The last inch is the hardest. wireless technologies of the «last inch».

The last inch is the hardest. wireless technologies of the “last inch”..

The last inch is the hardest. wireless technologies of the “last inch”.

UKOV Vyacheslav Sergeevich, Candidate of Technical Sciences
PONOMAREV Andrey Alekseevich

THE LAST INCH IS THE MOST DIFFICULT
WIRELESS TECHNOLOGIES OF THE “LAST INCH”  

The problem of the so-called “last mile” in information transmission systems has long attracted the attention of specialists: how to reliably deliver information to the user at the last, usually most difficult stage of delivery. With the active development of information technologies, with the avalanche-like expansion of the range of peripheral devices, taking into account security, this problem has become even more acute and has already grown into a problem of the “last inch”.The article analyzes the current capabilities and development prospects of technologies that provide a solution to this problem.

With their unique capabilities, wireless communication technologies are increasingly conquering the world, making it more mobile and active. Fig. 1 shows a classification of existing and promising wireless communication technologies that provide a solution to the problem of the last inch.”


Fig. 1. Classification of wireless communication technologies

Below are the results of a detailed analysis of wireless communication technologies that provide the greatest solution to the “last inch” problem.

IR technology

This technology is probably one of the “oldest” wireless technologies of the “last inch” and the most developed at the present time. It has found wide application for operational wireless communication between office computers, in remote controls of household appliances (TVs, music centers, air conditioners), etc. Today it is actively used for communication of digital cameras and mobile radio telephones with a computer and for a number of other applications.

IR technology enables wireless communication in the infrared (IR) range between devices located several meters away. Infrared communication – IR (InfraRed) Connection – is safe for health, does not interfere in the radio frequency range and ensures confidentiality of transmission. Currently, there are infrared systems of low (up to 115.2 kbps), medium (1.152 Mbps) and high (4 Mbps) speed. Low-speed systems are used to exchange short messages, high-speed systems are used to exchange files between computers, connect to a computer network, output to a printer, projection device, etc. Higher exchange rates are expected in the near future, which will allow the transmission of “live video”.

To ensure compatibility of equipment from different manufacturers, the IrDA (Infrared Data Association) association of developers of infrared data transmission systems was created in 1993. Currently, the IrDA 1.1 standard is in effect, along with which there are still proprietary systems from Hewlett Packard (HP-SIR) and Sharp (ASK IR).

The emitter for IR communication is a light-emitting diode with a peak spectral power characteristic at a wavelength of 880 nm. This light-emitting diode produces a cone of effective radiation with an angle of about 30 degrees during transmission. PIN diodes are used as receivers, effectively receiving IR rays in a cone of 15 degrees. The IrDA specification provides a bit error rate of no more than 10-9 at a range of up to 1 m and daylight (illumination — up to 10 klux). Binary modulation and various coding schemes are used to transmit signals.

The software allows you to establish a connection to a local network (to access the Internet, use network resources), print data, synchronize data from a PDA, mobile phone and desktop computer, upload captured images from a camera to a computer and perform a number of other useful actions without worrying about cable management.

Bluetooth wireless technology

Bluetooth technology is designed to provide universal network connectivity for:

  • organization of data and voice transmission channels;
  • replacement of cable connections;
  • widespread use of compact and inexpensive network adapters built into all kinds of communication equipment, computers and household appliances.

The intensive development of Bluetooth technology is expressed by equipping various devices with a Bluetooth interface. This process is also stimulated by the fact that Bluetooth is recognized as a new standard for wireless communication, as well as the involvement of new companies in the Bluetooth SIG initiative group, which are beginning to develop and release products using Bluetooth technology.

