Chapter 2
Chapter 2
Chapter 2
1 RFID Technology:
2.1.1 Introduction:
RFID uses radio waves to wirelessly transmit the identity (a unique serial number)
and other information of an object that a RFID tag is affiliated. RFID has
substantially increased productivity and efficiency of its associated business [5].
As intelligent RFID technology continues to develop, in conjunction with
intelligent sensor technologies, RFID has been becoming one of the core
technologies of Internet of Thing (IoT) [6].
Research and developments of RFID has been rapid, however, challenges remain,
particularly in the development of standards, security compliance and privacy
concerns [7]. The implementation of RFID requires diligent assessment of the
need for RFID solutions in particular organizations. Therefore, it is important to
explore and review this technology in order to maximize its potential benefits and
reduce the risk of its implementation later on. Due to the complexity of most
indoor environments, Smartphones as RFID readers have been implemented for
both the iPhone and Android phones [8].
RFID was invented during the World War II and was first used by Britain to
identify and track aircraft using radar. It was during the 1960s that RFID was first
considered for the commercial world, RFID products started to be available in
1980s and its wide spread usage was only in recent years. Earlier RFID
applications were mainly applied to identifying assets in a single location. In
1998, researchers at the Massachusetts Institute of Technology (MIT) Auto-ID
Center began to investigate new ways to track and identify objects while they
were moving between different locations, which is generally considered as the
third era of RFID [6]. Since 2000, RFID has experienced a rapid evolution and
broad implementation throughout the economy. It has become a worldwide and
rapid-evolving technology, which has been combined with other emerging
technologies worldwide. Today, there are a variety of technical solutions, some
being simple and common, while others are complex and expensive but offer
better functionality and performance.
|Page1
2.1.3 RFID Architecture:
A typical RFID system is composed of one or more tags, one or more readers and
a server/host computer.
RFID tags can be classified into three types: passive, active and semi-passive (also
known as battery-assisted passive (BAP)) . A typical RFID tag consists of a
microchip attached to a radio antenna mounted on a substrate. The microchip can
store data from 26 bits to 128 kilobytes [9].
Although both active and passive tags use RF energy to communicate with a
reader, they are fundamentally different in the method of powering the tags.
An active tag uses an internal power source, usually batteries, within the tag to
continuously power the tag and its RF communication circuits, whereas a passive
tag completely relies on RF energy transferred from the reader. This distinction
may have significant impact on the functionality of the system [10],[11].
Semi-passive tags overcome two key disadvantages of pure passive RFID tags,
one is the lack of a continuous source of power for the circuits and the other is the
short reading range.
|Page2
Figure 2.1 Some samples of active and passive RFID tags.
There are two basic types of chips available for RFID tags: read-only and read-
write. Read-only tags are cheaper and their required infrastructure is also less
expensive, they still deliver on one of the main promises of RFID, which is the
reduction of operator involvement.
The size of RFID tags varies largely with the purpose of applications.
An RFID reader reads data from RFID tags and it acts as a conduit or bridge
between RFID tags and the controller or middleware. The most important feature
of a reader is its reading range, which can be affected by a number of factors such
as the frequency(decreasing with reading range), the antenna gain(increasing with
reading range), the orientation and polarization of the reader antenna, the
transponder antenna and the placement.
The host computer can be a desktop or a laptop, positioned close to the readers. It
receives data from the readers and performs data processing such as filtering and
collation. It also serves as a device monitor for ensuring that the reader is
functioning properly, securely and with up-to-date instructions. The host
computer and the readers communicate with each other often via the WebSocket
Protocol [5].
RFID middleware is the software that facilitates communication between RFID
readers and enterprise systems. It also collects, filters, aggregates and applies
|Page3
business rules on data received from the readers. Middleware is also responsible
for providing management and monitoring functionality, ensuring that the readers
are connected, functioning properly, and being configured correctly. Middleware
may be implemented on a host computer, a centralized server or on intelligent
readers [15], [16].
The reader and the host computer communicate through either a wired or wireless
link, figure 2.3 shows the work principles of a typical passive RFID system
[4],[17], [18], [19]. The power source of a passive tag is provided by the reader.
When a radio signal is sent from a reader and the tag enters the signal field of the
reader, the tag will be powered on by the signal. The reader then captures the ID
and data from the tag and sends this information to the host computer. The
computer, with RFID middleware installed on, processes the data and sends it
back to the reader; the reader then transmits the processed data to the tag. Passive
RFID systems are normally used for applications in shorter reading ranges.
