Friday, December 26, 2008

5.Conclusion

Many experts see RFID as an enabler for anywhere computing the integration of computation into the environment: any device, anytime, anywhere. RFID enabled mobile phones could be a first step in this direction. The combination of mobile phones and RFID technologies promises great potential in the market for mobile telecommunication services. Field trials in some sectors and some regions of the world have recently started. However, the development of services is far from being complete. While a broad range of services can be imagined, along the lines of the scenarios detailed in section 3.1, only attractive propositions will convince customers to adopt the technology. One has to await the implementation of mobile payment systems to see whether similar systems will prove to be attractive enough to push the new technology.

Apart from the search for the killer application, a variety of technical questions still need a tremendous amount of work and study. As detailed in this paper, the standardization for RFID technologies in general (chapter 2) and for RFID-enabled mobile telecommunication services (chapter 3) in particular is unsatisfactory. Depending on one’s point of view, one can see either a lack or an excess of standards. Regardless of which of the two standpoints one adheres to, it is true to say that a lack of harmonized, globally accepted, cross-sector and interoperable standards on RFID tag data structures, network components and protocols between those components exists.


This paper presents a non-exhaustive list of topics that might be interesting for future standardization work: In order to global RFID standards for data formats, interoperability, interference problems etc., cooperation between the different standards bodies, manufacturers and users is necessary. Only approach can succeed in promoting RFID in order to ensure a widespread adoption of the technology. In order to do that, an “All-Star approach” might be considered useful. Bringing major players in RFID standardization together at one table could help to broaden the understanding of the participants. ITU’s unique combination of membership – from the private sector (service providers and manufacturers) and the world’s governments - seems to make it an obvious choice as a place for this work, particularly given the fact that RFID standardization deals with both technical and regulatory aspects. ITU’s Standardization Sector (ITU-T), would be in an ideal position to drive studies towards a common platform for various RFID applications.


RFID technology in mobile telecommunications – and RFID in general – are highly dependant on user acceptance, the user’s hearts (and wallets) can only be won if industry, researchers and policy-makers work hand-in-hand in taking-up these issues. Security and privacy issues will be decisive for the success of the technology and thus have to be addressed as a priority. This is an area where work seems to be at an early stage. Additional studies are also needed to assess the exact impact of RFID on fixed and mobile networks. It seems obvious that additional services based on the use of RFID technologies will eventually lead to increased network traffic. It still remains to be quantified how big that impact will be and how network design has to respond to this challenge. Further research is also needed on how RFID technologies can be integrated into existing and future network environments. Again, ITU-T is in an excellent position to examine how RFID services could converge for example with Next Generation Networks (NGN). At the network level, the present NGN initiative intends to give the necessary platform to support service capabilities involving RFID devices. In this context, the issue of RFID-IPv6 mapping is another important field of study, as many active RFID tags of the future will have to be integrated into communication networks, using an identifier that most probably will be or have a direct relation with an IPv6 address.

4.Advantages and Disadvantages

4.1 Advantages

· RFID technology has radio contact, due to this it is fast and automated scanning technology.
· RFID technology uniquely specify object , for this it provides pointer to database entry for every object , i.e., unique, detailed history.
· Relative freedom from regulatory limitations.
· Well suited for applications requiring small amount of data at slow speed and minimum distance.
· Penetrates material well (water, tissue, wood, aluminum )
· It has good non-line-of-sight communication.
· It can transmit large amount of data more quickly than lower frequency.

4.2 Disadvantages

· RFID more susceptible to electronic noise than lower UHF bands, e.g. 433 MHz
· Shared Spectrum with other technologies – microwave ovens, TV devices , etc.
· Must orient antennas carefully
· Sometimes Range limited (due to scaling issues/wavelengths)
· There ,some time privacy problem.
· Chip difficult to build
· Expensive

3.RFID and Mobile Telecommunication

3. RFID based Mobile Telecommunications Services
RFID based mobile telecommunication services can be defined as services that provide information on objects equipped with an RFID tag over a telecommunication network. The RFID reader is installed in a mobile device such as a cell phone. This is a fundamentally new approach compared to most existing RFID applications. There, the readers are considered stationary while the tags are considered mobile. This would now change. The implementation of RFID in mobile telecommunications services would lead to a scenario where the tags are stationary and readers (that are integrated in the cell phone) become mobile. There would also be applications where the mobile phone can be both, tag and reader at the same time.

Integrating RFID capabilities into mobile devices extends the use of RFID technology beyond the supply chain management etc. into areas like customer service, marketing or brand management. RFID based mobile telecommunications will play an important role in bridging offline objects with information accessible on data-networks. Services that use the information stored on RFID tags and communicate with peer objects will help to create an environment of “smart objects”. Mobile phones are an excellent platform for user communication with such smart objects. A first implementation of this concept already exists and will be detailed in section 3.2. The Near-Field Communications (NFC) protocol is designed for short-range communications over distances of a few centimetres. It can thus be used to implement RFID services in mobile networks. But NFC is not equal to RFID services in mobile networks, it is rather a subset of it.

Other standards for RFID-based mobile telecommunications services could still be developed. The use of RFID technologies in mobile communication undoubtedly has a promising future. A report105 published by Forrester Research three years ago already predicted that RFID will bring growth to the mobile telecom industry: "Enterprises, as well as chip makers, equipment makers, solution providers, and telcos, will all benefit," the report says.

3.1. Application scenarios
Various technical implementations for RFID in mobile telecommunications already exist. For example, Nokia has developed a first RFID-enabled cell phone in cooperation with VeriSign. The Nokia 5140 RFID Kit106, a GSM phone with RFID reading capability107 was introduced in March 2004. Another handset with RFID functions, the Nokia 3220, is to be launched this summer.108 The systems use the NFC protocol that is detailed in section 3.2. The Canadian Company Wireless Dynamic109 claims that it has developed the world’s first Secure Digital (SD) card with RFID functionalities. This card could be used to equip existing hardware such as cell phones and personal digital assistants (PDAs) in order to provide RFID functionalities. There are several application scenarios110 for the use of RFID in mobile telecommunication services:

3.1.1. Information retrieval
In this scenario, the mobile phone is equipped with an RFID-reader and aids to retrieve additional information on tagged items. The information would be stored in a database, which is accessed via the mobile network. Consumers could use this feature for example in supermarkets to obtain additional information on products, e.g. if they contain allergens etc. Comparing prices with on-line services such as Froogle111.

http://www.forrester.com/ER/Research/Report/Summary/0,1338,15084,00.html
http://www.nokia.com/nokia/0,,55738,00.html
http://press.nokia.com/PR/200411/966879_5.html

Also, be easy with an RFID-equipped mobile phone. The application scenario would also be interesting for target-groups like service technicians (to obtain additional information on items to be serviced) or machine operators (to obtain new work instructions for a particular machine). Information retrieval via RFID enabled mobile phones could also be used for advertisements. Posters or paper-copies of advertisements could carry a small RFID-tag. Anybody interested in more information on the advertised product or event would just have to hold his mobile phone close to the tag. The information would then again be retrieved from a database. The delivered information could also be multimedia-content: For example, the RFID equipped cell phone could provide a free preview of a movie when the user reads an RFID tag that is attached to the movie poster. Thus, the combination of RFID and mobile telecommunications provides an interesting new approach to brand management and special promotions that could be attractive to companies and (tech-savvy) customers alike.

3.1.2. Data transmission
Another application possibility is the transmission of data from a tagged item to a central database over the mobile network. This could be used e.g. for security guards to prove that they visited certain sites. The location and a valid timestamp would be transferred to a database as a proof that work has been done accurately. The same concept of data transmission could also be used for reading e.g. electricity meters. Service staff would read a tag attached to a meter and then automatically transfer the meter readings via the phone.
Later, the transmitted information will be used for the pricing.

3.1.3. Automated messaging
Automated messages could be generated whenever a mobile phone comes near a tag. This could be used e.g. in a system to set up an attendance control system. A single mobile phone could be used to report presence in the office, a construction site, a field office etc. Another application would be automated progress reports back to office, e.g. for service technicians. They could easily report on their work done by an automated message when they move their phone close to a tag on the serviced machine.

3.1.4. Voice services
Voice services are also an attractive field for using RFID technologies in mobile phones. One possible application in this scenario is visual phone directories. This could e.g. be used at the reception desk of companies with a display of pictures of all the persons working in the company. A mobile phone in proximity to a tag attached to the photo would then initiate a call to the respective person. This would help to simplify making phone calls for persons with physical limitations, for children, or the elderly.

3.1.5. Device integration
Mobile phones could use their RFID capabilities also to “understand” their environment and to communicate with it. Information retrieved from tags in the environment can indicate to the phone e.g. that it is being placed in a car. The phone could then activate certain functions that are only used in a car (support for hands-free etc.). This feature could also be used to block cell-phone use in certain areas, such as planes or hospitals. The RFID equipped cell phone would switch itself off when noticing such a sensitive environment. The beer-company Heineken has already run an advertisement campaign that uses barcode technology
(For details see:
http://www.h-e-l-l-o.org/ or http://www.textually.org/picturephoning/archives/007994.htm).
If RFID tags replaced these barcodes, it would be a perfect example for the presented concept.


3.1.6. Presence indication
Presence indication with RFID-enabled mobile phones would work the opposite way to the device integration that was presented in Chapter 3.1.5. In this scenario, unlike in the previous ones, the RFID equipped mobile phone does not act as a reader but carries an RFID tag. RFID equipped cell phones might thus have to be equipped with both a reader and one or multiple RFID tags. In the scenario of presence indication, the RFID tag on the phone would then enable readers in the environment to identify the phone – and respectively the person carrying it. For example, the location data of a person in a building could be used to provide automatic login to a computer systems or to customize the login to the person’s credentials.

3.1.7. Mobile payment
RFID-equipped mobile phones could also be used in payment solutions. RFID chips in the phone or on its surface could store personal information that is necessary for the payment process. In proximity of a point of sale (such as a ticketing terminal or a vending machine), a payment would be initiated upon request of the user. This type of service is already particularly popular in Asia. Note that also in this scenario, the phone is used for carrying a tag and not as a reader.

3.2 Near Field Communications (NFC)
A concept that is already used for RFID enabled mobile phones is the near-field communications (NFC) protocol. That is an ISO/IEC 14443 compatible short-range communication protocol operating over distances of a few centimeters, which uses the 13.56 MHz high-frequency range. The reader provides power to the chip in the passive RFID tag by
Inductive coupling.

Companies like Philips, Sony, Nokia, Samsung and Motorola as well as the credit card firm Visa support the technology. A report by ABI Research, published last summer, gives NFCenabled mobile phones a market share of 50 per cent by the year 2009. NFC is already standardized in various bodies like ISO/IEC (18092114, 21481), ECMA (340, 352 and 356), ETSI TS 102 190. The NFC standards outline the transport protocol and data exchange methods as well as mechanisms for data collision control during initialization, and more. NFC operates at data rates of 106 Kbits/s and 212 Kbits/s. higher transmission speeds can be achieved between dedicated NFC devices. Here up to 424 Kbits/s are foreseen with potential for higher bit rates.
NFC communication is half-duplex, i.e. devices follow a “listen before talk” policy. As the NFC Protocol supports both active and passive modes of operation, all NFC devices must support both modes. The setting that both parties can read and write data as well as transmit differs from RFID. One thing is similar though: The initiating device (the reader in terms of RFID) controls the exchange of data in an NFC environment.
Nokia, Philips and Sony founded the Near Field Communication (NFC) Forum in March 2004 to promote the use of the technology in consumer electronics, mobile devices and PCs. The Forum aims to ensure interoperability between devices and services. At the moment,

http://www.abiresearch.com/products/market_research/Near-Field_Communications_(NFC)
http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=38578&scopelist=
http://www.nfc-forum.org/home

3.3. Field tests
The following sub-section will provide some samples of how RFID technology in combination with mobile phones is already in use in various regions of the world. The list is far from being comprehensive.

3.3.1. Information retrieval
Countries like Japan are undertaking a larger number of projects on enhancing food-safety with mobile technologies. Many of these projects use RFID technologies. One particular project is the development of “Integrated Food Traceability Systems” that utilize Ubiquitous ID Technology. A field trial took place in February and March 2005 at the Mitsukoshi Department store in Nihonbashi, Tokyo (Japan) and the Kikuyu Store, Noukendai Branch, Yokohama (Japan). Customers could get information on the product history of certain pieces of tagged fruit and meat. To access that information both terminals in the store and specially equipped mobile phones could be used. Apart from that, a new information system for the fish business is currently being deployed in Japan. The company Do Como Sentsu (subsidiary of NTTDoCoMo) and the Marine Fishery Systems Association have created a tracking system for fish products. Consumers can scan the barcode with their cell phones and determine even the name of the fisherman who caught the fish, the cooperative the fisherman belongs to and where the operations were conducted. In Korea, a beef tracking and data system by which consumers can obtain information on their steaks (about its origin etc.) is being set-up by the Carrier KTF.
In Japan, some location-based services with RFID equipped mobile devices are being tested. RFID tags are placed in public venues; pedestrians may then use handheld devices to obtain additional information on their surroundings. A pilot project was set-up in Tokyo’s Asakusa district and ran from 12 April to 31 May 2005.123 RFID and infrared technologies were combined in the project. Around 80 locations were equipped with tags. A mobile device used in the proximity of a tag could be used to display information in the form of text, photographs or moving images. Information was available in English, Chinese, Korean and Japanese.

http://www.wirelessnetdesignline.com/news/53700206
http://www.t-engine.org/news/pdf/TEP050202-u01e.pdf
http://www.engadget.com/entry/7202187107686387/

3.3.2. Mobile payment
Mobile payment with specially enabled phones is already quite popular in some regions of the world, namely in Asia. Different technical approaches are in use. In Japan NTT Do Como has sold far more than one million cell phones with mobile payment functionalities. Various handsets of these so called ”wallet phones“ are available. As of November 2004, these handsets can be used at 13,000 shops and 2,700 vending machines. NTT Do Como hopes to sell 10 million of these handsets by the end of March 2006.127 Other Japanese operators have announced plans to offer RFID-enabled handsets in the near future.

Japan's largest train company, East Japan Railway Company (JR East), has announced that it will implement a payment solution that would enable mobile phone users to conduct all ticket-related transactions such as reservations, purchases and fare collection. The project is called ”Mobile Suica” and should be launched in January 2006. Major mobile phone carriers — NTT Do Como Inc., KDDI Corp. and Vodafone Inc. — are expected to support the service. The handsets use Sony’s Felica129 NFC technology that is compatible with ISO 14443A.

Journey through Existing Procedures and Standardization Initiatives“ by Stamatis Karnouskos published in: IEEE
http://www.comsoc.org/livepubs/surveys/public/2004/oct/KARNOUSKOS.html)
http://www.nttdocomo.com/presscenter/pressreleases/press/pressrelease.html?param%5Bno%5D
http://ubiks.net/local/blog/jmt/archives3/003058.html
http://www.smartcardalliance.org/

2.Rfid and Standardization

2.1 Some Key Players
oUN specialized agencies : ICAO, ITU, UPU
o Global and regional standards developing organizations (SDOs) : ISO, ETSI
o Private forums : EPCglobal
o State driven initiatives

1.Intoduction

1.1. What is RFID?
Entering the search-term “RFID” into Google web-search produces more than 14.4 million results. In the public sphere, the abbreviation has been around for some time, but what is this Radio frequency identification (RFID) all about? In a few words, it is a method of remotely storing and/or retrieving data from small objects, so-called RFID tags. These tags contain antennae to receive and respond to queries from an RFID reader. A typical RFID system consists of two main components, tags and readers.

1.2. Old technology, new implications
Although it has become popular only in recent years, the concept of RFID is not new. It was used in the Second World War to distinguish enemy planes from friendly ones and as earl as 1948 a research paper on "Communication by Means of Reflected Power" was published. As the components for RFID-systems - tags and readers - have become smaller and cheaper, the technology has begun to take-off, in a variety of different areas.

1.3. How RFID works ?
An RFID system consists of two main components, tags and readers. A tag (also called transponder or transceiver) is a small device equipped with a microchip carrying data and an antenna. There are two types of tags; active and passive. Passive tags require no power and are much more common. Incoming radio waves induce an electrical current in the antenna, just strong enough to feed the tag’s circuit and send out a response.

Due to constraints in the on-board power supply, passive tags have a relatively short range of operation (from about 10 mm up to about 5 meters, but typically a few centimeters) and can only transmit a limited amount of information. Yet, the lack of a power supply gives passive tags their unique and main selling point, that they can be very small. One of the smallest passive RIFD chips, Hitachi’s "μ-chip"5, is only 0.4mm x 0.4mm in size and barely visible with the naked eye. It contains a unique 128-bit number that is written onto the chip during the manufacturing process and cannot be changed.
Active tags function the same way as their passive counterparts, except that they have their own power source and thus longer ranges (dozens of meters) and more memory. Because of this power source, active tags today are bigger and more expensive. Becoming smaller and cheaper, they might be the choice of the future.

For example, a new generation of active tags called "Dice" was presented by YRP Ubiquitous Networking Labs in April 2005. They are about 15mm x 15mm x 15mm and according to the manufacturer, the battery will last for 2 years and 3 months if the tag communicates every 5 minutes. If manufactured in volume, the price of a "Dice" tag will might be at the “lower end of several dollars".

A reader communicates with a tag in order to capture the data stored in the tag. The reader usually sends a low-power radio signal to activate the tag and the tag then sends data back to the reader. Most readers are – as their name suggests – only capable of reading data, although some also have the capability to write to certain tags. Normally, readers forward the data to other systems (such as PCs) for subsequent processing. In comparison to tags, readers consume more power, are larger - and more expensive.

RFID systems use radio-signals to communicate, but only certain frequency bands are available for license-free use. There is international variation in the frequencies and power levels available for RFID systems. Due to different national regulations, an RFID system produced in one country may not work in another country.

Four different kinds of frequencies are currently used: Low frequency (125 to 134 kHz), High frequency (13.56 MHz), Ultra High Frequency (868 to 956 MHz), and Microwaves (2.45 GHz). The main differences are in the Ultra High Frequency band, where for example the EU (865-868 MHz, 869.4-869.65 MHz), the USA (902-928 MHz), Korea (908.5-914 MHz), Australia (918-926 MHz) and Japan (950-956 MHz) use different frequencies and the power limits

In RFID, how working is done? That’s question is always arrive. In below , there are block diagram of working of RFID.

In figure, we show the Reader is the middle layer . It communicate with both tag and API. Reder send signal to tag. Tag transmit the data to reader then this data is send to Device ex.personal computer , by the reader and then API working as particular application.



1.4. Current RFID applications
Implementations of RFID technologies have seen a boom in recent years. Many parts of industry are using these technologies to some extent. Naming particular applications of RFID technology would thus lead to a very long list – without being close to comprehensive. Therefore, only some sectors are named below, the footnotes provide further information on applications in the particular field

• Transport and logistics: toll management, tracking of goods, etc.

• Security and access control: tracking people (students etc.), controlling access to restricted areas.

• Supply chain management: item tagging, theft-prevention, etc.

• Medical and pharmaceutical applications: identification and location of staff and patients, asset tracking, protection for drugs, etc.

• Manufacturing and processing: streamlining assembly line processes, etc.

• Agriculture: tracking of animals, quality control, etc.

• Public sector: passports, driver’s licenses, counterfeit, protection for bank notes, library systems.

• Sports and leisure: tracking runners, automated payment for ski lifts, ticketing, etc.

• Shopping: facilitating checkout procedures, etc