Bluetooth technology is defined by the following key parameters:

  • frequency range – 2.44 GHz – this is the ISM band – industrial, scientific and medical applications (ISM – industry, science, medicine);
  • FHSS – frequency hopping spread spectrum, where the radio transmitter transmits a signal by hopping from one operating frequency to another using a pseudo-random algorithm;
  • time division duplex (TDD), which provides full-duplex transmission of information;
  • support for isochronous and asynchronous information services, which ensures easy integration with TCP/IP, while slots (time intervals) are deployed for synchronous packets, and each packet is transmitted on its own radio frequency;
  • The topology of the local radio network is organized according to the principle of multiple piconets interacting with each other via a standard radio channel, where the piconet always includes one master station that synchronizes traffic in the piconet.

The areas of application of Bluetooth include almost all areas of action: radio telephones and pagers, modems, local network adapters, desktop computers, laptops, hand-held computers and much more. Bluetooth provides radio communication within 10m/100m and does not require direct visibility of the signal source and the subscriber.

Advantages of the technology:

  • uses unlicensed ISM frequency range;
  • ease of use;
  • ability to replace any cables;
  • galvanic isolation of connections;
  • ability to connect mobile computers to other mobile devices;
  • automatic configuration “plug and play”;
  • support for voice and data transmission;
  • ability to create scalable microgrids;
  • resistance to interference, which is ensured by transmitting signals using the Frequency Hopping Spread Spectrum method;
  • small dimensions and ease of integration;
  • low power consumption compared to the devices used;
  • use worldwide;
  • open standard;
  • the ability to work with different devices;
  • reliability and resistance to external influences.

The main features and technical characteristics of Bluetooth are presented in table 1.

Table 1. Key Features and Specifications of Bluetooth Technology

Characteristics Parameter Values
Range, m Up to 10/100
Technical Data Transfer Rate, Mbit/s Up to 4
Maximum data transfer in synchronous mode, kbps Up to 432.6
Maximum data transfer rate in asymmetric mode 57.6 K – 723.3 kbps
Protocol Combination of switched/packet modes
Maximum piconet population 8
Radio frequency, GHz (in ISM band) 2.4
Frequency Usage Frequency Hopping System
Number of Sub-Frequencies 79
Number of Frequency Hops per Second 1600
Maximum Output Power, dB 20
Output Power Classes 1, 2 , 3
Power distribution by classes, dB Class 1: 0…20
Class 2: -6…+ 4
Class 3: 0
Frequency deviation, kHz ±140…175
Standby By Mode Listen Rate Every 1.28 s
Connection security — Authentication
— Crypto protection with a key length from 8 to 128 bits
— Using Application Programs

Bluetooth is the name given to the new IEEE 802.15.1 standard of modern wireless technology that uses radio waves to transmit data over short distances and replaces cables for connecting mobile and/or fixed electronic devices. This standard allows almost any device to be connected to each other with minimal user intervention: mobile phones, laptops, printers, digital cameras, and even refrigerators, microwave ovens, and air conditioners. The technology also offers home appliances and portable devices wireless access to various types of networks, including: LAN, PSTN, cellular networks of mobile phones, and the Internet.

The use of Bluetooth technology creates a wide range of new services, among which we highlight the following:

  • automatic synchronization of computers and mobile phones (for example, as soon as new data is entered into the address book on a laptop, the corresponding entries on a desktop computer are automatically modified, and vice versa);
  • automatic backup synchronization, which ensures automatic transfer of information from one PC via a mobile phone to another PC;
  • connection of all peripheral devices to each other, which ensures wireless connection of a PC with a printer, scanner and local area network;
  • prompt creation of electronic messages using a portable PC and their immediate sending using a mobile phone;
  • wireless communication of the “hands free” car kit with a mobile phone in a hidden state, which allows the “hands free” not only to connect to it, but also to perform voice control of the phone (switching on/off, dialing, etc.);
  • wireless transmission of photos and video clips via a mobile phone with the ability to add the necessary comments using the keyboard on the phone or laptop before sending them to the recipient;
  • connecting several subscribers for the prompt exchange of information;
  • using a laptop to access the Internet regardless of the type of connection — via a mobile phone, modem or local network;
  • using a laptop as a speakerphone (by connecting a wireless headset to a laptop, you can use it anywhere).

