Rfid Technology and Its Applications in Internet of Things (Iot)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/254032690

RFID technology and its applications in Internet of Things (IoT)

Article · April 2012


DOI: 10.1109/CECNet.2012.6201508

CITATIONS READS

250 43,156

4 authors, including:

Xiaolin Jia
Southwest University of Science and Technology
9 PUBLICATIONS   451 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Doctor View project

All content following this page was uploaded by Xiaolin Jia on 25 July 2018.

The user has requested enhancement of the downloaded file.


RFID Technology and Its Applications in Internet of
Things (IOT)
Xiaolin Jia1,2, Quanyuan Feng2, Taihua Fan1, Quanshui Lei1
1
School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China
2
School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China

Abstract—Radio frequency identification system (RFID) is an IOT first became popular through the Auto-ID Center and
automatic technology and aids machines or computers to identify related market analysts publications. RFID is often seen as a
objects, record metadata or control individual target through prerequisite for the IOT. If all objects of daily life were
radio waves. Connecting RFID reader to the terminal of Internet, equipped with radio tags, they could be identified and
the readers can identify, track and monitor the objects attached inventoried by computers. This paper introduces the primary
with tags globally, automatically, and in real time, if needed. This concepts and technologies of RFID and IOT, discusses the
is the so-called Internet of Things (IOT). RFID is often seen as a applications and challenges of RFID technology used in IOT.
prerequisite for the IOT. This paper introduces the technologies
of RFID and IOT, discusses the applications and challenges of
RFID technology used in IOT. II. IOT AND RFID TECHNOLOGY

Keywords-RFID technology; application; Internet of Things A. Internet of Things


Internet of Things (IOT) is a global network infrastructure,
I. INTRODUCTION linking physical and virtual objects through the exploitation of
Radio frequency identification system (RFID) is an data capture and communication capabilities. It will offer
automatic technology and aids machines or computers to specific object identification, sensor and connection capability
identify objects, record metadata or control individual target as the basis for the development of independent cooperative
services and applications. These will be characterized by a high
through radio waves [1]. The RFID technology was first
degree of autonomous data capture, event transfer, network
appeared in 1945, as an espionage tool for the Soviet Union,
connectivity and interoperability.
which retransmitted incident radio waves with audio
information. Similarly, the IFF (Identification Friend or Foe) The IOT system architecture is generally divided into three
transponder developed in the United Kingdom was routinely layers: the perception layer, the network layer, and the service
used by the allies in World War II to identify aircraft as friend layer (or application layer), as shown in Fig.1.
or foe.
Perception layer: It is the information origin and the core
A typically RFID system is consisted of tags (transmitters/ layer of IOT. All kinds of information of the physical world
responders) and readers (transmitters/receivers) [2]. The tag is used in IOT are perceived and collected in this layer, by the
a microchip connected with an antenna, which can be attached technologies of sensors, wireless sensors network (WSN), tags
to an object as the identifier of the object. The RFID reader
communicates with the RFID tag using radio waves. The main
advantage of RFID technology is the automated identification 6HUYLFH
/RJLVWLFV6XSSO\ 'LVDVWHU:DUQLQJ $JULFXOWXUH0DQDJHPHQW (QYLURQPHQW0RQLWRU 0LOLWDU\0HGLFLQH
and data capture that promises wholesale changes across a
broad spectrum of business activities and aims to reduce the $SSOLFDWLRQ

cost of the already used systems such as bar codes. Although 8ELTXLWRXV1HWZRUN
'LUHFWRU\6HUYLFHV
RFID technology was discovered many years ago, it has 006HUYLFHV
'RFXPHQWDWLRQ
'DWD0DQDJHPHQW
advanced and evolved only during the last decade since cost )DFLOLW\&RQWURO
*HRPDWLFV
4R66HUYLFHV
has been the main limitation in all implementations. ,QWHUQHW1*1HWF
&RUH1HWZRUN
As predicted in [3], RFID is one of the big opportunities in 1HWZRUN *60
*356
3ULYDWH1HWZRUN :/$1:61
(WKHUQHW
$FFHVV*DWHZD\
:L0D[ :3$1
information technology, which will change the world broadly * ,6'13671
$FFHVV1HWZRUN
and deeply. When the RFID readers abided by appropriate 6DWHOOLWH1HWZRUN
communication protocols are connected to the terminal of 'HYLFH*DWHZD\ 007HUPLQDO*DWHZD\ 'DWD&ROOHFWLRQ
:61*DWHZD\
Internet, the readers distributed throughout the world can 5),'0RELOH
5HDGHU
5),'
5HDGHU 6HQVRU1RGH
identify, track and monitor the objects attached with tags
:6161
globally, automatically, and in real time, if needed. This is the 3HUFHSWLRQ :L)L
5),'
so-called Internet of Things (IOT). %OXHWRRWK
HWF
2SWLFDOILEHU &DUG5HDGHU &DPHUD 7UDQVGXFHU 6PDUW6HQVRU 2WKHU)DFLOLW\
The IOT refers to uniquely identifiable objects (things) and
their virtual representations in an Internet-like structure. The Fig.1 The system architecture of Internet of Things (IOT)

