SlideShare a Scribd company logo
1 of 15
Internet of Things - 
Enabling Technologies 
RFID 
-By 
Swetha Kogatam 
SJSU ID : 009439339
RFID technology and its applications 
in Internet of Things (IoT) 
Authors : 
-Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; 
-School of Computer Science and Technology, Southwest University of 
Science and Technology, Mianyang, China; 
-School of Information Science and Technology, Southwest Jiaotong 
University, Chengdu, China 
Published in: Consumer Electronics, Communications 
and Networks (CECNet), 2012 2nd International Conference 
Date of Conference : 21-23 April 2012 
Conference Location : Yichang 
Publisher: IEEE
What is RFID ? 
Radio frequency identification system (RFID) is an 
automatic technology and aids machines or 
computers to identity objects, record metadata or 
control individual target through radio waves. 
The RFID technology was first appeared in 1945, as 
an espionage tool for the Soviet Union. 
Main Advantage: 
Is the automated identification and data capture 
that promises wholesale changes across a broad 
spectrum of business activities and aims to reduce 
the cost of the already used systems such as bar 
codes. 3
RFID consists of 
1. Tags (transmitters/ responders) : The tag is a microchip 
connected with an antenna, which can be attached to an 
object as the identifier of the object. 
2. Readers (transmitters 
/ receivers) : The RFID 
reader communicates 
with the RFID tag using 
radio waves.
RFID & IOT 
When the RFID readers abided by appropriate 
communication protocols are connected to the terminal 
of Internet, the readers distributed throughout the world 
can identify, track and monitor the objects attached with 
tags globally, automatically, and in real time, if needed. 
This is the so-called Internet of Things (IOT). 
IOT first became popular through the Auto-ID Center and 
related market analysts publications and RFID is often 
seen as a prerequisite for the IOT.
IOT ARCHITECTURE 
The IOT system architecture is 
generally divided into three 
layers: 
1. the perception layer, 
2. the network layer, 
3. the service layer (or 
application layer)
1. Perception layer is the information origin and the core layer of 
IOT. All kinds of information of the physical world used in IOT are 
perceived and collected in this layer 
Ex : wireless sensors network (WSN), tags and reader-writers etc. 
2. Network layer also called as transport layer, includes access 
network and core network, provides transparent data 
transmission capability. 
The information from perception layer can be sent to the 
upper layer using existing mobile communication network. 
3. Service layer also called application layer, includes data 
management sub-layer and application service sub-layer. 
 The data management sub-layer provides processing complex 
data and uncertain information
RFID System 
RFID systems are composed of three main components: 
1. RFID tags 
2. RFID reader 
3. Application 
system 
RFID tags have the following essential components in 
common: 
antenna, integrated circuit, printed circuit board 
8
RFID Tag 
Also known as transponders (transmitter/responder), are 
attached to the objects to count or identify. 
Tags could be either active or passive. 
The main responsibility of antenna of RFID tag is to transmit 
and receive radio waves for the purpose of communication. 
The antenna is also known as the coupling mechanism, which 
can transform the energy in the form of electromagnetic 
radiation. This is the way the tag and reader communicating 
each other. 
The integrated circuit (IC) is a packaged collection of discrete 
components that provide the brains for the tag and transmit 
the tag’s unique identifier (ID). 
The printed circuit board (PCB) is the material that holds the 
tag together. The circuit board may be rigid or flexible, and is 
composed of many different types of materials, depending on 
the type and purpose of the tag. 9
Tags are built to comply with a categorization called a class. 
EPCglobal has defined six classifications for RFID tags (0 to 5) 
Class 0/class 1: These classes provide the basic radio 
frequency (RF) passive capability. Class 0 is factory-programmed. 
Beyond class 0, including class 1, the tags are 
user-programmable. 
Class 2: Additional functionality is added, which includes 
encryption and read-write RF memory 
Class 3: Batteries are found on board that will power logic in 
the computer circuit. Class 3 provides longer range and 
broadband communications 
Class 4: Active tags are part of the definition of class 4 tags. 
Peer-to-peer communications and additional sensing arc also 
included. 
Class 5: Class 5 tags contain enough power to activate other 
tags and could be effectively classified as a reader
RFID Reader 
The reader is responsible for orchestrating the 
communication with any tags in its read range and then 
presenting the tags’ data to an application that can make 
use of the data. 
Main functions are to 
 activate the tags, 
 structure the communication sequence with the tag and 
 transfer data between the application software and tags 
Readers in all systems can be reduced to two 
fundamental functional blocks: 
1. Control system and 
2. High frequency (HF) interface 
11
HF interface performs the following functions : 
1.Generation of high frequency transmission power to activate 
the transponder and supply it with power; 
2.Modulation of the transmission signal to send data to the 
transponder; 
3.Reception and demodulation of HF signals transmitted by a 
transponder.
Control unit performs the following functions: 
1.Communication with the application software and the 
execution of commands from the application software; 
2.Signal coding and decoding. In more complex systems the 
following additional functions are available 
3.Execution of an anti-collision algorithm; 
4.Encryption and decryption of the data to be transferred 
between transponder and reader; 
5.Performance of authentication between transponder and 
reader. 
6.Control of the communication with a transponder 
Application system: 
Also called data processing system, can be an application 
or database, depending on the application 
Application software initiates all readers and tags 
activities 
13
Evolution of IOT 
The evolution of IOT is coinciding with that of RFID and sensor 
technologies. RFID technology is a very important and 
fundamental groundwork for IOT. 
14
CHALLENGES & CONCLUSION 
Collision Problems 
Security and Privacy Concerns 
Other Challenges 
Cost , Design & Integration into existing systems 
CONCLUSION 
• The IOT uses a variety of information sensing identification 
device and information processing equipment, such as RFID, 
WSN, GPRS, etc. combining with the Internet to form an 
extensive network in order to informationize and intelligentize 
the entities or objects. 
• This paper analyzes the applications and challenges of RFID 
technology, which is the important and foundational 
component of IOT. 
15

