Top Banner
Low cost RFID and the EPC Sanjay Sarma, Steve Weis, Dan Engels MIT
52
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: auto-id.ppt

Low cost RFID and the EPC

Sanjay Sarma, Steve Weis,Dan Engels

MIT

Page 2: auto-id.ppt

outline

• RFID and the Auto-ID Center• Protocols• Security issues

Page 3: auto-id.ppt

Part I Outline

• What and why of RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status

Page 4: auto-id.ppt

RFID System

Page 5: auto-id.ppt

RFID

Page 6: auto-id.ppt

outline

• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status

Page 7: auto-id.ppt

why low cost?

4

Page 8: auto-id.ppt

low cost rfid

time

5

10

15

20

die

size

/cos

t, ce

nts

handling costSilicon: 4c/mm2

Page 9: auto-id.ppt

why is rfid expensive today?

increased chip size greater functionality

reduce functionality(Networking & software)

reduce chip size(handle small chips)

Page 10: auto-id.ppt

Cheap protocol

0

10

20

30

40

50

60

70

80

90

100

905 910 915 920

Frequency (MHz)

No

ise

Gaussian Fit 0.8912 1002 Meters, 4 KHz,SQW, 1 dBm

Page 11: auto-id.ppt

context-aware router context-aware

router

context-aware router

context-aware router

sensor

context-aware router

context-aware routercontext-aware

routercontext-aware router

context-aware router

context-aware router

context-aware router

sensor sensor sensor

01. 203D2A. 916E8B. 8719BAE03C

Manufacturer 24 bits

Product 24 bits

Serial Number 40 bitsHeader 8 bits

the hypothesis or bet

• Place unique number on tagElectronic Product Code, EPC64 bit, 96 bit, and upwards

• Develop manufacturing technology for small chips and tags

• Move data on the networkNetwork service for resolving EPCNetwork architecture for gathering and routing data

Page 12: auto-id.ppt

outline

• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status

Page 13: auto-id.ppt

Low cost RFID

 

Antenna Manufacture

Antenna/IC Assembly

Conversion to Package

End users

IC Manufacture

20¢ 5¢ 5¢ 20¢

IC Design

$X MillionNumber of tags

1-2¢ 1¢ 1¢ 1¢

IC Design

$X Million Billions

Page 14: auto-id.ppt

Slicing and Dicing

• Standard saw-dicing wasteful• Instead, use separation

by thinning

C. Landesberger, S. Scherbaum, G. Schwinn, H. Spöhrle: “New Process Scheme for Wafer Thinning and Stress-free Separation of Ultra Thin IC’s,” Proceedings of Microsystems Technologies 2001, Mesago, Stuttgart, pp. 431-436, 2001.

Page 15: auto-id.ppt

Antenna

• Screen printing• Etching• Forming

M. Feil, C. Adler, G. Klink & M. König: “Interconnection Techniques for Ultra Thin ICs and MEMS Elements”, Proceedings of Microsystems Technologies 2001, Mesago, Stuttgart, pp. 437-442, 2001.

Page 16: auto-id.ppt

vibratory Assembly

Chip Assembl

yChip Design

Label Converting

Inlet Assembly

Silicon Manufacturi

ng

Antenna Manufacturin

g

End UserLabel / Tag Manufacturi

ng

Wafer Treatment

Orientation Check

Courtesy Philips

Page 17: auto-id.ppt

vibratory assembly

Chip Assembl

yChip Design

Label Converting

Inlet Assembly

Silicon Manufacturi

ng

Antenna Manufacturin

g

End UserLabel / Tag Manufacturi

ng

Wafer Treatment

Vacuum cylinder

Courtesy Philips

Page 18: auto-id.ppt

conversion

• Paper/package/label industry expertise• Scales well with mass production• Capital equipment expenditure

software

paperhardware

Page 19: auto-id.ppt

outline

• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data• Current status

Page 20: auto-id.ppt

Architecture: Local

Reader

01.203D2A.916E8B.8719BAE03C

Tag Local database

Reader

Local network

DataProcessing

Page 21: auto-id.ppt

Architecture: Global

01.203D2A.916E8B.8719BAE03C

Reader

Local database

Reader

Local network

Local system

ONS

Internet<PML> <TIME=2000.4.28:10:05.05HRS>

<EPC= 01.203D2A.916E8B.8719BAE03C > <TEMPERATURE=15 DEG C> </EPC> </TIME></PML>

01.203D2A.916E8B.8719BAE03C ????

Quality control specialist

XQL

PML Server

18.72.100.100

18.72.100.100

PML

<PML> … … ... <MaximumTempearture> 40 DEG C </MaximumTempearture> <MinimumTemperature> 5 DEG C </MinimumTempearture></PML>

DataProcessing

Page 22: auto-id.ppt

23AB.36C2.AB21.6733

Tag

Reader

Local database

Reader

Local network

Local system

ONS

Internet<PML> <TIME=2000.4.28:10:05.05HRS>

<EPC= 01.203D2A.916E8B.8719BAE03C > <TEMPERATURE=15 DEG C> </EPC> </TIME></PML>

01.203D2A.916E8B.8719BAE03C ????