Technologies of local wireless networks

The IEEE 802.11a/b/g (Wireless LAN) standards describe the interaction of devices at the physical and transport levels for building local wireless networks, such as home, intra-office, warehouse, industrial, and public wireless networks. The main features of these standards are:

  • random access to the medium (devices do not have priority for data transmission, but struggle for the channel is used, while the bandwidth for the station is usually determined by the conditions of radio visibility and the workload of the access point by other subscribers);
  • weak security (the implemented authentication, authorization and cryptographic protection mechanisms are optional and rather weak).

The WEP (Wired Equivalent Privacy) algorithm described by the 802.11 standard is used for encryption. In this case, encryption is used with a 40-bit static key using the RC-4 algorithm.

The process of authentication of the station is as follows. In response to a broadcast request from a subscriber device, the access point sends a piece of a well-known poem. The subscriber to whom the text was addressed (it is distributed in unencrypted form on the air) encrypts it with his key and sends it back to the access point, which, having encrypted the same text with its own key, compares them. Based on the coincidence of the encrypted texts, the access point makes a decision on authentication (to open access to the local network for the subscriber, or to reject it).

Thus, two sources of possible vulnerability can be identified: interception of traffic and sending a probe into the network. It is known a priori that the keys are static and their length can be calculated from the packet size. Sending a probe, for example, ICMP packets of known length and known content via the Internet, directed to the subscriber station, and intercepting it on the radio, already encrypted, it is enough to simply determine the encryption sequence.

Indeed, for packet self-synchronization, the initialization vector (IV) increases by one on each packet and is reset to zero on each device restart. In this case, the repeatability of the IV — coding sequence combination is achieved already on numbers of about 16,000, which can happen quite quickly under conditions of sufficiently intense traffic. Next, the key that encrypts the data for transmission is determined. From this we can conclude that if encryption is not performed at levels above the transport level and using other technologies, then all subsequent data can be intercepted and decrypted. Therefore, to ensure a modern level of security in local wireless networks, it is necessary to encrypt data at higher levels (network and above) using various standard methods, for example, VPN, etc.

Broadband wireless access technologies

The IEEE 802.16 broadband fixed wireless access standard is one of the most promising. It is currently gaining popularity in discussions of the prospects for the development of wireless telecommunications, although its name has not yet been established and in discussions it usually appears as Wi-MAX, Wi-MAN, etc. The main idea of ​​the standard is the use of wireless technologies to build operator city-scale networks, and the main task to be solved is to ensure the security of the transmitted information. Let us briefly consider how security is ensured in the specified standard.

The main difference of this wireless network is that the base station (BS) is a modular design in which several modules with their own types of interfaces can be installed, but at the same time, administrative software for network management is always supported.

The subscriber kit (SK) is a device that has a serial number, address, and digital signature (standard X.509), while the validity period of the digital signature of the SK is 10 years. It is important to note that according to the standard, none of the parameters should be changed.

After the AK is installed at the client and power is supplied, the AK is authorized at the base station using a certain radio signal frequency, after which the BS, using the above identification data, transmits a configuration file to the subscriber via the TFTR protocol. This file contains the necessary information about the sub-range for receiving and transmitting data, the type of traffic, the available band, the schedule for sending keys for encrypting traffic, and other information. The configuration file is created automatically after the system administrator enters the AK into the subscriber database with the assignment of certain access parameters.

After the configuration procedure is completed, the AK is authenticated at the base station as follows:

  • The AC sends an authorization request, which contains an X.509 certificate, a description of the supported encryption methods, and the necessary additional information;
  • The BS sends a response to the authorization request, which contains an authentication key encrypted with the subscriber's public key, a 4-bit key for determining the sequence necessary to determine the next authorization key, and the key's lifetime.

After a period of time determined by the system administrator, re-authorization and authentication occur and, if they are successful, the data flow is not interrupted.