More Related Content

What's hot

An IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAn IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAI Publications
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applicationsNaveen Kumar
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart citysanalkumar k
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)rjain51
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 

What's hot (20)

An IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAn IOT based Smart Traffic Management System
An IOT based Smart Traffic Management System
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Introduction to IoT Architecture
Introduction to IoT ArchitectureIntroduction to IoT Architecture
Introduction to IoT Architecture
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
6lowpan
6lowpan6lowpan
6lowpan
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 

Viewers also liked

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...CPqD
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Kelly Stark
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ankur Pipara
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
Xirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysXirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysMarketing Team
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspkshc01
 

Viewers also liked (18)

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Intro to IoT-23Sep2015
Intro to IoT-23Sep2015Intro to IoT-23Sep2015
Intro to IoT-23Sep2015
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Xirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysXirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSys
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Residential Solar PV Design
Residential Solar PV DesignResidential Solar PV Design
Residential Solar PV Design
 

Similar to Internet of Things and its Enabling Technologies - RFID

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsmramesh chatty
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 

Similar to Internet of Things and its Enabling Technologies - RFID (20)

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Rfid3
Rfid3Rfid3
Rfid3
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Internet of Things and its Enabling Technologies - RFID

  • 1. Internet of Things - Enabling Technologies RFID -By Swetha Kogatam SJSU ID : 009439339
  • 2. RFID technology and its applications in Internet of Things (IoT) Authors : -Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; -School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China; -School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China Published in: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference Date of Conference : 21-23 April 2012 Conference Location : Yichang Publisher: IEEE
  • 3. What is RFID ? Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identity objects, record metadata or control individual target through radio waves. The RFID technology was first appeared in 1945, as an espionage tool for the Soviet Union. Main Advantage: Is the automated identification and data capture that promises wholesale changes across a broad spectrum of business activities and aims to reduce the cost of the already used systems such as bar codes. 3
  • 4. RFID consists of 1. Tags (transmitters/ responders) : The tag is a microchip connected with an antenna, which can be attached to an object as the identifier of the object. 2. Readers (transmitters / receivers) : The RFID reader communicates with the RFID tag using radio waves.
  • 5. RFID & IOT When the RFID readers abided by appropriate communication protocols are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). IOT first became popular through the Auto-ID Center and related market analysts publications and RFID is often seen as a prerequisite for the IOT.
  • 6. IOT ARCHITECTURE The IOT system architecture is generally divided into three layers: 1. the perception layer, 2. the network layer, 3. the service layer (or application layer)
  • 7. 1. Perception layer is the information origin and the core layer of IOT. All kinds of information of the physical world used in IOT are perceived and collected in this layer Ex : wireless sensors network (WSN), tags and reader-writers etc. 2. Network layer also called as transport layer, includes access network and core network, provides transparent data transmission capability. The information from perception layer can be sent to the upper layer using existing mobile communication network. 3. Service layer also called application layer, includes data management sub-layer and application service sub-layer.  The data management sub-layer provides processing complex data and uncertain information
