RFID Automation

34
ELG 4135 ELG 4135 Electronics ΙΙΙ Project Electronics ΙΙΙ Project Professor: Riadh Habash Professor: Riadh Habash TA: Mohamad Eid TA: Mohamad Eid TA: Peng He TA: Peng He

description

 

Transcript of RFID Automation

Page 1: RFID Automation

ELG 4135ELG 4135

Electronics ΙΙΙ ProjectElectronics ΙΙΙ Project

Professor: Riadh HabashProfessor: Riadh Habash

TA: Mohamad EidTA: Mohamad Eid

TA: Peng HeTA: Peng He

Page 2: RFID Automation

RFID AUTOMATION RFID AUTOMATION IN AN INDUSTRIAL PLANTIN AN INDUSTRIAL PLANT

SIGAS

Saudi Industrial Gas Co.LTD.

Page 3: RFID Automation

Manufacturer Informationserial#, pressure, model

Content, …etc

Application Software

Asset Management Information

Inventory #, receipt, date, current location, …etc

Inspection Information repair, date and location of last inspection and retest,

Safety data, …etc

Other data can also be programmed on request

Cylinder Filling Information Content, date of last fill,

place of last fill, fill counter,

…etc

Report GenerationComprehensive reporting,

Current status, historical logs, …etc

The Problem …

Page 4: RFID Automation

Constructing The LoopConstructing The Loop

Distributor Customer

Supplier

Page 5: RFID Automation

Existing TechnologiesExisting Technologies

Component cables or Electrical Component cables or Electrical wires  wires 

WiFi WiFi Infrared Signals Infrared Signals Bluetooth Bluetooth Home RF Home RF RFID RFID

Page 6: RFID Automation

WiFi 802.11WiFi 802.11

Wi-Fi setup Wi-Fi setup consists of several consists of several Access Points Access Points (APs) and several (APs) and several clients. Each AP clients. Each AP broadcasts its broadcasts its Service Set Service Set Identifier (SSID) Identifier (SSID) through packets through packets called beaconscalled beacons

AdvantagesAdvantages DisadvantagDisadvantageses

High data rateHigh data rateLow Low interferenceinterferenceProducts Products widely available widely available

in the marketin the market   

High power High power consumptionconsumptionNeeds Needs encryption for encryption for securitysecurityInterruption Interruption can occur from can occur from 2.4 GHz mobile 2.4 GHz mobile phones and phones and microwave microwave ovens ovens Adapters must Adapters must be installed on be installed on each client each client

Page 7: RFID Automation

BluetoothBluetooth

Radio frequency Radio frequency standardstandard

AdvantagesAdvantages DisadvantagDisadvantageses

Low Low interference interference because of the because of the low power low power consumptionconsumptionAutomatic Automatic recognitionrecognitionEach Each transmission transmission consumes 1 consumes 1 milliwatt of milliwatt of

powerpower   

Max distance Max distance 32 feet32 feetNot the Not the cheapestcheapest

Page 8: RFID Automation

Infrared SignalsInfrared Signals

Light waves of a Light waves of a lower frequency lower frequency than human eyes than human eyes can receive and can receive and interpret interpret

AdvantagesAdvantages DisadvantagDisadvantageses

Interference Interference between between devices is devices is

uncommonuncommon

"line of sight" "line of sight" technologytechnology"one to one" "one to one" technologytechnologySpeed of data Speed of data rate rate transmission is transmission is lower than lower than typical wired typical wired

transmissiontransmission

Page 9: RFID Automation

Home RFHome RF

Radio frequency Radio frequency standardstandard

AdvantagesAdvantages DisadvantagDisadvantageses

Enhances Enhances mobility mobility No transmitter No transmitter interaction/interinteraction/inter

ferenceference Low CostLow Cost

Blocked by Blocked by common common materials: materials:

people, wallspeople, walls Short rangeShort rangeSpeed of data Speed of data rate rate transmission is transmission is lower than lower than typical wired typical wired

transmissiontransmission

Page 10: RFID Automation

Why is RFID better than Why is RFID better than using bar codes?using bar codes? Bar codes are line-of-sight technology, which Bar codes are line-of-sight technology, which

means people usually have to orient the bar code means people usually have to orient the bar code towards a scanner for it to be read. Radio towards a scanner for it to be read. Radio frequency identification, by contrast, frequency identification, by contrast, doesn’t doesn’t require line of sightrequire line of sight. .

RFID tags can be read as long as they are within RFID tags can be read as long as they are within range of a reader. range of a reader.

