16
Infrastructure for RFID ILT Vikram Shankar, Jeff Pettinato Intel Corporation ILT Workshop Smart Labels USA February 21, 2008

Vikram Shankar, Jeff Pettinato Intel Corporation

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Infrastructurefor RFID ILT

Vikram Shankar, Jeff PettinatoIntel Corporation

ILT WorkshopSmart Labels USAFebruary 21, 2008

2

Presentation OutlinePresentation Outline

• Situation Analysis– Infrastructure Areas of Interest– Infrastructure Attributes of Interest

• Security• Areas to address for promoting RFID usage• Emerging trends• Recommendations• Discussion

3

Infrastructure Areas of InterestInfrastructure Areas of Interest

Applications/databases to process combination of RFID/non-RFID information.

Enables delivery of relevant data from thereaders to the data analytics system.

Combination of readers, antennas, tags, PLCs, and data networking gear.

Enables timely and secure sharing ofinformation with business partners1

32

4

4

Infrastructure Attributes of InterestInfrastructure Attributes of Interest1. Ease of installation and maintenanceRemote configuration of devices, antenna set up

5. Exception detection and resolutionRobustness to missing or incorrect datadue to non-reads and extended reads

2. Task executionComplexity of tasks that canbe executed automatically

4. Modularity & StandardizationAbility to mix and match features andcapabilities to an organization’s needs

3. SecuritySkimming, dataintegrity,vulnerability toviruses andworms

5

Security is a key focus area for RFID SystemsSecurity is a key focus area for RFID Systems

• Security issues are similar to most other IT deployments, but:– Greater amount of data shared provides more opportunity for mischief– Over-the-air communication with minimal encryption provides fairly easy

access to a larger system

• Security Focus Areas:– RFID Hardware:

• Over the air communication is susceptible to snooping and jamming• Limited computing capability of tags supports only minimal encryption

– Reader-Middleware Communication: Similar to IT– Middleware-Data Analytics Communication: Similar to IT– B2B Communication:

• Greater exposure to threats such as viruses and worms• Impact to operations when partner organizations’ networks are breached

… but security issues are similar to most other IT deployments!

6

Critical Technology NeedsCritical Technology Needs

Easier ways to deploy and manage theRFID infrastructure

• Should not need highly specialized worker• Automatic health monitoring

Security• Reduce vulnerability to attacks• Reduce impact of infrastructure outages at partner organizations

Inter-company data exchange• Better compatibility through

standards• Out-of-the-box solutions for fast and

low cost deployment

7

Emerging TrendsEmerging TrendsOpen Source software development efforts* Lower cost due to reusable libraries and typically less restricting licensing* Quicker time-to-market, again because of reuse* More secure and robust due to a larger community of developers and testers

Cost of deployingreaders expected toreduce* Integrated circuits willreplace discrete components* Smaller readers with lowerspace requirements(installation issues)

Wider use of multi-protocol readers* Global supply chain

Emerging Trends are in the Right Direction andwill accelerate RFID adoption

Importance of middleware expected to reduce* Enterprise applications assume some functionality* Readers become smarter

8

Near Term Recommendations (2008 Near Term Recommendations (2008 –– 12) 12)

•Enable a portfolioof open sourcesoftware closelylinked to standards.

•Participate in testbeds to validateboth standards andsoftware

Fund test beds•Identify and helpcloseimplementationgaps

•Validate opensource ROI and

deploy in products

Provide test beds tovalidate opensource

Enableinteroperability ofproducts byharmonizingstandards across allgeographies

N/A•Adopt standards inproducts

•Develop multi-protocol readers

Validate and helprefine Standardsbased on lessonslearned

Adoption ofstandards

Consolidate projects and realign talent andeffort to bring projects to fruition faster

Availabilityof opensourcesoftware andmiddleware

Standards BodiesFunding Agencies

(NSF, MITI, 5thFramework, etc.)

IndustryUniversity &

ResearchConsortia

Recommended ActionNear Term

Need(2008-12)

Using Industry Standards and Open Source Are Critical toAccelerating RFID Cost Reduction and Adoption Rates

9

Long Term Recommendations (2012+)Long Term Recommendations (2012+)

Deliver standard,easy-to-use andconfigurablesolutions; Adoptglobal standards

Train RFID-savvystudents for bothengineering andadvanced research

Tailor standards to lowcost price points byintelligently reducingrequirements

Fund centers ofexcellence toenable the iNEMIILT roadmap

•Participate in CoE•Commercialize andproduce low cost ILTtechnologies

•Create Centers ofExcellence (CoE)•Develop lowcomplexity/cost en-cryption algorithms

Low costtechnologysolutions forILT

Encouragetechnologies that willuse “white space”frequencies

Fund centers ofexcellence toenable the iNEMIILT roadmap

Develop antennasthat can beconfigured on-the-flyfor any of a broadrange of frequencies