Quality control specialist

XQL

PML Server

18.72.100.100

18.72.100.100

PML

<PML> … … ... <MaximumTempearture> 40 DEG C </MaximumTempearture> <MinimumTemperature> 5 DEG C </MinimumTempearture></PML>

DataProcessing

01.203D2A.916E8B.8719BAE03C

Inference

Temperature OK

Page 23: auto-id.ppt

outline

• What and why RFID• The cost issue• Manufacturing low-cost RFID• Handling the data

• Current status

Page 24: auto-id.ppt

Status of center

ResearchRFID/routing software technology: MIT & Adelaide

Manufacturing /Control Applications: Cambridge

StandardsAir-interface between reader and tags

Software for handling/routing data

Sponsorship48 sponsors

4 continents

Page 25: auto-id.ppt

field trial

COCA COLA BOTTLERCLEVELAND, TN

JOHNSON & JOHNSONOLIVE BRANCH, TN

KRAFT FOODSFORTH WORTH, TX

GILLETTE DIST. CENTERCHICAGO IL

PILOT TEST FACILITYBENTONVILLE, AR

WAL-MART DEPOTBENTONVILLE, AR.

WAL MART STORECLEVELAND, TN

Warehouse Retail Floor Staging Area Retail Floor

SAM'S DEPOTKANSAS CITY, MO

WAL-MART STOREBROKEN ARROW, OK

SAM'S STORETULSA

P & G FACTORYCAPE GIRADEAU , MO

UNILIVER DIST. CENTERBALTIMORE, MD

P & G DCIOWA CITY, IO

Pilot facility is being used as a mini warehouse

Page 26: auto-id.ppt

outline

• RFID and the Auto-ID Center• Protocols• Security issues

Page 27: auto-id.ppt

components

• Signaling• Anti-collision• Functions

Page 28: auto-id.ppt

Things to keep in mind

• You will not read one tag: you will read many!

• Bandwidth becomes an issue

Page 29: auto-id.ppt

Line codes

Page 30: auto-id.ppt

trade-offs

Probability of error

Bandwidth

Collision detection

Page 31: auto-id.ppt

modulation

• Amplitude Shift Keying• Phase shift keying• Frequency shift keying

100%

10%

Low Time

45%

45%

Reader to Tag ModulationUHFEnvelope

Page 32: auto-id.ppt

Bandwidth

cos(c)cos(s)cos(c+ s) + cos(c- s)

2=

cc- sc+ s

Page 33: auto-id.ppt

bandwidth

                                                                                                                                                 

   

Page 34: auto-id.ppt

components

• Signaling• Anti-collision• Functions

Page 35: auto-id.ppt

anticollision

• Multiple tags in the field

• Need to be sorted• Tags relatively dumb

Page 36: auto-id.ppt

aloha protocols

State!

Page 37: auto-id.ppt

tree walking

0

00 01

000 001 010 011

1

10 11

100 101 110 111

000 001 010 011 100 101 110 111

Page 38: auto-id.ppt

Aloha vs tree-walking

Reader Tag

Symmetric

Reader Tag

Asymmetric

Aloha schemes13.56 MHz ISM

Tree schemes915 MHz ISM

Page 39: auto-id.ppt

anticollision

• The backbone function • Extract unique ID• Must leverage for any security scheme

Page 40: auto-id.ppt

components

• Signaling• Anti-collision• Functions

Page 41: auto-id.ppt

Functions

• Write address• Lock address• Pointer• Read ID (anti-collision)• Read payload• Write payload• Sleep• Wake• Destroy

One time

Page 42: auto-id.ppt

How to interpret standards

Page 43: auto-id.ppt

outline

• RFID and the Auto-ID Center• A peek at the protocol• Security issues

• Discussions with: Dan Engels, Peter Cole, Steve Weiss, Ron Rivest

Page 44: auto-id.ppt

Does protocol compromise privacy?

Not necessarily. Your choice.

You can destroy the tag and opt out

or

You can keep tag for later use

(physics is your friend)

Page 45: auto-id.ppt

mass hijack of tags

• Could happen in destroy or re-programming

• Physics our friend

Bandwidth limited: 200 tags a second anti-collision

Destroy must be individually addressed

So it takes time to kill

Surveillance

Page 46: auto-id.ppt

For the future: issues

• Tags are light-weight

• Anyone can read the tags (promiscuity)• The same number shows up all the time• Channel is open and shared

01. 203D2A. 916E8B. 8719BAE03C

Manufacturer 24 bits

Product 24 bits

Serial Number 40 bitsHeader 8 bits

Page 47: auto-id.ppt

problem: unique and promiscuous

Kill Serial number?• Product still readable• Person can be tracked by constellation

Personalize the number?• Repeated reads yield same number• You could still be tracked by constellation

Page 48: auto-id.ppt

using keys – iteration 1

• Tag, reader share a key• They challenge each other• They establish trust• The communicate

But wait:

There still needs to be a unique number for anticollision

Key management problem

Page 49: auto-id.ppt

rolling number

Temporary_number = Key{ID|nonce}

Perform anticollision on Temporary_number

Extract ID

Advantages:

Promiscuous, but who cares

Can’t track

No privacy issue

Disadvantage:

Still a key management problem

Acknowledgement: Peter Cole, Ron Rivest

Page 50: auto-id.ppt

keyless approach

lock=hash(key)

Tag knows hash and lockLock used as ID and for anticollision

Administrative functionsReader provides keyTag computes computed_lockIf computed_lock == lock,

then tag unlocked, ready for administration until new lock

Page 51: auto-id.ppt

administering the tag

Problems

Air interface always vulnerable

Grey area of ownership in retail

Solutions

Physical contact for reprogramming

Physical contact reset of memory

(Resurrected duckling, University of Cambridge)

Page 52: auto-id.ppt

conclusions

• RFID is here• As more functionality goes on RFID,

security challenges• 0.2 milli-cents per gate, cost is paramount• Minimize data on tag