It is necessary to dwell in more detail on the key information. According to the IEEE 802.16 standard, several keys are used in a communication session:

  • АК (Authorization key) — the key used to authorize the АК at the base station;
  • TEK (Traffic Encription Key) — the key used for cryptographic protection of traffic;
  • KEK(Key Encryption Key) – a key used for cryptographic protection of keys transmitted over the air.

These keys are used in the PKM (Privacy Key Management) algorithm. Another feature of this standard is that, to ensure uninterrupted operation in an environment with packet loss, two keys with overlapping lifetimes are used at any given time.

Thus, the use of a large number of sufficiently long dynamically changing keys, as well as the establishment of secure connections using a digital signature, ensure the specified security of transmitted information in wireless broadband networks.

Wireless telephony technologies

DECT standard(Digital European Cordless Telecommunications) for wireless telephony was introduced in 1992 by the European Telecommunications Standards Institute (ETSI). In the same year, the European standard for the DECT radio interface (ETS 300 175) was adopted. In 1993, several large corporations in the telecommunications industry (Ericsson, Siemens, Olivetti) introduced the first wireless communication and data transmission systems based on the DECT standard. After DECT was approved in many countries outside Europe, the standard changed its name to Digital Enhanced Cordless Telecommunications. CEPT (Conference of European Postal and Telecommunications Administrations), in accordance with EEC Directive 91/287/EEC, prescribes the allocation of the 1880-1900 MHz frequency band for DECT. Currently, there are several international standards for wireless telephony systems: CT0, CT1, CT2, PHS, PACS, PWT, DECT and others.

Standards CT0, CT1 are analog standards with limited capabilities and a number of serious drawbacks: call blocking, mutual interference of systems, impossibility of ensuring the secrecy of information transfer. These standards are not used in modern cordless communication systems. The first digital standard of cordless communication CT2 turned out to be a good radio technology, providing high quality of speech transmission and using dynamic channel allocation (DCA). But it does not have the ability to transmit data and flexibly change the frequency band, as is done in DECT.

In North America, the Personal Wireless Telecommunications (PWT) and Personal Wireless Telecommunications Enhanced (PWT-E) standards of the Telecommunications Industry Association (TIA) are used to provide personal mobile radio access, providing the same basic services as DECT. Using a similar communication scheme, they work with different types of modulation and frequency planning. These standards may be widespread in some Latin American countries. PWT operates in the unlicensed 1910-1920 MHz band in the USA, PWT/E is an extension of the licensed 1850-1910 and 1930-1990 MHz bands. PWT and PWT-E use the basic structure of DECT, so they coexist in the same spectrum band.

The American PACS (Personal Access Communications System) differs from DECT not only in its dedicated frequency range, but also in the need for frequency planning, frequency duplexing of the receiving and transmitting channels, and time division multiplexing. In Europe, PACS and PWT systems are practically not used.

Since the PHS (Personel Handyphone System) standard was created in Japan, it is poorly developed in European countries and is mainly used in the Asian region. Today, more than 50 companies in various countries around the world are involved in the production of DECT equipment in one way or another. Table 2 presents some comparative characteristics of the DECT, PHS, and PACS standards.

Table 2. Comparative characteristics of the DECT, PHS, and PACS standards

System parameter DECT PHS PACS
Distribution region Europe, Asia Japan, Asia USA, Canada
Operating frequency range, MHz 1880 – 1900 1895 – 1918 1850 – 1910/1930 – 1990
Frequency channel spacing, kHz 1728 300 300
Access scheme TDMA/TDD TDMA/TDD TDMA/FDD
Number of channels per carrier frequency (time slots) 12 4 8
Data transfer rate in radio channel, kbit/s 115.2 384 384
Power of the remote control unit (mW) 10 10 200
Communication range, m 50 – 300 50 – 150 300 – 500
Communication security Authentication, encryption Authentication, encryption Authentication, encryption
Start of operation 1996 1995 1997
Mobility, km/h Up to 20 Up to 70 Up to 70

From the very beginning, the DECT standard was developed as a means of providing access to a telecommunications network of any type and for a variety of applications:

  • for home and small office;
  • microcellular cooperative systems;
  • radio access systems (WLL);
  • GSM network access systems;
  • public microcellular systems (PMS);
  • local area network access.

