09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

provide with a good authorized blocking. And can the Blocking envelope can be<br />

controllable.<br />

Blocking Reader can be strapped to a person and provide personal privacy<br />

for all his Tags. From laboratory experiments I have concluded that it can create<br />

an secure envelope of about 1m around the person called blocking envelope. This<br />

envelope successively blocks any unauthorized Readers trying to read the persons<br />

Tags.<br />

I conclude that the Blocking Reader is a Low cost device. With cheap hardware<br />

privacy of the RFID systems can be preserved. Also in doing this research we have<br />

noticed a potential for using this hardware design for making a full blown Ultra-Low<br />

Cost Readers. Hence reducing the cost of a Reader by a factor of 10.<br />

The concept used here is foolproof. It can easily be used by any RFID systems<br />

as it uses the same protocol used by the respective systems. All RFID systems uses<br />

inventory round for accessing the TID of the Tag. Hence implementing this concept<br />

in inventory round will ensure privacy of other systems also.<br />

9.2 Future Work<br />

The Blocking Reader concept can be used for other RFID systems where the<br />

protocol has a inventory round. The Blocking Reader Architecture can be used for<br />

designing a Ultra-Low Cost UHf RFID Readers. The concept can be implemented<br />

on the Tags to make a Tag emulator. A tag emulator emulates the Tags. So if<br />

unauthorized Readers trying to access the Tags, Tag emulator will respond instead<br />

of the Tag, hence blocking. Like blocker tag we can call it passive blocker reader. If<br />

we use this concept on Tag creating a Blocking Reader Tag we can further reduce the<br />

cost to few cents. Here a strong wide band Tag is implemented with Blocking Reader<br />

protocol. When an unauthorized Reader tries to communicate with your Tag, you will<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!