Create Centers ofExcellence (CoE)for tunableantennas

Tunableantennas

University &ResearchConsortia

Encourage plug-and-play philosophy andbuild into thestandards

N/A

Databases and business applications thatare tolerant of incomplete or incorrect data

Deploymentcomplexity

Standards BodiesFundingAgenciesIndustry

Recommended ActionLong Term

Needs(2012+):

There is a Huge Opportunity for Consortia and Universities to DoHighly Applicable Research and Create “Centers of Excellence”

10

DiscussionDiscussion

For comments and feedback please email:[email protected]

[email protected]

11

BackupBackup

12

Infrastructure Technology Needs (1)Infrastructure Technology Needs (1)

Plug and playRFID devices

Dynamic quick-change informationsystems

Autonomicinfrastructuremanagement andfailure recovery

Attributes

Humaninterfaces forset-up andmaintenancemade easyenough forregular IT staff

Databases andinformationsystems todetect missing orincorrect dataand to takecorrective action

Centralizedequipmentfailure predictionand preemptivemaintenance

Attributes

Automaticchannel statecomprehension

Read range self-configurationbased on inputcriteria

Requires highlytrained RFIDprofessionals

Infrastructure set-up

Technologiesthat enable easyand rapidprocess changeswithout the needfor extensivesoftwarereimplementation

Data analysis andoutlier recognitionalgorithms

Conduit for datacollection andexchange

Infrastructure featuresandcapability

Self-awaredevices andinfrastructure

Equipmentperformance andhealth analyticsFailure predictionalgorithms

Remote device-by-devicediagnostics andlimitedreconfiguration

Infrastructure HealthMonitoring

Tech. NeedsTech. NeedsAttributesFeaturesLong-Term (2017)Mid-term (2012)State of the Art

13

Infrastructure Technology Needs (2)Infrastructure Technology Needs (2)

Globalinformationexchangestandards

Out-of-the-boxcompatibilitybetween partnersin the entiresupply chain

informationexchangestandards

Compatibilitybetweenimmediatetrade partners

Limited or case-by-casecompatibility

Inter-companyDataexchangeandcompatibility

Inferenceengines toaggregateshared data tocheck ifinformation canbe inferred fromshared data

Prevent breach ofsecurity andprivacy throughinference

Open,standardizedmechanismsthat do notdepend onalgorithmsecrecy

More securetag-readercomm. (whenneeded)Openencryptionalgorithms formulti-vendorcompatibility

Proprietaryencryptionalgorithms fortag-readercommunica-tionthat depend onsecrecy ofalgorithm

SecurityAttributesAttributes Tech. NeedsTech. NeedsAttributesFeatures

Long-Term (2017)Mid-term (2012)State of the Art

14

Open Source EffortsOpen Source Efforts

1. RadioActive Foundation is currently working on three projects: Neutrino, Fusion, andGraviton. Fusion is a middleware that gathers data from tags and readers and delivers thatdata to enterprise information systems; Neutrino is a software suite that enables the exchangeof EPC data between business partners; and Graviton is a simulator for RFID hardware fromvarious manufacturers.

2. LogicAlloy is developing a middleware that implements the Application Level Events (ALE)interface. ALE is an interface standard from EPC Global that provides a layer of abstractionbetween the data providers such as RFID readers and the data subscribers such asenterprise information systems (e.g. Warehouse Management software).

3. FirstOpen is developing a middleware called Singularity Middleware and is also working onEPC-IS.

4. Pramari is developing a reader emulator called Rifidi. The emulator will enable rapiddevelopment of RFID applications by allowing developers to test their applications againstemulated scenarios and hardware rather than real hardware.

5. The University of Arkansas is developing a middleware called TagCentric that collects datafrom a network of RFID readers and sends to a database.

6. Open Source Innovation has received a grant from the UK government to develop opensource RFID solutions.

7. Several RFID vendors have joined together to develop the LLRP Toolkit – a set of opensource libraries for the implementation of the Low Level Reader Protocol based applications.

8. Accada is a rapid prototyping platform that implements the EPC Network specifications.

15

Open Source NeedsOpen Source Needs

Short term (1-3 years)Development andimplementation ofmicrowave air interfaceprotocols

Lack of standards for2.4 GHz and 5.8 GHz

Tag protocols

Short to medium term(1-5 years)

Software must beimproved to meetproduction graderequirements ofreliability, maintain-ability and security

Lack of open sourceproduction-readybusiness logic software

Business-to-businessinformation exchange

Short to medium term(1-5 years)

•Discovery services•Object naming services•Pedigree

EPC architecture

TimelineDevelopment NeedsGaps

16

Information Technology NeedsInformation Technology Needs

• Data Filtering• Data Mining• Exception Detection and Resolution• Task Execution• Modularity• Disconnected Operation