  • 8. RFID System RFID systems are composed of three main components: 1. RFID tags 2. RFID reader 3. Application system RFID tags have the following essential components in common: antenna, integrated circuit, printed circuit board 8
  • 9. RFID Tag Also known as transponders (transmitter/responder), are attached to the objects to count or identify. Tags could be either active or passive. The main responsibility of antenna of RFID tag is to transmit and receive radio waves for the purpose of communication. The antenna is also known as the coupling mechanism, which can transform the energy in the form of electromagnetic radiation. This is the way the tag and reader communicating each other. The integrated circuit (IC) is a packaged collection of discrete components that provide the brains for the tag and transmit the tag’s unique identifier (ID). The printed circuit board (PCB) is the material that holds the tag together. The circuit board may be rigid or flexible, and is composed of many different types of materials, depending on the type and purpose of the tag. 9
  • 10. Tags are built to comply with a categorization called a class. EPCglobal has defined six classifications for RFID tags (0 to 5) Class 0/class 1: These classes provide the basic radio frequency (RF) passive capability. Class 0 is factory-programmed. Beyond class 0, including class 1, the tags are user-programmable. Class 2: Additional functionality is added, which includes encryption and read-write RF memory Class 3: Batteries are found on board that will power logic in the computer circuit. Class 3 provides longer range and broadband communications Class 4: Active tags are part of the definition of class 4 tags. Peer-to-peer communications and additional sensing arc also included. Class 5: Class 5 tags contain enough power to activate other tags and could be effectively classified as a reader
  • 11. RFID Reader The reader is responsible for orchestrating the communication with any tags in its read range and then presenting the tags’ data to an application that can make use of the data. Main functions are to  activate the tags,  structure the communication sequence with the tag and  transfer data between the application software and tags Readers in all systems can be reduced to two fundamental functional blocks: 1. Control system and 2. High frequency (HF) interface 11
  • 12. HF interface performs the following functions : 1.Generation of high frequency transmission power to activate the transponder and supply it with power; 2.Modulation of the transmission signal to send data to the transponder; 3.Reception and demodulation of HF signals transmitted by a transponder.
  • 13. Control unit performs the following functions: 1.Communication with the application software and the execution of commands from the application software; 2.Signal coding and decoding. In more complex systems the following additional functions are available 3.Execution of an anti-collision algorithm; 4.Encryption and decryption of the data to be transferred between transponder and reader; 5.Performance of authentication between transponder and reader. 6.Control of the communication with a transponder Application system: Also called data processing system, can be an application or database, depending on the application Application software initiates all readers and tags activities 13
  • 14. Evolution of IOT The evolution of IOT is coinciding with that of RFID and sensor technologies. RFID technology is a very important and fundamental groundwork for IOT. 14
  • 15. CHALLENGES & CONCLUSION Collision Problems Security and Privacy Concerns Other Challenges Cost , Design & Integration into existing systems CONCLUSION • The IOT uses a variety of information sensing identification device and information processing equipment, such as RFID, WSN, GPRS, etc. combining with the Internet to form an extensive network in order to informationize and intelligentize the entities or objects. • This paper analyzes the applications and challenges of RFID technology, which is the important and foundational component of IOT. 15