The principles of an active RFID system are slightly different from a passive
system as shown in Figure 2.4. An active RFID system usually uses active RFID
tags (with a battery built in) and each tag periodically transmits its data which
may contain identification and other application-specific information such as
location, price, color and date of purchase. The RFID reader will cross-reference
the tag's data within its self-contained database. Compared to a passive system,
an active RFID system can simultaneously read several tags in the field, its
reading range is longer and its power required is less [6], [20], [21].
|Page4
Figure 2.4 A typical active RFID system
The principles of a semi-passive RFID system are similar to that of the passive
system, except that there is a battery embedded in the semi-passive tag. The
battery provides an on-board power source for the telemetry and sensor asset
monitoring circuits of the tag so that the tag has more power to communicate.
However, the on-board power is not directly used to generate RF electromagnetic
energy.
|Page5
Figure 2.5 Electromagnetic spectrum, frequency, wave-length and energy for RFID
When RFID is used for short range communication (SRC), it can provide wider
reading range with cheaper deployment cost compared with other SRC
technologies. The different reading ranges between these popular SRC
technologies are shown in Figure 2.6.
|Page6
Figure 2.6 RFID in the context of short range communications
RFID systems also operate in several regions of the RF spectrum and different
regions tend to be used for different applications. No one frequency is good for
all applications, all geographies, or all types of operating environments.
Generally, there are four primary frequency bands allocated for RFID uses: low
frequency (LF), high frequency (HF), ultra-high frequency (UHF) and super-high
frequency (SHF)/microwave. Research has shown that all the frequency bands
can be used for both passive and active tags. The characteristics and performance
of standard radio frequency ranges used for RFID are summarized in Table 2.2 ,
[11],[23].
|Page7
2.1.7 Advantages and Disadvantages of using RFID:
• Product Tracking :
• Passports :
|Page8
• Identification :
RFID chips can be implanted into animals and people to track their
movements, provide access to secure locations, or help find lost pets.
• Libraries :
Libraries use RFID tags in books and other materials to track circulation
and inventory, store product information (such as titles and authors), and to
provide security from theft. Because RFID tags can be scanned without
physically touching the item, checking books in and out, plus doing
laborious tasks such as shelf inventory, can be accomplished quickly and
efficiently using RFID technology.
• Shipping :
Large shipments of materials, such as retail goods, often utilize RFID tags
to identify location, contents, and movement of goods. Wal-mart is one of
the largest consumers of this technology to assist in tracking shipments of
merchandise.
• Other uses :
|Page9
communications and entertainments for more than 10 years and has facilitated the
rapid growth of modern social media services. Wi-Fi provides services in private
homes, businesses, as well as in public spaces. Organizations wishing to provide
advanced services or for advertising purposes, such as at airports, hotels and
shopping malls, often provide free use of Wi-Fi access to attract and provide a
service to customers. In recent years, Wi-Fi has become a default feature of all
smartphones. Consequently, society has become increasingly dependent on their
phones as the main source of telecommunication, entertainment.
Wi-Fi is one of the biggest revolutions to the way we use computers since the PC
was introduced. It not only frees people to work on a laptop while remaining
connected, but also provides an alternative to broadband services at locations that
are too remote to justify cables. Furthermore, this technology offers a new way of
tracking people/moving objects wirelessly.
3. Ethernet cable: is used for physically connecting a wired LAN router and an
AP.
| P a g e 10
To connect to a Wi-Fi LAN, a computer or another device has to be equipped
with a wireless network interface controller. The combination of the device and
interface controller is called a station.
| P a g e 11
802.11a, 802.11b, 802.11g, 802.16 and 802.11n. A summary of the Wi-Fi
standards is shown in Table 2.4 [24]. The version of 802.11b/g/a are the most
popular three standards widely accepted by industries.
The main issue with wireless network security is its simplified access to the
network compared to traditional wired networks such as Ethernet, with wired
networking one must either gain access to a building (physically connecting into
the internal network) or break through an external firewall. To enable Wi-Fi, one
needs to be within the wireless range of the Wi-Fi network. Most business
networks protect sensitive data and systems by attempting to disallow external
access. Enabling wireless connectivity reduces security if the network uses
inadequate or no encryption [25]. A common measure to deter unauthorized users
involves hiding the access point's name by disabling the Service Set Identifier
(SSID) broadcast. While effective against the users, it is ineffective as a security
method because the SSID is broadcast in the clear response to a client SSID query.
