be implemented for the tags if several of them are to be
read simultaneously.
One important feature enabling RFID for tracking objects is its capability to provide unique identifi-
cation. One possible approach to item identification is the EPC (Electronic Product Code) [4], pro-
viding a standardized number in the EPCglobal Network, with an Object Name Service (ONS) pro-
viding the adequate Internet addresses to access or update instance-specific data. However, cur-
rently, ONS cannot be used in a global environment, and since it is a proprietary service, its use is
relatively expensive, especially for participants with limited resources such as SMEs. As an alter-
native, researchers from the Helsinki University [7] have proposed the notation ID@URI, where ID
stands for an identity code, and URI stands for a corresponding Internet address. This allows sev-
eral partners to use the system and still guarantee unique identification. The project ‘Identity-Based
Tracking and Web-Services for SMEs’ (http://www.traser-project.eu) is currently working on further
development of this concept.
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36

2. TYPES OF TAGS AND READERS
RFID tags and readers can be grouped under a number of categories. Their classification is pre-
sented in Table 1.
                                            Classification of RFID tags
 Passive                           -    also called ‘pure passive’, ‘reflective’ or ‘beam powered’
                                   -    obtains operating power from the reader
                                   -     the reader sends electromagnetic waves that induce current in
                                        the tag’s antenna, the tag reflects the RF signal transmitted and
                                        adds information by modulating the reflected signal


 Semi-passive                      -    uses a battery to maintain memory in the tag or power the elec-
                                        tronics that enable the tag to modulate the reflected signal
                                   -     communicates in the same method, as the other passive tags




 Active                            -    powered by an internal battery, used to run the microchip’s cir-
                                        cuitry and to broadcast a signal to the reader
                                   -    generally ensures a longer read range than passive tags
                                   -    more expensive than passive tags (especial because usually are
                                        read/write)
                                   -    the batteries must be replaced periodically

                                 By the tag’s memory type
 Read-only               - the memory is factory programmed, can not be modified after its
                             manufacture
                         - its data is static
                         - a very limited quantity of data can be stored, usually 96 bits of in-
                             formation
                         - can be easily integrated with data collection systems
                         - typically are cheaper than read-write tags
 Read-write              - can be as well read as written into
                         - its data can be dynamically altered
                         - can store a larger amount of data, typically ranging from 32
                             kBytes to 128 kbBytes
                         - being more expensive than read-only chips, is impractical for
                             tracking inexpensive items
   By the method of wireless signal used for communication between the tag and reader
 Induction               - Close proximity electromagnetic, or inductive coupling—near field
                         - Generally use. LF and HF frequency bands




 Propagation                       - Propagating electromagnetic waves—far field
                                   - Operate in the UHF and microwaves frequency bands
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36


                                           Classification of readers
                                       By design and technology used
 Read                             - only reads data from the tag
                                  - usually a micro-controller-based unit with a wound output coil,
                                      peak detector hardware, comparators, and firmware designed to
                                      transmit energy to a tag and read information back from it by de-
                                      tecting the backscatter modulation
                                  - different types for different protocols, frequencies and standards
                                      exist
 Read/write                       - reads and writes data from/on the tag
                                            By fixation of the device
 Stationary                       The device is attached in a fixed way, for example at the entrance
                                  gate, respectively at the exit gate of products
 Mobile                           In this case the reader is a handy, movable device.
                                Table 1: Classification of RFID tags and readers

3. ADVANTAGES AND LIMITATIONS OF THE TECHNOLOGY
3.1. Advantages
Though RFID is not likely to entirely replace commonly used barcodes in the near future, the fol-
lowing advantages suggest to additionally apply RFID for added value of identification:
   Tag detection not requiring human intervention reduces employment costs and eliminates hu-
   man errors from data collection,
   As no line-of-sight is required, tag placement is less constrained,
   RFID tags have a longer read range than, e. g., barcodes,
   Tags can have read/write memory capability, while barcodes do not,
   An RFID tag can store large amounts of data additionally to a unique identifier,
   Unique item identification is easier to implement with RFID than with barcodes,
   Tags are less sensitive to adverse conditions (dust, chemicals, physical damage etc.),
   Many tags can be read simultaneously,
   RFID tags can be combined with sensors,
   Automatic reading at several places reduces time lags and inaccuracies in an inventory,
   Tags can locally store additional information; such distributed data storage may increase fault
   tolerance of the entire system,
   Reduces inventory control and provisioning costs,
   Reduces warranty claim processing costs.

3.2. Current issues of concern, limitations
Although many RFID implementation cases have been reported, the widespread diffusion of the
technology and the maximum exploitation of its potential still requires technical, process and secu-
rity issues to be solved ahead of time. Today’s limitations of the technology are foreseen to be
overcome and specialists are already working on several of these issues.
3.2.1. Standardization
Though the characteristics of the application and the environment of use determine the appropriate
tag, the sparse standards still leave much freedom in the choice of communication protocols and
the format and amount of information stored in the tag. Companies transcending a closed-loop so-
lution and wishing to share their application with others may encounter conflicts as cooperating
partners need to agree in standards concerning communication protocols, signal modulation types,
data transmission rates, data encoding and frames, and collision handling algorithms. Currently,
two major groups of standards are competing worldwide: one is EPC created by the Auto-ID Cen-
ter and receiving the support of UCC (Uniform Code Council) and EAN (European Article Number-
ing), the other is the ISO-specified (International Standards Organization) set of standards.
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36