Bar codes have other shortcomings as well. If a Bar codes have other shortcomings as well. If a label is ripped, soiled or falls off, there is no way to label is ripped, soiled or falls off, there is no way to scan the item. scan the item.

Standard bar codes identify only the manufacturer Standard bar codes identify only the manufacturer and product, not the unique item. The bar code on and product, not the unique item. The bar code on one cylinder is the same as every other, making it one cylinder is the same as every other, making it impossible to identify which one might pass the impossible to identify which one might pass the inspection. inspection.

Page 11: RFID Automation

RFID – An Idea Whose RFID – An Idea Whose Time Has ComeTime Has Come•Radio Frequency Identification (RFID) is a technology with several aspects that correspond to different applications.

•The common element of all RFID applications is the use of radio signals to sense the presence of a tagged object and, in most instances, to retrieve data stored on the object.

Page 12: RFID Automation

What is RFID? What is RFID? (Continued)(Continued)

From the sensing point of view, the many RFID applications are quite diverse, including– Radar– Access control systems and smart cards– Automatic toll collection– Asset tracking (e.g., railroad cars)– Animal tagging, including implants– Hazardous substance tracking– Inventory and supply chain tracking

Page 13: RFID Automation

RFID ComponentsRFID Components

RFID transponder or an RFID tag :There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip

Tag is attached to an antenna The antenna enables the chip to transmit the identification information to a reader.

The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.

Friendly softwareFriendly software

Page 14: RFID Automation

Components of an RFID system Figure (1)

Page 15: RFID Automation

Example RFID Tags

Labels with RFID tags embedded

2.5 mm coil-on-chip RFID tag for close proximity applications (Maxell)

Page 16: RFID Automation

Gas CylindersGas Cylinders

Page 17: RFID Automation

SIGAS SOLUTIONSIGAS SOLUTION

Page 18: RFID Automation

RFID High level RFID High level System DesignSystem Design

Page 19: RFID Automation

125 KHz Low Pass 125 KHz Low Pass FilterFilter

Page 20: RFID Automation

33rdrd Order Butterworth Order Butterworth LPFLPF

Page 21: RFID Automation

Frequency Response Frequency Response of Butterworth Filterof Butterworth Filter

All frequencies All frequencies above 912 MHz above 912 MHz are filtered out.are filtered out.

Phase shift at Phase shift at 912 MHz is about 912 MHz is about -100 degrees.-100 degrees.

Page 22: RFID Automation

Input and Output Input and Output Signals of 912 MHz Signals of 912 MHz

LPFLPF

Page 23: RFID Automation

Half Bridge Power Half Bridge Power AmplifierAmplifier

Voltage Gain = Voltage Gain = 0.8160.816

Current Gain = 108Current Gain = 108

Power Gain = 88Power Gain = 88

Cross over Cross over distortiondistortion

avoided by 2 diodes avoided by 2 diodes

Page 24: RFID Automation

Frequency Response Frequency Response of Power Amplifier of Power Amplifier

Output voltage is Output voltage is the same for all the same for all frequencies.frequencies.

Output current Output current does not depend does not depend on frequency.on frequency.

Therefore Power Therefore Power Gain is constant.Gain is constant.

Page 25: RFID Automation

Transmitted PowerTransmitted Power

Input voltage = 1.549 VInput voltage = 1.549 V Input current = 20.418 mAInput current = 20.418 mA Input Power = 31.6 mWInput Power = 31.6 mW

LPF output voltage = 0.49 VLPF output voltage = 0.49 V LPF output current = 0.074 mALPF output current = 0.074 mA LPF output power = 36.3 µWLPF output power = 36.3 µW

Amplifier output voltage = 0.4 VAmplifier output voltage = 0.4 V Amplifier output current = 8 mAAmplifier output current = 8 mA Amplifier output power = 3.2 mWAmplifier output power = 3.2 mW

Page 26: RFID Automation

Read RangeRead Range

Assumptions:Assumptions: No propagation lossNo propagation loss Transmission antenna gain is 1Transmission antenna gain is 1 No noise !!!!No noise !!!!