978-1-4577-1415-3/12/$26.00 ©2012 IEEE


1282
and reader-writers, RFID system, camera, global position Application system: also called data processing system,
system (GPS), intelligent terminals, electronic data interface which can be an application or database, depending on the
(EDI), objects, and so like. application. The application software initiates all readers and
tags activities. RFID provides a quick, flexible, and reliable
Network layer: This layer, also called transport layer, way for electronically detecting, tracking and controlling a
including access network and core network, provides variety of items. RFID systems use radio transmissions to send
transparent data transmission capability. By the existing mobile energy to a RFID tag while the tag emits a unique
communication network, radio access network, wireless sensor identification code back to a data collection reader linked to an
network (WSN) and other communications equipment, such as
information management system. The data collected from the
global system for mobile communications (GSM), general tag can then be sent either directly to a host computer, or stored
packet radio service (GPRS), worldwide interoperability for in a portable reader and up-loaded later to the host computer.
microwave access (WiMax), wireless fidelity (WiFi), Ethernet,
etc., the information form perception layer can be sent to the
upper layer. At the same time, this layer provides an efficient, C. RFID Tags
reliable, trusted network infrastructure platform to upper layer RFID tags come in many different shapes, sizes, and
and large scale industry application [4]. capabilities. When an RFID solution is designed, the solution’s
architect must take into account both business and technology
Service layer: This layer, also called application layer, requirements before choosing the type of RFID tag to use [6].
includes data management sub-layer and application service All RFID tags have the following essential components in
sub-layer. The data management sub-layer provides processing common: antenna, integrated circuit, printed circuit board (or
complex data and uncertain information, such as restructuring, substrate).
cleaning and combining, and provides directory service, market
to market (M2M) service, Quality of Service (QoS), facility The main responsibility of antenna of RFID tag is to
management, geomatics, etc. by service oriented architecture transmit and receive radio waves for the purpose of
(SOA), cloud computing technologies, and so on. The communication. The antenna is also known as the coupling
application service sub-layer transforms information to content mechanism, which can transform the energy in the form of
and provides good user interface for upper level enterprise electromagnetic radiation. This is the way the tag and reader
application and end users, such as logistics and supply, disaster communicating each other. In a suitable environment and
warning, environmental monitoring, agricultural management, proximity to an RFID reader, the antenna can collect enough
production management, and so forth. energy to power the tag’s other components without a battery.
The integrated circuit (IC) is a packaged collection of
B. RFID System discrete components that provide the brains for the tag. The IC
RFID systems are composed of three main components: in a RFID tag is much like a microprocessor found in any
RFID tags, reader, application system [2][5], as shown in Fig.2. cellular phone or computer, but it is usually not very
sophisticated. For many RFID tags, the IC component has only
Master Slave
Command Command a single purpose, to transmit the tag’s unique identifier (ID). If
the tag has any peripheral components, the IC is also the master
Application Reader Tag controller that is responsible for gathering any extra
Response Response information and transmitting it along with the tag’s ID.
Master Slave
The printed circuit board (PCB) is the material that holds
Data flow the tag together. The circuit board may be rigid or flexible, and
is composed of many different types of materials, depending on
Fig.2 The components of a RFID system the type and purpose of the tag. For example, tags that are used
for tracking components on an assembly line where extremely
RFID tags: also known as transponders (transmitter/ high temperatures may be encountered would tend to be much
responder), are attached to the objects to count or identify. more rigid and are usually placed inside a protective enclosure.
Tags could be either active or passive. Active tags are those
that have partly or fully battery powered, have the capability to Tags are built to comply with a categorization called a class.
communicate with other tags, and can initiate a dialogue of Classes progressively have greater capability. EPCglobal has
their own with the tag reader. Passive tags, on the other hand, defined six classifications for RFID tags (0 to 5). A general
do not need any internal power source but are powered up by description of functionality that each class is required to
the tag reader. Tags consist mainly of a coiled antenna and a comply is as follows.
microchip, with the main purpose of storing data. ¾ Class 0/class 1: These classes provide the basic radio
Reader: also known as transceiver (transmitter/receiver) frequency (RF) passive capability. Class 0 is factory-
made up of a radio frequency interface (RFI) module and programmed. Beyond class 0, including class 1, the
control unit. Its main functions are to activate the tags, tags are user-programmable.
structure the communication sequence with the tag, and ¾ Class 2: Additional functionality is added, which
transfer data between the application software and tags. includes encryption and read-write RF memory