3.2.2. Cost
The cost of tags depends on their type. In the 2003 report ‘RFID Systems in the Manufacturing
Supply Chain’ [16], ARC Advisory Group predicted the following decrease of tag prices:
                                                   Price in 2003      Estimated price in 2008
                            Passive UHF tag          57 cents                16 cents
                            Passive HF tag           91 cents                30 cents
This predicted decrease is still deemed insufficient, as economic use of tags—taking the associ-
ated 5–35% decrease of labor costs and zero tag information generation costs into account as
well—would require a maximum of 25 cents per tag for high-end products, and 5 cents for common
item-level tagging.
Prices of active or semi-passive tags (at least $1 per tag) are even more of a hindrance, allowing
their economic application only for scanning high-value goods over long ranges.
3.2.3. Collision
Attempting to read several tags at a time may result in signal collision and ultimately to data loss.
To prevent this, anti-collision algorithms (most of them are patented or patent pending) can be ap-
plied at an extra cost. The development of these methods, aimed at reducing overall read time and
maximizing the number of tags simultaneously read, still goes on [3].
3.2.4. Frequency
The optimal choice of frequency depends on several factors, such as:
a.) Transmission mode. RFID tags basically use two kinds of data transmission, depending on the
behavior of electromagnetic fields at the frequency used. In lower frequencies (such as 125–
134kHz in the LF band or 13.56MHz in the HF band), inductive coupling is used, while in frequency
bands above (UHF with typical frequency ranges of 433MHz, 865–956MHz and 2.45GHz), wave
backscattering is the main means of transmission. This also affects the safe reading range, as it is
easier to build direction-selective devices with a longer read range in higher frequencies. This may
restrict design freedom if either reading range or spatial selectivity are an important issue.
b.) Behavior of tagged goods and environment. Properties of some materials may be an obstacle
to RFID application at a given frequency, as they may corrupt data transmission either by absorp-
tion or by ambient reflection of the signals. Typically, conductive materials such as goods contain-
ing water, or metal surfaces may be the source of problems. However, absorption and reflection
being frequency-dependent, failure at one frequency does not rule out applicability at other fre-
quencies. Electromagnetic disturbance can also have external sources, which is also a common—
though also frequency-dependent—problem in an industrial environment.
c.) International standards in frequency allocation. Due to historic reasons, the world is divided into
three large regions of frequency allocation for various purposes, region 1 containing Europe, Af-
rica, the Middle East and former SU member states, region 2 with North and South America and
the part of the Pacific east of the date line, and region 3 with Asia, Australia and the Pacific west of
the date line. The industry exerts pressure towards a uniformization of frequencies allowed for
RFID, yet there still are notable differences between the three regions, forcing companies planning
to employ tags in several regions to restricting themselves to bands shared by all regions con-
cerned. A compromise for tags only modulating the reader signal without actively producing a car-
rier wave on their own may be their ability to work in a wider frequency range than nominally speci-
fied, allowing their usage even in regions where RFID bands are ‘close enough’.
3.2.5. Faulty manufacture of tags.
Manufacturing of tags is not yet 100% failure-free today; about 20–30% of tags used in early RFID
pilots have been defective [22].
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36




                  Figure 1: Common RFID frequency ranges and allocation in Region 1
3.2.6. Faulty or deficient detection of tags
a.) Tags may be damaged during usage. A wide range of application challenges can be answered
by the multitude of suitable tags, yet none of them is completely invulnerable and the causes of
damage may vary from type to type. The result is a read failure which is, in many cases difficult to
detect, as is the fact of the damage itself for a hidden tag. This becomes a business issue when,
for example, the payment for goods is calculated by the number of detected tags and no measures
are taken to compensate for read failures.
b.) Adverse conditions of the environment and improper placement may corrupt reading. As men-
tioned before, absorption, ambient reflection of the signal and external signal sources (such as se-
curity systems, cordless phones, barcode scanners) may introduce read errors. Similarly, improper
orientation of tags may impair reading efficiency as most antennas used in tags are direction-
sensitive [22].
c.) Registration of data from tags which pass within range of an RFID reader accidentally.
d.) Reader malfunction. This eventuality cannot be predicted or completely avoided, making alter-
native fallback measures (such as barcodes) necessary for the case of reader failure.
3.2.7. Quick technology obsolescence
One of the common concerns of companies implementing RFID today is the rapid obsolescence of
the technology, especially in view of the investment cost. Technology is continuously evolving and
new protocol standards, faster and more fault-tolerant readers quickly outdate their predecessors.
3.2.8. Security and Privacy Issues
Depending on the field of application—and in some cases, prescribed by law—it may become nec-
essary to prevent unauthorised persons from reading or writing data stored on or transmitted from
tags. To this end, encryption must be ensured at all interfaces where data could be intercepted or
transmitted (on the medium itself, as well as tag–reader and reader–host communication) [22].
Privacy issues concerning the—possibly hidden—use of RFID tags has been identified as one of
the problems by many experts and associations, among them the ‘Caspian’ (Consumers Against
Supermarket Privacy Invasion and Numbering), since the beginnings of its application (see [19],
[14], [20], and [18]). The main concerns are related to unique item-level tagging of merchandise
without knowledge or consent of end users, having ‘the potential to jeopardize consumer privacy,
reduce or eliminate purchasing anonymity, and threaten civil liberties’ [19], are: a) hidden place-
ment of tags and unnoticed reading by third persons, b) unique identifiers for all items worldwide
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36

could make the link between user and item recordable and retrievable, c) massive data aggrega-
tion about items and customers becomes possible, d) tags (especially in the UHF range) can be
read from a distance without direct line of sight, e) item-level unique tagging may allow individual
tracking and profiling, i.e., linking personal identity with merchandise items without the consent of
individuals.
3.2.9. Possible virus attacks
Although not widely reported so far, a study of the Vrije Universiteit Amsterdam [23] has shed light
on potential vulnerability of current RFID software if used together with a backend database. Simi-
larly to previously known attacks against SQL systems (such as the Slammer virus), intentionally
effected buffer overflow, false end-of-row characters and camouflaged comments can lead to un-
verified data being interpreted as SQL commands which can perform malicious operations on the
database contents or prompt the system to copy the infected data to further tags.

4. APPLICATIONS
Current and proposed uses of RFID span a wide spectrum of application areas (e.g.: see Figure 2),
and a fully comprehensive overview would certainly surpass the limits of this paper. It is, however,
easy to see that the nature of a given use of RFID can be put in either one of three groups:
1) item instance or item class identification,
2) location identification,
3) data transfer from or to the RFID tag.
4.1. Instance or class identification
If RFID tags are only used for the purpose of item type or instance identification, usually, a data-
base is maintained in the background to provide or receive the additional information needed.
Augmented with this support, destination or way of handling can be determined for the given item,
an already proven concept in a number of logistics solutions (several shipping and postal services,
such as UPS, FedEx, USPS and Finland Post [8]). Also, examples in manufacturing demonstrate
the benefits of RFID, such as with identifying individual car bodies in customized automotive pro-
duction (BMW’s car body identification in their Dingolfing factory [5]), tracking of manufacturing
(pre-delivery tracking and location of cars in Volkswagen’s Wolfsberg facility [12]) or even architec-
tural construction processes (Skanska Finland applies Enterprixe’s 4D production model solution),
automatic retooling of work-cells for the given item, and fail-safe identification of samples for quality
control (Schreiner’s LogiData control system applied by Auto5000 GmbH, a supplier of Volks-
wagen [15]; RFID-based administration of quality control at Ford’s Essex engine plant in Windsor,
Ontario [12]; RFID-based identification of material test samples at the MTR Corporation of Hong
Kong which builds and operates urban railways [12]). In the agriculture, farm animals can be identi-
fied using RFID tags, and a retrieval service for lost pets also relies on RFID implants as the
means of identification (‘Home Again’ pet retrieval service [13]). Also, RFID tags are widely relied
on in security systems which grant access to facilities etc. depending on the given user’s level of
authorization (even an example from a Chinese party congress is known [12]), while in other
cases, even passports are equipped with tags (Department of Homeland Security is already testing
RFID-equipped passports at several locations worldwide [15]). Speaking of security, RFID is also
commonly used in anti-theft protection and RFID-based house arrest supervision is also contem-
plated [9]. Another subclass of identity-related application examples contains the cases where the
database in the background is not only queried upon reading a tag but also updated, e.g., to keep
track of inventory changes (commonly used in warehouses, but future application is envisaged
even for such cases as intelligent refrigerators which keep track of food supplies). In many cases,
the short time lags and failure-free ID entries or even the resistance of RFID tags to adverse condi-
tions (extreme temperatures, dirt, chemicals etc.) contribute substantially to the success of the ap-
plication [5].
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36




                                     Figure 2: Examples of application areas


4.2. Location identification
If a given reader is assigned to a known location, it is possible to track the current place of a given
uniquely identifiable item. Numerous logistics companies and some postal services have already
integrated such RFID-based features into their tracking services (several shipping and postal ser-
vices, such as UPS, FedEx, USPS and Finland Post [8]; automatic vehicle location systems in pub-
lic transport control in Vejle, Denmark [10]; location of rolling stock at the Swiss Federal Railways),
and similarly, the physical location of work pieces is being kept track of in several manufacturing
facilities, too (e.g.: in Dell’s facility in Xiamen, China [12]). The RFID tags to be read for localization
can be either attached to containers or items, or they can identify the transporting vehicle itself.
Aside from the benefit of providing exact information (as opposed to the risk of incomplete, delayed
or corrupted data if entries are made manually), reading RFID tags does not require a long halt in
the transportation process, making thus delivery more efficient. Also, farm animals can be effi-
ciently localized using RFID tags while a similar tracking principle is applied in some prisons as
well. Other location-specific application examples are envisaged using direction-selective readers.
These aim to find the exact location of a tag in a wide area, such as golf balls on a golf course [9].
4.3. Transfer of further data
In the third application group, not only an identity is extracted from the tag but also auxiliary data
are read or written. Data read from the tag usually contains information which would be difficult im-
practical or impossible to obtain from a remote or pre-recorded database, or measurement results.
Some products may provide instructions for proper handling this way (envisaged are cases where
tags in food packaging would instruct an oven about the optimal cooking time [2], or tags in cloth-
ing would select the right program for a washing machine [17]), while in a number of already im-
plemented uses, tags provide medical measurement data e.g., about eye-ball pressure (sensor
and transmitter integrated into artificial lens implant [6]). Writing data to a tag usually adds informa-
tion about the processing of the given item (or delivery progress in transportation), and in a few
cases, a new identity is assigned to the tag by rewriting (such as for reusable containers, pallets
etc., as in a pilot project at the Finnish Post [8]). An interesting application is envisaged for washing
machines where read-write tags in clothes also record how many times the given piece has been
washed and select the proper washing program to adapt to aging of the fabric [17].
In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN
                                                                                                         963 86586 5 7, pp.29-36

5. CONCLUSION
The paper gave an overview of the current state and trends of RFID technology. Even though nu-
merous limitations and unresolved issues still hinder the widespread application of RFID, it can be
already seen that especially enterprises in complex supply chains will benefit from RFID, once the
application difficulties are overcome.
Acknowledgements
The work was supported by the EU FP6 program (project no. 033512), NKFP Grant No.2/010/2004
and the OTKA Grants No. T043547 and T049481.

6. REFERENCES
[1] Albano, S.: Auto-ID Field Test, Lessons Learned in the Real World,
     http://islab.oregonstate.edu/koc/ece399/notes/rfid-field-test.pdf.
[2] Almirall, E., Brito, I., Silisque, A., Cortés, U., 2003: From Supply Chains to Demand Networks, pg. 13.
[3] Burdet, L. A., 2004: Smart Environments, Seminar, Zürich.
[4] EPC Global, http://www.epcglobalinc.org/index.html.
[5] Finkenzeller, Klaus, 2003: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards
     and Identification, Second Edition. John Wiley & Sons, pg. 396.
[6] Finkenzeller, Klaus, 2003: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards
     and Identification, Second Edition. John Wiley & Sonspg. 399.
[7] Främling, K., Kärkkäinen, M., Ala-Risku, T., Holmström, J., 2004: Managing Product Information in Sup-
     plier Networks by Object-oriented Programming Concepts, Intern. IMS Forum, Cernobbio, Italy.
[8] http://RFID.nordic.se.
[9] http://transpondernews.com/trendfut.html.
[10] http://www.aimglobal.org/members/news/templates/casestudies.asp?articleid=166&zoneid=25.
[11] http://www.aimglobal.org/members/news/templates/casestudies.asp?articleid=162&zoneid=25.
[12] http://www.aimuk.org/pdfs/RFIDcomp04.pdf.
[13] http://www.homeagainid.com/.
[14] http://www.privacyinternational.org.
[15] http://www.rfidinternational.com.
[16] http://www.rfidjournal.com/article/articleview/1098/1/1/.
[17] http://www.rfidjournal.com/article/articleview/1332/2/129/
[18] http://www.rfidkills.com.
[19] http://www.spychips.com/jointrfid_position_paper.html.
[20] http://www.zombiewire.com.
[21] ISO/IEC JTC1 SC31 WG4 SG3 18000-6 Proposal, 2002: Information Technology AIDC Techniques-
     RFID for Item Management - Air Interface, Part 6 - Parameters for Air Interface Communications at UHF.
[22] Lewis, S., 2004: A basic introduction to RFID technology and its use in the supply chain, Laran RFID,
     White paper.
[23] Rieback M. R., Crispo B., Tanenbaum A. S., 2006: Is Your Cat Infected with a Computer Virus?, 4th An-
     nual IEEE International Conference on Pervasive Computing and Communications, Pisa - Italy,
     http://www.rfidvirus.org/papers/percom.06.pdf.
[24] Shutzberg L., 2004: Radio Frequency Identification (RFID) In the Consumer Goods Supply Chain, Rock-
     Tenn Company, www.packagingdigest.com/newsite/Online/RFID_IWP.pdf.

Más contenido relacionado

La actualidad más candente

IRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving SystemIRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving SystemIRJET Journal
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...Sergey Boldyrev
 
Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cardsMuhammad Ali
 
IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFIDIRJET Journal
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET Journal
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPERDiwakar Jha
 
Novel modilo based aloha anti collision
Novel modilo based aloha anti collisionNovel modilo based aloha anti collision
Novel modilo based aloha anti collisionRaja Ram
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Ferheen Khan
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomyshassant2
 

La actualidad más candente (14)

IRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving SystemIRJET- RFID based Book Shelving System
IRJET- RFID based Book Shelving System
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...
System Architecture for High-speed Close-proximity Low-power RF Memory Tags a...
 
Folheto BCL 500 i
Folheto BCL 500 iFolheto BCL 500 i
Folheto BCL 500 i
 
Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cards
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
IRJET- Library Management using RFID
IRJET-  	  Library Management using RFIDIRJET-  	  Library Management using RFID
IRJET- Library Management using RFID
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
FINAL YEAR PAPER
FINAL YEAR PAPERFINAL YEAR PAPER
FINAL YEAR PAPER
 
Novel modilo based aloha anti collision
Novel modilo based aloha anti collisionNovel modilo based aloha anti collision
Novel modilo based aloha anti collision
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...Localization of rfid equipped assets during the operation phase of facilities...
Localization of rfid equipped assets during the operation phase of facilities...
 
RFID Taxonomy
RFID TaxonomyRFID Taxonomy
RFID Taxonomy
 

Destacado

Linda: Jersey slide show
Linda: Jersey slide show Linda: Jersey slide show
Linda: Jersey slide show catiept
 
Linda: 43 Silverlake Ave. slide show
Linda: 43 Silverlake Ave. slide showLinda: 43 Silverlake Ave. slide show
Linda: 43 Silverlake Ave. slide showcatiept
 
5 tips Organizational Strategic Thinking
5 tips Organizational Strategic Thinking5 tips Organizational Strategic Thinking
5 tips Organizational Strategic Thinkingmarkmullen
 
Continuous Integration with Fabric
Continuous Integration with FabricContinuous Integration with Fabric
Continuous Integration with FabricVarun Batra
 
MAIORES PALESTRANTES DO BRASIL-JULIO CESAR
MAIORES PALESTRANTES DO BRASIL-JULIO CESARMAIORES PALESTRANTES DO BRASIL-JULIO CESAR
MAIORES PALESTRANTES DO BRASIL-JULIO CESARJulio C França Franco
 
MELHORES PALESTRANTES DO BRASIL- JULIO CESAR
MELHORES PALESTRANTES DO BRASIL- JULIO CESARMELHORES PALESTRANTES DO BRASIL- JULIO CESAR
MELHORES PALESTRANTES DO BRASIL- JULIO CESARJulio C França Franco
 
Tips for Struggling Nonprofits
Tips for Struggling NonprofitsTips for Struggling Nonprofits
Tips for Struggling Nonprofitsmarkmullen
 
Linda: Connecticut slide show
Linda: Connecticut slide showLinda: Connecticut slide show
Linda: Connecticut slide showcatiept
 
MAIORES PALESTRANTES DO BRASIL- JULIO CESAR
MAIORES PALESTRANTES DO BRASIL- JULIO CESARMAIORES PALESTRANTES DO BRASIL- JULIO CESAR
MAIORES PALESTRANTES DO BRASIL- JULIO CESARJulio C França Franco
 
MAIORES PALESTRANTES DO BRASIL. JULIO CESAR
MAIORES PALESTRANTES DO BRASIL. JULIO CESARMAIORES PALESTRANTES DO BRASIL. JULIO CESAR
MAIORES PALESTRANTES DO BRASIL. JULIO CESARJulio C França Franco
 

Destacado (15)

High challenge questions
High challenge questionsHigh challenge questions
High challenge questions
 
H.S.I.E
H.S.I.EH.S.I.E
H.S.I.E
 
VTV Art Exhibit
VTV Art ExhibitVTV Art Exhibit
VTV Art Exhibit
 
Linda: Jersey slide show
Linda: Jersey slide show Linda: Jersey slide show
Linda: Jersey slide show
 
Sample1
Sample1Sample1
Sample1
 
Linda: 43 Silverlake Ave. slide show
Linda: 43 Silverlake Ave. slide showLinda: 43 Silverlake Ave. slide show
Linda: 43 Silverlake Ave. slide show
 
5 tips Organizational Strategic Thinking
5 tips Organizational Strategic Thinking5 tips Organizational Strategic Thinking
5 tips Organizational Strategic Thinking
 
High challenge questions
High challenge questionsHigh challenge questions
High challenge questions
 
Continuous Integration with Fabric
Continuous Integration with FabricContinuous Integration with Fabric
Continuous Integration with Fabric
 
MAIORES PALESTRANTES DO BRASIL-JULIO CESAR
MAIORES PALESTRANTES DO BRASIL-JULIO CESARMAIORES PALESTRANTES DO BRASIL-JULIO CESAR
MAIORES PALESTRANTES DO BRASIL-JULIO CESAR
 
MELHORES PALESTRANTES DO BRASIL- JULIO CESAR
MELHORES PALESTRANTES DO BRASIL- JULIO CESARMELHORES PALESTRANTES DO BRASIL- JULIO CESAR
MELHORES PALESTRANTES DO BRASIL- JULIO CESAR
 
Tips for Struggling Nonprofits
Tips for Struggling NonprofitsTips for Struggling Nonprofits
Tips for Struggling Nonprofits
 
Linda: Connecticut slide show
Linda: Connecticut slide showLinda: Connecticut slide show
Linda: Connecticut slide show
 
MAIORES PALESTRANTES DO BRASIL- JULIO CESAR
MAIORES PALESTRANTES DO BRASIL- JULIO CESARMAIORES PALESTRANTES DO BRASIL- JULIO CESAR
MAIORES PALESTRANTES DO BRASIL- JULIO CESAR
 
MAIORES PALESTRANTES DO BRASIL. JULIO CESAR
MAIORES PALESTRANTES DO BRASIL. JULIO CESARMAIORES PALESTRANTES DO BRASIL. JULIO CESAR
MAIORES PALESTRANTES DO BRASIL. JULIO CESAR
 

Similar a Rfid technology and applications pw45

Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Ghouse Modin Mamdapur
 
My best effort
My best effortMy best effort
My best effortsujataray
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET Journal
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working Niranjan
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDSudher Sun
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationHamed M. Sanogo
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industrybizpresenter
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceFilantropi Event Management
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of VehiclesIRJET Journal
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxtoltonkendal
 

Similar a Rfid technology and applications pw45 (20)

Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...Implementing radio frequency identification technology in libraries advantage...
Implementing radio frequency identification technology in libraries advantage...
 
My best effort
My best effortMy best effort
My best effort
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
 
Rfid
RfidRfid
Rfid
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
Major project
Major projectMajor project
Major project
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docx
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Rfid technology and applications pw45

  • 1. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 THE RFID TECHNOLOGY AND ITS CURRENT APPLICATIONS Elisabeth ILIE-ZUDOR1, Zsolt KEMÉNY2, Péter EGRI3, László MONOSTORI4 1-4 Computer and Automation Research Institute, Hungarian Academy of Sciences Kende u. 13–17, 1111, Budapest 4 Department of Production Informatics, Management and Control, BME Hungary {ilie, kemeny, egri, monostor}@sztaki.hu Abstract: The paper gives an overview of the current state of the art in the radio frequency identification (RFID) technology. Aside from a brief introduction to the principles of the technology, a sur- vey is given on major classes of RFID tags and readers, commonly used frequencies and identifier systems, current and envisaged fields of application, as well as advantages, con- cerns and limitations of use. Keywords: RFID principles, advantages, limitations, applications 1. INTRODUCTION Although the foundation of the Radio Frequency Identification (RFID) technology was laid by past generations, only recent advances opened an expanding application range to its practical imple- mentation. RFID is only one of numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch mem- ory, smart cards, biometrics etc. Auto ID technologies are a new way of controlling information and material flow, especially suitable for large production networks. The RFID technology is a means of gathering data about a certain item without the need of touch- ing or seeing the data carrier, through the use of inductive coupling or electromagnetic waves. The data carrier is a microchip attached to an antenna (together called transponder or tag), the latter enabling the chip to transmit information to a reader (or transceiver) within a given range, which can forward the information to a host computer. The middleware (software for reading and writing tags) and the tag can be enhanced by data encryption for security-critical application at an extra cost, and anti-collision algorithms may be implemented for the tags if several of them are to be read simultaneously. One important feature enabling RFID for tracking objects is its capability to provide unique identifi- cation. One possible approach to item identification is the EPC (Electronic Product Code) [4], pro- viding a standardized number in the EPCglobal Network, with an Object Name Service (ONS) pro- viding the adequate Internet addresses to access or update instance-specific data. However, cur- rently, ONS cannot be used in a global environment, and since it is a proprietary service, its use is relatively expensive, especially for participants with limited resources such as SMEs. As an alter- native, researchers from the Helsinki University [7] have proposed the notation ID@URI, where ID stands for an identity code, and URI stands for a corresponding Internet address. This allows sev- eral partners to use the system and still guarantee unique identification. The project ‘Identity-Based Tracking and Web-Services for SMEs’ (http://www.traser-project.eu) is currently working on further development of this concept.
  • 2. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 2. TYPES OF TAGS AND READERS RFID tags and readers can be grouped under a number of categories. Their classification is pre- sented in Table 1. Classification of RFID tags Passive - also called ‘pure passive’, ‘reflective’ or ‘beam powered’ - obtains operating power from the reader - the reader sends electromagnetic waves that induce current in the tag’s antenna, the tag reflects the RF signal transmitted and adds information by modulating the reflected signal Semi-passive - uses a battery to maintain memory in the tag or power the elec- tronics that enable the tag to modulate the reflected signal - communicates in the same method, as the other passive tags Active - powered by an internal battery, used to run the microchip’s cir- cuitry and to broadcast a signal to the reader - generally ensures a longer read range than passive tags - more expensive than passive tags (especial because usually are read/write) - the batteries must be replaced periodically By the tag’s memory type Read-only - the memory is factory programmed, can not be modified after its manufacture - its data is static - a very limited quantity of data can be stored, usually 96 bits of in- formation - can be easily integrated with data collection systems - typically are cheaper than read-write tags Read-write - can be as well read as written into - its data can be dynamically altered - can store a larger amount of data, typically ranging from 32 kBytes to 128 kbBytes - being more expensive than read-only chips, is impractical for tracking inexpensive items By the method of wireless signal used for communication between the tag and reader Induction - Close proximity electromagnetic, or inductive coupling—near field - Generally use. LF and HF frequency bands Propagation - Propagating electromagnetic waves—far field - Operate in the UHF and microwaves frequency bands
  • 3. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 Classification of readers By design and technology used Read - only reads data from the tag - usually a micro-controller-based unit with a wound output coil, peak detector hardware, comparators, and firmware designed to transmit energy to a tag and read information back from it by de- tecting the backscatter modulation - different types for different protocols, frequencies and standards exist Read/write - reads and writes data from/on the tag By fixation of the device Stationary The device is attached in a fixed way, for example at the entrance gate, respectively at the exit gate of products Mobile In this case the reader is a handy, movable device. Table 1: Classification of RFID tags and readers 3. ADVANTAGES AND LIMITATIONS OF THE TECHNOLOGY 3.1. Advantages Though RFID is not likely to entirely replace commonly used barcodes in the near future, the fol- lowing advantages suggest to additionally apply RFID for added value of identification: Tag detection not requiring human intervention reduces employment costs and eliminates hu- man errors from data collection, As no line-of-sight is required, tag placement is less constrained, RFID tags have a longer read range than, e. g., barcodes, Tags can have read/write memory capability, while barcodes do not, An RFID tag can store large amounts of data additionally to a unique identifier, Unique item identification is easier to implement with RFID than with barcodes, Tags are less sensitive to adverse conditions (dust, chemicals, physical damage etc.), Many tags can be read simultaneously, RFID tags can be combined with sensors, Automatic reading at several places reduces time lags and inaccuracies in an inventory, Tags can locally store additional information; such distributed data storage may increase fault tolerance of the entire system, Reduces inventory control and provisioning costs, Reduces warranty claim processing costs. 3.2. Current issues of concern, limitations Although many RFID implementation cases have been reported, the widespread diffusion of the technology and the maximum exploitation of its potential still requires technical, process and secu- rity issues to be solved ahead of time. Today’s limitations of the technology are foreseen to be overcome and specialists are already working on several of these issues. 3.2.1. Standardization Though the characteristics of the application and the environment of use determine the appropriate tag, the sparse standards still leave much freedom in the choice of communication protocols and the format and amount of information stored in the tag. Companies transcending a closed-loop so- lution and wishing to share their application with others may encounter conflicts as cooperating partners need to agree in standards concerning communication protocols, signal modulation types, data transmission rates, data encoding and frames, and collision handling algorithms. Currently, two major groups of standards are competing worldwide: one is EPC created by the Auto-ID Cen- ter and receiving the support of UCC (Uniform Code Council) and EAN (European Article Number- ing), the other is the ISO-specified (International Standards Organization) set of standards.
