23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Radio Frequency Identification 8-21<br />

a private company could be trusted to protect our personal records from illegal use, when we cannot<br />

entrust the government with it. It is also argued that a mobile phone is different because we could return<br />

to anonymity by turning our mobile phones off. Similarly, we need to carry our e-ID if and only if we<br />

want to enter some controlled areas; otherwise it could be safely kept at home. After entry, we could keep<br />

our privacy by hiding the e-ID in a metallic bag, such as a bag for potato chips.<br />

Concern about the loss of privacy goes hand-in-hand with the development of the AIDC from the<br />

issuance of the first EPC bar code. Today, a personal trail could be tracked via one’s use of the credit card,<br />

the vicinity card, the prepaid card, the electronic key, the electronic ticket, the mobile phone, the iPod,<br />

the iPhone, the fixed-line or the wireless network connection, the e-ID, and the e-passport. The RFID is<br />

simply another variation of the same theme. The association of a product brought with a buyer may leave<br />

a faint trace of the whereabouts of the person involved, but it is certainly not a reliable one. However, it<br />

may be the last cue for locating a missing person for rescue. From the technical point of view, the assured<br />

benefits obtained from having a long-range hands-free ID outweigh the potential loss of privacy in absolute<br />

terms [22]. At least, it is a view of an old-fashioned Asian living in a conservative Asian country.<br />

8.29 recent Developments<br />

At the present stage of development, there exist many compatible and incompatible protocols in the<br />

market. To better understand the subsequent discussions, the ISO 18000-6C, an air interface for RFID<br />

at 860–960.MHz, is used as an illustration.<br />

As usual, the memory of an RFID tag is divided into many fields. In addition to the 8 bit header and<br />

the 36 bit serial number, rooms have been reserved for the company (28 bit) and the object class of the<br />

tag (24 bit). With the ever-increasing popularity of the RFID, the memory has been expanded from 64<br />

to 96 bit as illustrated in Table 8.3. For the EPCglobal Class 1 Generation 2 (Gen 2) tag, a 32 bit error<br />

correction was augmented to the 96 bit standard and a kill command was added.<br />

The memory of Gen 2 was later amended to 256 bit [23]. The extra space of 128 bit is undefined, a room<br />

reserved for any nation to define special commands to be used within its jurisdiction for catering to its<br />

specific needs due to its unique cultural heritage, religious background, and level of <strong>industrial</strong>ization.<br />

Nowadays, the trend of development is to further expand the memory while keeping the Gen 2 data<br />

structure intact. Together with a 48 bit overhead, a 304 bit EPC bank is created. It is very likely that the<br />

EPC bank would be used as a common platform for multisystem and multistandard operations. In addition<br />

to the serial number in Gen 2, a bank of 64 bit is added on top of the EPC bank for a unique identification<br />

of the tag (TID) according to the ISO 15963 recommendations. To distinguish this TID from<br />

the ID found in the EPC bank, they are called ISO-TID and EPC-TID, respectively. To address diverse<br />

national needs, an extra 64 bit is included for storage of four passwords for accessing special commands<br />

and the “kill” commands as shown in Table 8.4.<br />

Compared with the 32 bit EPC-TID in the 36 bit serial number, 42 bit in the TID bank are reserved<br />

for the ISO-TID. Hence, the maximum number of identifications has been increased from 4.295 × 10 9 to<br />

4.398 × 10 12 . Assuming that one trillion tags will be consumed annually, the ISO-TID alone could last<br />

for several years. However, if it is used in conjunction with the EPC-TID, the tag could be used almost<br />

indefinitely.<br />

The “kill” command in Gen 2 is a noteworthy new feature that warrants in-depth discussion. This<br />

command enables any operator to disable any tag permanently. It was perhaps created for lessening our<br />

worry on the loss of privacy as it dissociates a product from its new owner. In doing so, it could also<br />

relieve the projected traffic congestion due to the simultaneous arrival of many tags.<br />

TABLE 8.3<br />

Header<br />

8 Bit<br />

The 96 bit EPC Bank<br />

Manager Number<br />

28 Bit<br />

Object Class<br />

24 Bit<br />

Serial Number<br />

36 Bit<br />

A 0 0 1 F B A 3 2 E F 9 7 0 7 3 4 5 A 3 5 1 B E<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!