1283
¾ Class 3: Batteries are found on board that will power The control unit is usually based upon a microprocessor to
logic in the computer circuit. Class 3 provides longer perform these complex functions. Cryptological procedures,
range and broadband communications such as stream ciphering between transponder and reader, and
also signal coding, are often performed in an additional ASIC
¾ Class 4: Active tags are part of the definition of class (application specific integrated circuit) module to relieve the
4 tags. Peer-to-peer communications and additional processor of calculation intensive processes.
sensing are also included.
¾ Class 5: Class 5 tags contain enough power to activate III. APPLICATIONS OF RFID TECHNOLOGY
other tags and could be effectively classified as a
reader. The functions of RFID system generally include three
aspects: monitoring, tracking, and supervising. Monitoring
Passive tags, which have no built-in power source and the generally means to be aware of the state of a system, by
power is provided by the radio frequency wave created by the repeated observing the particular conditions, especially to
reader, are usually classified in the class 0 to 3 range. Class 4 detect them and give warning of change. Tracking is the
describes active tags, which have an internal power source (a observing of persons or objects on the move and supplying a
battery), that provides the necessary power for the operation of timely ordered sequence of respective location data to a model.
the tag over a period of time. Class 5 is reserved for tag readers Supervising is the monitoring of the behaviors, activities, or
and active tags that can read data from other tags. other changing information, usually of people. It is sometimes
done in a secret or inconspicuous manner.
D. RFID Reader
The RFID applications are numerous and far reaching. The
RFID readers are also referred to as interrogators because most interesting and successful applications include those for
they query tags as the tags enter their read range. The reader is supply chain management, production process control, and
responsible for orchestrating the communication with any tags objects tracking management. Now RFID has been gradually
in its read range and then presenting the tags’ data to an and broadly used in the following fields.
application that can make use of the data.
¾ Logistics and Supply
Readers in all systems can be reduced to two fundamental
functional blocks: the control system and the high frequency ¾ Manufacturing
(HF) interface, consisting of a transmitter and receiver, as ¾ Agriculture Management
shown in Fig.3. The entire system is controlled by an external
¾ Health Care and Medicine
¾ Marine Terminal Operation
¾ Military and Defense
¾ Payment Transactions
¾ Environment Monitor and Disaster Warning
¾ Transportation and Retailing
¾ Warehousing and Distribution Systems
Fig.3 RFID reader consisting of control system and HF interface [2] ¾ Other applications in many walks of life businesses
For instance, in Manufacturing, RFID technology offers a
application via control commands. number of applications in the automotive industry. A RFID-
The reader’s HF interface performs the following functions: based antitheft vehicle immobilizer is a protective device
(a) generation of high frequency transmission power to activate installed in many cars. RFID also holds great promise for the
the transponder and supply it with power; (b) modulation of the assembly and manufacturing processes of automobiles, in
transmission signal to send data to the transponder; (c) particular, for flexible and agile production planning, spare
reception and demodulation of HF signals transmitted by a parts, and inventory management. RFID technology not only
transponder. helps to automate the whole assembly process in which a
significant reduction in cost and shrinkage can be achieved, but
The reader’s control unit performs the following functions: it also offers improved services to automobile users that
(a) communication with the application software and the include more efficient replacement part ordering and
execution of commands from the application software; (b) automated generation of maintenance reminders. The benefits
control of the communication with a transponder (master–slave that RFID offers to the automotive industry, both to the
principle, as shown in Fig.2); (c) signal coding and decoding. production process as well as to end users, are visibility,
In more complex systems the following additional functions traceability, flexibility, and added security.
are available: (d) execution of an anti-collision algorithm; (e)
encryption and decryption of the data to be transferred between As illustrated in Fig.4, the evolution of IOT is coinciding
transponder and reader; (f) performance of authentication with that of RFID and sensor technologies. Form supply-chain
between transponder and reader. helper to vertical-market applications to ubiquitous positioning,