  • 4. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 3.2.2. Cost The cost of tags depends on their type. In the 2003 report ‘RFID Systems in the Manufacturing Supply Chain’ [16], ARC Advisory Group predicted the following decrease of tag prices: Price in 2003 Estimated price in 2008 Passive UHF tag 57 cents 16 cents Passive HF tag 91 cents 30 cents This predicted decrease is still deemed insufficient, as economic use of tags—taking the associ- ated 5–35% decrease of labor costs and zero tag information generation costs into account as well—would require a maximum of 25 cents per tag for high-end products, and 5 cents for common item-level tagging. Prices of active or semi-passive tags (at least $1 per tag) are even more of a hindrance, allowing their economic application only for scanning high-value goods over long ranges. 3.2.3. Collision Attempting to read several tags at a time may result in signal collision and ultimately to data loss. To prevent this, anti-collision algorithms (most of them are patented or patent pending) can be ap- plied at an extra cost. The development of these methods, aimed at reducing overall read time and maximizing the number of tags simultaneously read, still goes on [3]. 3.2.4. Frequency The optimal choice of frequency depends on several factors, such as: a.) Transmission mode. RFID tags basically use two kinds of data transmission, depending on the behavior of electromagnetic fields at the frequency used. In lower frequencies (such as 125– 134kHz in the LF band or 13.56MHz in the HF band), inductive coupling is used, while in frequency bands above (UHF with typical frequency ranges of 433MHz, 865–956MHz and 2.45GHz), wave backscattering is the main means of transmission. This also affects the safe reading range, as it is easier to build direction-selective devices with a longer read range in higher frequencies. This may restrict design freedom if either reading range or spatial selectivity are an important issue. b.) Behavior of tagged goods and environment. Properties of some materials may be an obstacle to RFID application at a given frequency, as they may corrupt data transmission either by absorp- tion or by ambient reflection of the signals. Typically, conductive materials such as goods contain- ing water, or metal surfaces may be the source of problems. However, absorption and reflection being frequency-dependent, failure at one frequency does not rule out applicability at other fre- quencies. Electromagnetic disturbance can also have external sources, which is also a common— though also frequency-dependent—problem in an industrial environment. c.) International standards in frequency allocation. Due to historic reasons, the world is divided into three large regions of frequency allocation for various purposes, region 1 containing Europe, Af- rica, the Middle East and former SU member states, region 2 with North and South America and the part of the Pacific east of the date line, and region 3 with Asia, Australia and the Pacific west of the date line. The industry exerts pressure towards a uniformization of frequencies allowed for RFID, yet there still are notable differences between the three regions, forcing companies planning to employ tags in several regions to restricting themselves to bands shared by all regions con- cerned. A compromise for tags only modulating the reader signal without actively producing a car- rier wave on their own may be their ability to work in a wider frequency range than nominally speci- fied, allowing their usage even in regions where RFID bands are ‘close enough’. 3.2.5. Faulty manufacture of tags. Manufacturing of tags is not yet 100% failure-free today; about 20–30% of tags used in early RFID pilots have been defective [22].
  • 5. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 Figure 1: Common RFID frequency ranges and allocation in Region 1 3.2.6. Faulty or deficient detection of tags a.) Tags may be damaged during usage. A wide range of application challenges can be answered by the multitude of suitable tags, yet none of them is completely invulnerable and the causes of damage may vary from type to type. The result is a read failure which is, in many cases difficult to detect, as is the fact of the damage itself for a hidden tag. This becomes a business issue when, for example, the payment for goods is calculated by the number of detected tags and no measures are taken to compensate for read failures. b.) Adverse conditions of the environment and improper placement may corrupt reading. As men- tioned before, absorption, ambient reflection of the signal and external signal sources (such as se- curity systems, cordless phones, barcode scanners) may introduce read errors. Similarly, improper orientation of tags may impair reading efficiency as most antennas used in tags are direction- sensitive [22]. c.) Registration of data from tags which pass within range of an RFID reader accidentally. d.) Reader malfunction. This eventuality cannot be predicted or completely avoided, making alter- native fallback measures (such as barcodes) necessary for the case of reader failure. 3.2.7. Quick technology obsolescence One of the common concerns of companies implementing RFID today is the rapid obsolescence of the technology, especially in view of the investment cost. Technology is continuously evolving and new protocol standards, faster and more fault-tolerant readers quickly outdate their predecessors. 3.2.8. Security and Privacy Issues Depending on the field of application—and in some cases, prescribed by law—it may become nec- essary to prevent unauthorised persons from reading or writing data stored on or transmitted from tags. To this end, encryption must be ensured at all interfaces where data could be intercepted or transmitted (on the medium itself, as well as tag–reader and reader–host communication) [22]. Privacy issues concerning the—possibly hidden—use of RFID tags has been identified as one of the problems by many experts and associations, among them the ‘Caspian’ (Consumers Against Supermarket Privacy Invasion and Numbering), since the beginnings of its application (see [19], [14], [20], and [18]). The main concerns are related to unique item-level tagging of merchandise without knowledge or consent of end users, having ‘the potential to jeopardize consumer privacy, reduce or eliminate purchasing anonymity, and threaten civil liberties’ [19], are: a) hidden place- ment of tags and unnoticed reading by third persons, b) unique identifiers for all items worldwide
  • 6. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 could make the link between user and item recordable and retrievable, c) massive data aggrega- tion about items and customers becomes possible, d) tags (especially in the UHF range) can be read from a distance without direct line of sight, e) item-level unique tagging may allow individual tracking and profiling, i.e., linking personal identity with merchandise items without the consent of individuals. 3.2.9. Possible virus attacks Although not widely reported so far, a study of the Vrije Universiteit Amsterdam [23] has shed light on potential vulnerability of current RFID software if used together with a backend database. Simi- larly to previously known attacks against SQL systems (such as the Slammer virus), intentionally effected buffer overflow, false end-of-row characters and camouflaged comments can lead to un- verified data being interpreted as SQL commands which can perform malicious operations on the database contents or prompt the system to copy the infected data to further tags. 4. APPLICATIONS Current and proposed uses of RFID span a wide spectrum of application areas (e.g.: see Figure 2), and a fully comprehensive overview would certainly surpass the limits of this paper. It is, however, easy to see that the nature of a given use of RFID can be put in either one of three groups: 1) item instance or item class identification, 2) location identification, 3) data transfer from or to the RFID tag. 4.1. Instance or class identification If RFID tags are only used for the purpose of item type or instance identification, usually, a data- base is maintained in the background to provide or receive the additional information needed. Augmented with this support, destination or way of handling can be determined for the given item, an already proven concept in a number of logistics solutions (several shipping and postal services, such as UPS, FedEx, USPS and Finland Post [8]). Also, examples in manufacturing demonstrate the benefits of RFID, such as with identifying individual car bodies in customized automotive pro- duction (BMW’s car body identification in their Dingolfing factory [5]), tracking of manufacturing (pre-delivery tracking and location of cars in Volkswagen’s Wolfsberg facility [12]) or even architec- tural construction processes (Skanska Finland applies Enterprixe’s 4D production model solution), automatic retooling of work-cells for the given item, and fail-safe identification of samples for quality control (Schreiner’s LogiData control system applied by Auto5000 GmbH, a supplier of Volks- wagen [15]; RFID-based administration of quality control at Ford’s Essex engine plant in Windsor, Ontario [12]; RFID-based identification of material test samples at the MTR Corporation of Hong Kong which builds and operates urban railways [12]). In the agriculture, farm animals can be identi- fied using RFID tags, and a retrieval service for lost pets also relies on RFID implants as the means of identification (‘Home Again’ pet retrieval service [13]). Also, RFID tags are widely relied on in security systems which grant access to facilities etc. depending on the given user’s level of authorization (even an example from a Chinese party congress is known [12]), while in other cases, even passports are equipped with tags (Department of Homeland Security is already testing RFID-equipped passports at several locations worldwide [15]). Speaking of security, RFID is also commonly used in anti-theft protection and RFID-based house arrest supervision is also contem- plated [9]. Another subclass of identity-related application examples contains the cases where the database in the background is not only queried upon reading a tag but also updated, e.g., to keep track of inventory changes (commonly used in warehouses, but future application is envisaged even for such cases as intelligent refrigerators which keep track of food supplies). In many cases, the short time lags and failure-free ID entries or even the resistance of RFID tags to adverse condi- tions (extreme temperatures, dirt, chemicals etc.) contribute substantially to the success of the ap- plication [5].
  • 7. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 Figure 2: Examples of application areas 4.2. Location identification If a given reader is assigned to a known location, it is possible to track the current place of a given uniquely identifiable item. Numerous logistics companies and some postal services have already integrated such RFID-based features into their tracking services (several shipping and postal ser- vices, such as UPS, FedEx, USPS and Finland Post [8]; automatic vehicle location systems in pub- lic transport control in Vejle, Denmark [10]; location of rolling stock at the Swiss Federal Railways), and similarly, the physical location of work pieces is being kept track of in several manufacturing facilities, too (e.g.: in Dell’s facility in Xiamen, China [12]). The RFID tags to be read for localization can be either attached to containers or items, or they can identify the transporting vehicle itself. Aside from the benefit of providing exact information (as opposed to the risk of incomplete, delayed or corrupted data if entries are made manually), reading RFID tags does not require a long halt in the transportation process, making thus delivery more efficient. Also, farm animals can be effi- ciently localized using RFID tags while a similar tracking principle is applied in some prisons as well. Other location-specific application examples are envisaged using direction-selective readers. These aim to find the exact location of a tag in a wide area, such as golf balls on a golf course [9]. 4.3. Transfer of further data In the third application group, not only an identity is extracted from the tag but also auxiliary data are read or written. Data read from the tag usually contains information which would be difficult im- practical or impossible to obtain from a remote or pre-recorded database, or measurement results. Some products may provide instructions for proper handling this way (envisaged are cases where tags in food packaging would instruct an oven about the optimal cooking time [2], or tags in cloth- ing would select the right program for a washing machine [17]), while in a number of already im- plemented uses, tags provide medical measurement data e.g., about eye-ball pressure (sensor and transmitter integrated into artificial lens implant [6]). Writing data to a tag usually adds informa- tion about the processing of the given item (or delivery progress in transportation), and in a few cases, a new identity is assigned to the tag by rewriting (such as for reusable containers, pallets etc., as in a pilot project at the Finnish Post [8]). An interesting application is envisaged for washing machines where read-write tags in clothes also record how many times the given piece has been washed and select the proper washing program to adapt to aging of the fabric [17].
  • 8. In proceedings of The Modern Information Technology in the Innovation Processes of the Industrial Enterprises-MITIP 2006, ISBN 963 86586 5 7, pp.29-36 5. CONCLUSION The paper gave an overview of the current state and trends of RFID technology. Even though nu- merous limitations and unresolved issues still hinder the widespread application of RFID, it can be already seen that especially enterprises in complex supply chains will benefit from RFID, once the application difficulties are overcome. Acknowledgements The work was supported by the EU FP6 program (project no. 033512), NKFP Grant No.2/010/2004 and the OTKA Grants No. T043547 and T049481. 6. REFERENCES [1] Albano, S.: Auto-ID Field Test, Lessons Learned in the Real World, http://islab.oregonstate.edu/koc/ece399/notes/rfid-field-test.pdf. [2] Almirall, E., Brito, I., Silisque, A., Cortés, U., 2003: From Supply Chains to Demand Networks, pg. 13. [3] Burdet, L. A., 2004: Smart Environments, Seminar, Zürich. [4] EPC Global, http://www.epcglobalinc.org/index.html. [5] Finkenzeller, Klaus, 2003: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition. John Wiley & Sons, pg. 396. [6] Finkenzeller, Klaus, 2003: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition. John Wiley & Sonspg. 399. [7] Främling, K., Kärkkäinen, M., Ala-Risku, T., Holmström, J., 2004: Managing Product Information in Sup- plier Networks by Object-oriented Programming Concepts, Intern. IMS Forum, Cernobbio, Italy. [8] http://RFID.nordic.se. [9] http://transpondernews.com/trendfut.html. [10] http://www.aimglobal.org/members/news/templates/casestudies.asp?articleid=166&zoneid=25. [11] http://www.aimglobal.org/members/news/templates/casestudies.asp?articleid=162&zoneid=25. [12] http://www.aimuk.org/pdfs/RFIDcomp04.pdf. [13] http://www.homeagainid.com/. [14] http://www.privacyinternational.org. [15] http://www.rfidinternational.com. [16] http://www.rfidjournal.com/article/articleview/1098/1/1/. [17] http://www.rfidjournal.com/article/articleview/1332/2/129/ [18] http://www.rfidkills.com. [19] http://www.spychips.com/jointrfid_position_paper.html. [20] http://www.zombiewire.com. [21] ISO/IEC JTC1 SC31 WG4 SG3 18000-6 Proposal, 2002: Information Technology AIDC Techniques- RFID for Item Management - Air Interface, Part 6 - Parameters for Air Interface Communications at UHF. [22] Lewis, S., 2004: A basic introduction to RFID technology and its use in the supply chain, Laran RFID, White paper. [23] Rieback M. R., Crispo B., Tanenbaum A. S., 2006: Is Your Cat Infected with a Computer Virus?, 4th An- nual IEEE International Conference on Pervasive Computing and Communications, Pisa - Italy, http://www.rfidvirus.org/papers/percom.06.pdf. [24] Shutzberg L., 2004: Radio Frequency Identification (RFID) In the Consumer Goods Supply Chain, Rock- Tenn Company, www.packagingdigest.com/newsite/Online/RFID_IWP.pdf.