PPRR = P = PTTGGRR(c/f)(c/f)22/(4πr)/(4πr)22

For PFor PRR = 1 pW = 1 pW

rr22 = P = PTTGGR R (c/f)(c/f)22/P/PRR (4π) (4π)22

= [3.2 x 10= [3.2 x 10-3 -3 x 9 x 10x 9 x 101616 ] G ] GRR / [(912) / [(912)22 x 10 x 101212 x 10 x 10-12-12 x(4π) x(4π)22]] = 2.193 x 10= 2.193 x 106 6 GGRR

r = 1.48 (Gr = 1.48 (GRR))1/21/2 Km Km

Page 27: RFID Automation

Demodulator CircuitDemodulator Circuit

Page 28: RFID Automation

How the circuit worksHow the circuit works

Assuming the tag uses ASK modulation:Assuming the tag uses ASK modulation: 1 is represented by a 5V sine wave1 is represented by a 5V sine wave 0 is represented by 1V sine wave0 is represented by 1V sine wave Comparator gives 1 if the envelope Comparator gives 1 if the envelope

detector output is higher than 2V and 0 detector output is higher than 2V and 0 if envelope detector output is less than if envelope detector output is less than 2V2V

For a 1 followed by 0, the capacitor will For a 1 followed by 0, the capacitor will discharge starting from 5V until output discharge starting from 5V until output falls below 2 V and the comparator falls below 2 V and the comparator output will change to 0.output will change to 0.

Page 29: RFID Automation

Demodulation Results Demodulation Results (1)(1)

Assuming the Assuming the input is all 1’s, input is all 1’s, the amplitude of the amplitude of the modulated the modulated signal is always signal is always 5V. So the 5V. So the comparator comparator output will output will always be 1. always be 1.

Page 30: RFID Automation

Demodulation Results Demodulation Results (2)(2)

Assuming the input Assuming the input is a series of 1 is a series of 1 followed by 0, the followed by 0, the modulated signal modulated signal amplitude will amplitude will alternate between alternate between 5V and 1V. So we 5V and 1V. So we can model this case can model this case by applying an input by applying an input signal of lower signal of lower frequency to give frequency to give the envelope the envelope detector enough detector enough time to discharge.time to discharge.

Page 31: RFID Automation

Future ImprovementsFuture Improvements

Increasing power efficiency:Increasing power efficiency:– Matching antenna impedanceMatching antenna impedance– Improving the LPF and power amplifierImproving the LPF and power amplifier– Including noise considerations in circuit Including noise considerations in circuit

designdesign Adding security codes to the transmitted Adding security codes to the transmitted

signalsignal Using an advanced demodulation circuit Using an advanced demodulation circuit

to decode other types of modulated to decode other types of modulated signals.signals.

Page 32: RFID Automation

ReferencesReferences

Han05 Han05 – Gerhard Hancke. Gerhard Hancke.

A practical relay attack on ISO 14443 proximity cards, 2005. A practical relay attack on ISO 14443 proximity cards, 2005. http://www.cl.cam.ac.uk/~gh275/relay.pdfhttp://www.cl.cam.ac.uk/~gh275/relay.pdf. .

Lee03 Lee03 – Youbok Lee. Youbok Lee.

Antenna circuit design for RFID application. Antenna circuit design for RFID application. Microchip Technology, Application Note AN710, DS00710C, Microchip Technology, Application Note AN710, DS00710C, 2003. 2003. http://ww1.microchip.com/downloads/en/AppNotes/00710c.phttp://ww1.microchip.com/downloads/en/AppNotes/00710c.pdfdf..

Sch05 Sch05 – Bruce Schneier. Bruce Schneier.

RFID passport security revisited. RFID passport security revisited. Schneier on Security: A weblog covering security and Schneier on Security: A weblog covering security and security technology, 2005. security technology, 2005. http://www.schneier.com/blog/archives/2005/08/rfid_passporthttp://www.schneier.com/blog/archives/2005/08/rfid_passport_s_1.html_s_1.html. .

Page 33: RFID Automation

ReferencesReferences

TI03 TI03 – S4100 multi-function reader module data sheet. S4100 multi-function reader module data sheet.

Texas Instruments, Module 11-06-22-715, 2003. Texas Instruments, Module 11-06-22-715, 2003. http://www.ti.com/rfid/docs/manuals/refmanuals/rf-mgr-mnmn_dhttp://www.ti.com/rfid/docs/manuals/refmanuals/rf-mgr-mnmn_ds.pdfs.pdf. .

http://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Bluetooth, 2006, 2006

http://techtrain.microchip.com/webseminars/documents/IrDAhttp://techtrain.microchip.com/webseminars/documents/IrDA_BW.pdf_BW.pdf

http://trace.wisc.edu/docs/ir_intro/ir_intro.htm http://trace.wisc.edu/docs/ir_intro/ir_intro.htm

http://en.wikipedia.org/wiki/Wi-fi#Wireless_Access_Point_.28http://en.wikipedia.org/wiki/Wi-fi#Wireless_Access_Point_.28WAP.29WAP.29

Page 34: RFID Automation

Thank youThank you

Questions ?