Another method is to only allow computers with known Media Access Control
(MAC) addresses to join the network, but determined eavesdroppers may be able
| P a g e 12
to join the network by spoofing an authorized address. A Wi-Fi-enabled device
can connect to the Internet when it is within the range of a wireless network.
The radio signals from a single AP can be transmitted up to 100 m in outdoor free
space. The coverage of one or more interconnected APs can extend from an area
as small as a few rooms to as large as many square miles. Wi-Fi also connects
places that normally don't have network access, such as lifts and storage
warehouse. Coverage in the larger area may require a group of access points with
overlapping coverage.
1. Convenience :
The ability of computers to communicate over the airwaves opened up the way
to today’s world of mobile computing. Wireless networking allows you to place
19 desktop systems in parts of a building where they couldn’t go before and
lets laptops, tablets and smart phones roam freely without losing their
connections to the local network and through it to the Internet.
2. Mobility:
With the emergence of public Wi-Fi networks, users can access the internet
even outside their normal work environment. Most chain supermarkets, for
example, offer their customers a wireless connection to the internet at no cost.
3. Productivity:
4. Deployment:
A wired network, has the additional cost and complexity of actual physical
cables being run to numerous locations (which can even be impossible for hard-
to-reach locations within a building). A wireless network, on the other hand,
requires little more than a single access point for the Initial infrastructure setup.
5. Expandability:
| P a g e 13
Wi-Fi networks can serve a suddenly-increased number of clients with the
existing equipment. In a wired network, additional clients would require
additional wiring.
6. Versatility:
Unlike mobile phones, any standard Wi-Fi device will work anywhere in the
world. Different competitive brands of access points and client network-
interfaces can inter-operate at a basic level of service. Along with the price of
chipsets for Wi-Fi continues to drop, manufacturers are building wireless
network adapters into more devices, making it an economical networking
option everywhere [26].
Due to the fact that Wi-Fi is still relatively new there are exist some limitations to
users. Some of the limitations have little impact on positioning and tracking:
1. Security:
Some of the more commonly utilized encryption methods, however, are known
to have weaknesses that a dedicated adversary can compromise. Free access
points can be used by the malicious to anonymous to initiate an attack that
would be extremely difficult to track beyond the owner of the access point.
2. Reliability:
Like any radio frequency transmission, Wi-Fi signals are subject to a wide
variety of interference, as well as complex propagation effects that are beyond
the control of the network administrator.
3. Speed:
The speed on most wireless networks (typically 1-54 Mbps) is far slower than
even the slowest common wired networks (100Mbps up to several Gbps).
5. Power consumption:
| P a g e 14
Is fairly high compared to some other standards, making the battery life and
heat a concern to some users. The following two points of Wi-Fi limitation are
more relative to positioning and location tracking.
6. Range:
The typical range of a common 802.11 network may be sufficient for a typical
home, it will be insufficient in a larger structure (e.g. a large public space). To
obtain additional range, repeaters or additional APs will have to be purchased.
Costs for these items can add up quickly.
7. Interference:
The use of 2.4 GHz Wi-Fi band does not require a license in most countries
provided that it stays below limit of 100mW and one accepts interference from
other sources; including interference which causes the users devices to no
longer function.
| P a g e 15
Figure 2.8 selected end-user devices possibly connected via Wi-Fi network.
A Wireless Local Area Network (WLAN) can be designed and deployed with
different levels of complexity. Basically, a traditional WLAN architecture
consists of four main components. These components are depicted in Figure 2.9.
| P a g e 16
The purpose of a WLAN is to transfer information wirelessly between stations.
These stations are typically laptops or other mobile terminals that are equipped
with a wireless interface. The communication is done through a wireless medium.
The stations communicate with access points, which are connected to a wired
distribution system or backbone network. Hence, the access points perform a
wireless-to-wired bridging function [13].
A group of stations that communicate with each other is called a Basic Service
Set (BSS). An access point and all the stations that are able to communicate with
each other within the coverage area of the access point, is said to be in an
Infrastructure Basic Service Set.
Two stations can also communicate directly with each other, without using an
access point. Several stations communicating directly together, form an ad-hoc
network or an Independent Basic Service Set (IBSS). Figure 2.10 illustrates how
the stations communicate with each other in the independent and infrastructure
BSSs.
| P a g e 17