1284
Technology Reach Software agents and
Many researcher and scientist work to implement low cost
advanced sensor fusion security and privacy protocol to increase the applicability. Lots
Miniaturization, power-
efficient electronics, and
Teleoperation and of lightweight solutions have been proposed for RFID, but they
telepresence: Ability
available spectrum
to monitor and control are still expensive and vulnerable to the security and do not
distant objects
fully resolve the security issues. So there is a good research
Ability of devices located Physical-World Web
indoors to receive
Locating people and
scope in the field of designing an efficient ultra-lightweight
geolocation signals
everyday objects cryptographic protocol for low-cost RFID system.
Cost reduction leading to Ubiquitous Positioning
diffusion into 2nd
wave of applications Surveillance, security,
healthcare, transport, food C. Other Challenges
safety, document management
Demand for
expedited logistics Vertical-Market Applications Three other issues also are mainly holding back RFID’s
RFID tags for facilitation widespread adoption. The first one is the cost. The RFID tags
routing inventorying,
and loss prevention Supply-Chain Helpers are still more expensive than printed labels. The second issue is
design. It is still needed to engineer tags and readers so that
2000 2010 2020 time
Source: SRI Consulting Business Intelligence they guarantee highly reliable identification. Another challenge
to RFID is its integration into existing systems. It is significant
Fig.4 Technology roadmap of Internet of Things (IOT) to develop effective RFID middleware which used to link new
RFID systems into existing back-end infrastructures.
and so on, the RFID technology is a very important and
fundamental groundwork for IOT. Despite these challenges, it’s only a matter of time before
these issues could be solved. RFID’s potential benefits are
IV. CHALLENGES OF RFID TECHNOLOGY large, and many novel applications will be see in the future,
even some of which can not begin to imagine.
Although promising, RFID is not without its challenges,
which arise from both a technological and usage point of view.
V. CONCLUSION
A. Collision Problems The IOT uses a variety of information sensing identification
device and information processing equipment, such as RFID,
Communication between tags and readers are inherently WSN, GPRS, etc. combining with the Internet to form an
susceptible to electromagnetic interference. Simultaneous extensive network in order to informationize and intelligentize
transmissions in RFID lead to collisions as readers and tags the entities or objects. This paper analyzes the applications and
typically operate on a same wireless channel. Therefore, challenges of RFID technology, which is the important and
efficient anti-collision protocols for identifying multi-tags foundational component of IOT.
simultaneously are of great importance for the development of
large-scale RFID applications [1]. ACKNOWLEDGMENT
Many anti-collision protocols for RFID tag identification
This work is supported by the National Natural Science
have been proposed, such as query tree protocol (QT), binary Foundation of China under Grant 60990320 and 60990323;
tree protocol (BT), frame slotted ALOHA protocol (FSA), etc., 10876029, and the National 863 Propjet of China under Grant
but almost all known protocols exhibit an overall 2009AA01Z230; and the Southwest University of Science and
identification efficiency small than 50%. Besides, uniform IDs Technology (SWUST) funded project of China under Grant
distribution has always been assumed in the past. Furthermore, 11XNZD83.
it is very useful for pointing out the best performing features
of RFID tag identification protocols, and for designing new REFERENCES
and better protocols. In [1], we present a novel and efficient
[1] X.L. Jia, Q.Y. Feng, C.Z. Ma, “An efficient anti-collision protocol for
anti-collision protocol for RFID tag identification, i.e., RFID tag identification,” IEEE Communications Letters, vol.14, no.11,
collision tree protocol (CT), which outperforms all the other pp.1014-1016, 2010.
anti-collision protocols proposed so far. [2] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in
Contactless Smart Cards, Radio Frequency Identification and Near-Field
B. Security and Privacy Concerns Communication, New York: Wiley, 2010.
Security and privacy issues [7] of RFID tags can effect both [3] D.Culler, “10 Emerging Technologies That Will Change the World,”
organizations and individuals. Unprotected tags may be Technology Review, pp.33-49, Feb., 2003.
vulnerable to eavesdropping, traffic analysis, spoofing or denial [4] Y.X.Lu, T.B.Chen, Y.Meng, “Evalution guideling system and intelligent
of service and many more. Even unauthorized readers can evaluation process on the Internet of Things,” American Journal of
Engineering and Technology Research, vol.11, no.9, pp.537-541, 2011.
affect the privacy by accessing tags without enough access
[5] O.Bang, J.H.Choi, D.Lee and H.Lee, “Efficient Novel Anti-collision
control. Even if the tag content is secure then also it can be Protocols for Passive RFID Tags,” Auto-ID Labs White Paper WP-
tracked by the predictable tag responses; “location privacy” can HARDWARE-050, MIT, Mar.2009.
be affected by a traffic analysis attack. Attacker can also [6] J.Banks, M.Pachano, L.Thompson and D.hanny, RFID Applied, New
threaten the security of systems, which depends on RFID York: John Wiley & Sons, Inc., 2007.
technology through the denial of service attack. [7] R.K.Pateriya, S.Sharma, “The Evolution of RFID Security and Privacy:
A Research Survey,” 2011 International Conference on Communication
Due to its cost and resource constraint limitations, RFID Systems and Network Technologies (CSNT), pp.115-119, June 2011.
system does not have a sufficient security and privacy support.

1285
View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy