RFID Technology and Its Applications in Internet of Things (IOT)
RFID Technology and Its Applications in Internet of Things (IOT)
RFID Technology and Its Applications in Internet of Things (IOT)
Things (IOT)
Xiaolin Jia1,2, Quanyuan Feng2, Taihua Fan1, Quanshui Lei1
1
School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China
2
School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China
Abstract—Radio frequency identification system (RFID) is an IOT first became popular through the Auto-ID Center and
automatic technology and aids machines or computers to identify related market analysts publications. RFID is often seen as a
objects, record metadata or control individual target through prerequisite for the IOT. If all objects of daily life were
radio waves. Connecting RFID reader to the terminal of Internet, equipped with radio tags, they could be identified and
the readers can identify, track and monitor the objects attached inventoried by computers. This paper introduces the primary
with tags globally, automatically, and in real time, if needed. This concepts and technologies of RFID and IOT, discusses the
is the so-called Internet of Things (IOT). RFID is often seen as a applications and challenges of RFID technology used in IOT.
prerequisite for the IOT. This paper introduces the technologies
of RFID and IOT, discusses the applications and challenges of
RFID technology used in IOT. II. IOT AND RFID TECHNOLOGY
cost of the already used systems such as bar codes. Although 8ELTXLWRXV 1HWZRUN
'LUHFWRU\ 6HUYLFHV 'RFXPHQWDWLRQ
RFID technology was discovered many years ago, it has 0²0 6HUYLFHV 'DWD 0DQDJHPHQW
advanced and evolved only during the last decade since cost )DFLOLW\ &RQWURO 4R6 6HUYLFHV
*HRPDWLFV
has been the main limitation in all implementations. ,QWHUQHW 1*1 HWF.
&RUH 1HWZRUN
As predicted in [3], RFID is one of the big opportunities in 1HWZRUN *60 3ULYDWH 1HWZRUN
:/$1 :61 $FFHVV *DWHZD\
*356
information technology, which will change the world broadly :L0D[ :3$1 (WKHUQHW
3*,6'1/3671
and deeply. When the RFID readers abided by appropriate 6DWHOOLWH 1HWZRUN$FFHVV 1HWZRUN
communication protocols are connected to the terminal of 'HYLFH *DWHZD\
0²0 7HUPLQDO *DWHZD\ 'DWD &ROOHFWLRQ
:61 *DWHZD\ 6HQVRU 1RGH
Internet, the readers distributed throughout the world can 5),' 0RELOH
5),'
5HDGHU
5HDGHU
identify, track and monitor the objects attached with tags
:61/61
globally, automatically, and in real time, if needed. This is the 3HUFHSWLRQ :L)L 5),'
%OXHWRRWK HWF.
so-called Internet of Things (IOT).
2SWLFDO ILEHU&DUG 5HDGHU &DPHUD 7UDQVGXFHU 6PDUW 6HQVRU 2WKHU )DFLOLW\
The IOT refers to uniquely identifiable objects (things) and
Fig.1 The system architecture of Internet of Things (IOT)
their virtual representations in an Internet-like structure. The
1
978-1-4577-1415-3/12/$26.00 ©2012 IEEE
2
and reader-writers, RFID system, camera, global position Application system: also called data processing system,
system (GPS), intelligent terminals, electronic data interface which can be an application or database, depending on the
(EDI), objects, and so like. application. The application software initiates all readers and
Network layer: This layer, also called transport layer, tags activities. RFID provides a quick, flexible, and reliable
including access network and core network, provides way for electronically detecting, tracking and controlling a
transparent data transmission capability. By the existing variety of items. RFID systems use radio transmissions to send
mobile communication network, radio access network, energy to a RFID tag while the tag emits a unique
wireless sensor network (WSN) and other communications identification code back to a data collection reader linked to an
equipment, such as global system for mobile communications information management system. The data collected from the
(GSM), general packet radio service (GPRS), worldwide tag can then be sent either directly to a host computer, or stored
interoperability for microwave access (WiMax), wireless in a portable reader and up-loaded later to the host computer.
fidelity (WiFi), Ethernet, etc., the information form perception
layer can be sent to the upper layer. At the same time, this C. RFID Tags
layer provides an efficient, reliable, trusted network RFID tags come in many different shapes, sizes, and
infrastructure platform to upper layer and large scale industry capabilities. When an RFID solution is designed, the
application [4]. solution’s architect must take into account both business and
Service layer: This layer, also called application layer, technology requirements before choosing the type of RFID tag
includes data management sub-layer and application service to use [6]. All RFID tags have the following essential
sub-layer. The data management sub-layer provides processing components in common: antenna, integrated circuit, printed
complex data and uncertain information, such as restructuring, circuit board (or substrate).
cleaning and combining, and provides directory service, The main responsibility of antenna of RFID tag is to
market to market (M2M) service, Quality of Service (QoS), transmit and receive radio waves for the purpose of
facility management, geomatics, etc. by service oriented communication. The antenna is also known as the coupling
architecture (SOA), cloud computing technologies, and so on. mechanism, which can transform the energy in the form of
The application service sub-layer transforms information to electromagnetic radiation. This is the way the tag and reader
content and provides good user interface for upper level communicating each other. In a suitable environment and
enterprise application and end users, such as logistics and proximity to an RFID reader, the antenna can collect enough
supply, disaster warning, environmental monitoring, energy to power the tag’s other components without a battery.
agricultural management, production management, and so
forth. The integrated circuit (IC) is a packaged collection of
discrete components that provide the brains for the tag. The IC
B. RFID System in a RFID tag is much like a microprocessor found in any
cellular phone or computer, but it is usually not very
RFID systems are composed of three main components: sophisticated. For many RFID tags, the IC component has only
RFID tags, reader, application system [2][5], as shown in
Fig.2.
Master Slave
Command Command T
a single purpose, to transmit the tag’s unique identifier (ID). If
a the tag has any peripheral components, the IC is also the
master controller that is responsible for gathering any extra
Application Reader
Response Response information and transmitting it along with the tag’s ID.
Master Slave
The printed circuit board (PCB) is the material that holds
Data flow the tag together. The circuit board may be rigid or flexible, and
is composed of many different types of materials, depending
Fig.2 The components of a RFID system
on the type and purpose of the tag. For example, tags that are
used for tracking components on an assembly line where
RFID tags: also known as transponders (transmitter/ extremely high temperatures may be encountered would tend
responder), are attached to the objects to count or identify. to be much more rigid and are usually placed inside a
Tags could be either active or passive. Active tags are those protective enclosure.
that have partly or fully battery powered, have the capability to
communicate with other tags, and can initiate a dialogue of Tags are built to comply with a categorization called a
their own with the tag reader. Passive tags, on the other hand, class. Classes progressively have greater capability. EPCglobal
do not need any internal power source but are powered up by has defined six classifications for RFID tags (0 to 5). A general
the tag reader. Tags consist mainly of a coiled antenna and a description of functionality that each class is required to
microchip, with the main purpose of storing data. comply is as follows.
Reader: also known as transceiver (transmitter/receiver) Class 0/class 1: These classes provide the basic radio
made up of a radio frequency interface (RFI) module and frequency (RF) passive capability. Class 0 is factory-
control unit. Its main functions are to activate the tags, programmed. Beyond class 0, including class 1, the
structure the communication sequence with the tag, and tags are user-programmable.
transfer data between the application software and tags.
Class 2: Additional functionality is added, which
includes encryption and read-write RF memory
3
Class 3: Batteries are found on board that will power The control unit is usually based upon a microprocessor to
logic in the computer circuit. Class 3 provides longer perform these complex functions. Cryptological procedures,
range and broadband communications such as stream ciphering between transponder and reader, and
Class 4: Active tags are part of the definition of class also signal coding, are often performed in an additional ASIC
4 tags. Peer-to-peer communications and additional (application specific integrated circuit) module to relieve the
sensing are also included. processor of calculation intensive processes.
Class 5: Class 5 tags contain enough power to
activate other tags and could be effectively classified III. APPLICATIONS OF RFID TECHNOLOGY
as a reader. The functions of RFID system generally include three
aspects: monitoring, tracking, and supervising. Monitoring
Passive tags, which have no built-in power source and the generally means to be aware of the state of a system, by
power is provided by the radio frequency wave created by the repeated observing the particular conditions, especially to
reader, are usually classified in the class 0 to 3 range. Class 4 detect them and give warning of change. Tracking is the
describes active tags, which have an internal power source (a observing of persons or objects on the move and supplying a
battery), that provides the necessary power for the operation of timely ordered sequence of respective location data to a model.
the tag over a period of time. Class 5 is reserved for tag Supervising is the monitoring of the behaviors, activities, or
readers and active tags that can read data from other tags. other changing information, usually of people. It is sometimes
done in a secret or inconspicuous manner.
D. RFID Reader
The RFID applications are numerous and far reaching. The
RFID readers are also referred to as interrogators because
most interesting and successful applications include those for
they query tags as the tags enter their read range. The reader is
supply chain management, production process control, and
responsible for orchestrating the communication with any tags
objects tracking management. Now RFID has been gradually
in its read range and then presenting the tags’ data to an
and broadly used in the following fields.
application that can make use of the data.
Readers in all systems can be reduced to two fundamental Logistics and Supply
functional blocks: the control system and the high frequency Manufacturing
(HF) interface, consisting of a transmitter and receiver, as
shown in Fig.3. The entire system is controlled by an external Agriculture Management
Health Care and Medicine
Marine Terminal Operation
Military and Defense
Payment Transactions
Environment Monitor and Disaster Warning
Transportation and Retailing
Warehousing and Distribution Systems
Fig.3 RFID reader consisting of control system and HF interface [2]
Other applications in many walks of life businesses
application via control commands. For instance, in Manufacturing, RFID technology offers a
number of applications in the automotive industry. A RFID-
The reader’s HF interface performs the following functions: based antitheft vehicle immobilizer is a protective device
(a) generation of high frequency transmission power to installed in many cars. RFID also holds great promise for the
activate the transponder and supply it with power; (b) assembly and manufacturing processes of automobiles, in
modulation of the transmission signal to send data to the particular, for flexible and agile production planning, spare
transponder; (c) reception and demodulation of HF signals parts, and inventory management. RFID technology not only
transmitted by a transponder. helps to automate the whole assembly process in which a
The reader’s control unit performs the following functions: significant reduction in cost and shrinkage can be achieved,
(a) communication with the application software and the but it also offers improved services to automobile users that
execution of commands from the application software; (b) include more efficient replacement part ordering and
control of the communication with a transponder (master– automated generation of maintenance reminders. The benefits
slave principle, as shown in Fig.2); (c) signal coding and that RFID offers to the automotive industry, both to the
decoding. In more complex systems the following additional production process as well as to end users, are visibility,
functions are available: (d) execution of an anti-collision traceability, flexibility, and added security.
algorithm; (e) encryption and decryption of the data to be As illustrated in Fig.4, the evolution of IOT is coinciding
transferred between transponder and reader; (f) performance with that of RFID and sensor technologies. Form supply-chain
of authentication between transponder and reader. helper to vertical-market applications to ubiquitous
positioning,
4
Technology Reach Software agents and
Many researcher and scientist work to implement low cost
advanced sensor fusion security and privacy protocol to increase the applicability. Lots
Miniaturization, power-
efficient electronics,
Teleoperation and of lightweight solutions have been proposed for RFID, but
and available spectrum
telepresence: Ability
to monitor and control they are still expensive and vulnerable to the security and do
distant objects
not fully resolve the security issues. So there is a good
Ability of devices located Physical-World Web
research scope in the field of designing an efficient ultra-
indoors to receive Locating people and
lightweight
geolocation
signals
everyday objects cryptographic protocol for low-cost RFID system.
Ubiquitous Positioning
Cost reduction leading to
diffusion into 2nd
wave of applications
Surveillance, security,
C. Other Challenges
healthcare, transport, food Three other issues also are mainly holding back RFID’s
Demand for
expedited logistics Vertical-Market Applications
RFID tags for
facilitation routing
widespread adoption. The first one is the cost. The RFID tags
inventorying, and loss
Supply-Chain Helpers
are still more expensive than printed labels. The second issue
prevention
is design. It is still needed to engineer tags and readers so
that
2000
Source: SRI Consulting Business Intelligence
2010 2020 time
they guarantee highly reliable identification. Another
challenge to RFID is its integration into existing systems. It is
Fig.4 Technology roadmap of Internet of Things (IOT)
significant to develop effective RFID middleware which used
to link new RFID systems into existing back-end
and so on, the RFID technology is a very important and
infrastructures.
fundamental groundwork for IOT.
Despite these challenges, it’s only a matter of time before
IV. CHALLENGES OF RFID TECHNOLOGY these issues could be solved. RFID’s potential benefits are
large, and many novel applications will be see in the future,
Although promising, RFID is not without its challenges, even some of which can not begin to imagine.
which arise from both a technological and usage point of view.