DECT provides: voice telephony, fax, modem, e-mail and many other services.

DECT makes it possible to create a full-fledged telecommunications environment for wireless radio access (WLL) with a set of integrated fixed and mobile services. This provides:

  • public network telephone services;
  • fax transmission (G3 standard, maximum speed 4.8 kbps) and data transmission (maximum speed 9.6 kbps) via a speech codec modem with compression up to 32 kbps;
  • fax transmission (G3 standard, speed 28.8 kbps via modem; 64 kbps via speech codec modem without compression via a channel with interference protection).

DECT technology is a common access technology, while CTM (Cordless Terminal Mobility) provides terminal roaming services between DECT access networks. In places where DECT radio coverage is provided by a system (home, office or public), a cordless telephone with the appropriate rights can service both incoming and outgoing calls. In this case, the mobile terminal is registered only in one system with one phone number. Thus, communication is provided in any place where the DECT system is present. Moreover, the terminal has the same network number in all networks, so incoming calls are not lost. Mobility is provided not only within the GSM network, but interaction with any network that supports mobility, for example, with the ISDN network, can also be carried out.

The principles of interaction between DECT and GSM systems are reflected in the specification of the GSM Interworking Protocol (GIP), included in the DECT standard. Such access is provided on the A interface of the GSM network (to the MSC). In this case, the GSM network is unaware of the existence of DECT and perceives it as a base station system (BSC). This allows building DECT mobile networks based on the GSM terrestrial infrastructure, since GSM networks effectively support mobility. For GSM network operators, it is possible to use dual-standard GSM/DECT mobile terminals.

DECT technology is called a microcellular or picocellular communication system, since the principle of building such systems is similar to the principle of building traditional cellular systems. The only essential difference is that the cell size in DECT is limited to hundreds of meters (since the radiated power is 10 mW per channel). The architecture of a DECT network depends on the area of ​​application, but, like many cellular communication systems, DECT includes base stations and mobile terminals. A typical structural diagram of a DECT system includes:

  • interface and control unit (IWU);
  • controller control function (CCFP);
  • base station (RFP);
  • mobile terminals (PP).

The control controller provides control of all base stations. All the main centralized functions of mobile terminals are performed in this block.

The switching and control unit ensures the interfacing of the DECT system with telephone networks, such as a city or office PBX. In addition, this unit implements the function of echo cancellation of the speech signal. The switching and control unit also ensures the conversion of signaling protocols between the telephone network and the DECT subsystem.

Base stations determine the coverage area and capacity of the system. The size of the coverage area (cell) of each base station depends on where it is located. Typical values ​​are 30-50 meters indoors and about 150-300 meters for open spaces. The coverage area is determined by the number of base stations included in the system. Directional antennas and repeaters are used to increase the coverage area of ​​base stations. A repeater (R) increases the coverage area of ​​a base station by 50%.

The DECT standard is based on digital data and radiotelephone transmission using TDMA (Time-Division Multiple Access) technology. The main technical characteristics of DECT standard systems are presented in Table 3.

Table 3. Main technical characteristics of DECT standard systems

Operating range 1880…1900 MHz
Number of frequencies 10
Frequency spacing 1.728 MHz
Access method MC/TDMA/TDD
Number of channels per frequency 24
Total transmission rate over 24 channels 1.152 Mbit/s
Modulation method GMSK
Output power 10 mW (average)

The DECT technology system has the following properties:

  • a high-capacity structured cellular access network;
  • mobility within the entire network;
  • flexible and powerful identifier system;
  • high efficiency of radio spectrum use;
  • stable operation in congested and aggressive radio environments;
  • high-quality and reliable radio access;
  • transmission quality comparable to that of wired networks.

The use of radio access technology that enables mobility involves significant security risks. The DECT standard provides countermeasures against the natural security flaws inherent in cordless communications. Effective registration, authentication and encryption protocols have been introduced to prevent unauthorized access, and the concept of advanced coding provides protection against eavesdropping.

Registration is the process by which the system allows a specific DECT handset to be serviced. The network operator or service provider provides the PP user with a secret registration key (PIN) which must be entered in both the RFP and the PP before the procedure can begin. Before the handset initiates the actual registration procedure, it must also know the identity of the RFP to which it is to be registered (for security reasons, the registration area may be limited to one dedicated (low-power) RFP system). The procedure is usually time-limited and the registration key can only be used once, which is done specifically to minimize the risk of unauthorized use.

Registration in DECT can be done “over the air”. After establishing radio communication, both sides verify that the same registration key is used. Identification information is exchanged, and both sides calculate a secret key, which is used for authentication at each connection establishment and is not transmitted over the air.

A mobile DECT handset can be registered to several base stations. During each registration session, PP calculates a new authentication key, linked to the network to which it is registered. New keys and new network identification information are added to the list stored in PP, which is used during the connection process. Handsets can only connect to the network to which they have access rights (the network identification information is contained in the list).

Handset authentication can be performed as a standard procedure at each handshake. During the authentication session, the base station verifies the authentication key without transmitting it over the air. The principle of “non-revealing” the identity over the air is as follows: RFP sends a random number called a “challenge” to the handset. The handset calculates a “response” by combining the authentication key with the received random number and transmits a “base station response”. RFP also calculates an “expected response” and compares it with the received response. As a result of this comparison, either the handset is established again or the handset is disconnected. If someone is trying to intercept the signals over the air, in order to crack the authentication key, he needs to know the algorithm for extracting the key from the “challenge” and the response. Revealing the algorithm requires enormous computing power. Therefore, the cost of extracting the key by analyzing the authentication signals is incredibly high.

The authentication process uses an algorithm to calculate a “response” from a challenge and an authentication key in the handset and base station. This is a way of sending the user’s identification information in encrypted form over the air to prevent it from being stolen. The same principle can be applied to user data (such as voice transmission). During authentication, both parties also calculate an encryption key. This key is used to encrypt the data sent over the air. The receiving party uses the same key to decrypt the information. In the DECT standard, the encryption process is part of the standard (although not mandatory). Thus, the signal is scrambled and forcibly encrypted. In this case, hack-resistant crypto protocols with open key transmission are used. The use of encryption is not mandatory due to restrictions on the distribution and use of encryption technologies in various countries.

Registration, authentication and encryption algorithms provide a fairly high level of protection against unauthorized access and eavesdropping.

Radio frequency identification technologies

Radio frequency identification and object registration systems (abbreviated RFI-systems, from English RFID Radio Frequency IDentification) are a set of electronic means of automated control and collection of information about various objects, such as transport, personnel, cargo, goods, valuables, etc.

RFID systems became widespread in the early 90s. Compared to the then existing methods of identification by barcode, magnetic stripe or contact key (TouchMemory technology from DALLAS), RFID systems had a number of significant advantages. They allowed to significantly speed up the identification process, did not require a special location of the object relative to the reader, as in barcode systems, were more reliable, durable and protected than magnetic stripe systems, and worked contactlessly, unlike TouchMemory systems. Therefore, at present, RFID systems are becoming increasingly widespread in trade, payment banking systems, access control systems, inventory control systems, etc. The composition of a typical RFID system is shown in Fig. 2.


Fig. 2. Composition of the radio frequency identification system

The tag and the reader are connected by a radio frequency channel. The tag consists of a transceiver and an antenna. The reader also contains a transceiver and an antenna. The controller can be part of the reader, or it can be made as a separate device. The controller forms an interface for communication with the PC. By means of the transceiver and the antenna, the reader emits an electromagnetic field of a certain frequency. Radio frequency tags that fall within the range of the reading field respond with their own signal containing certain information (for example, a product code) at the same or a different frequency. The signal is captured by the reader's antenna, the received information is decrypted and transmitted through the controller to the computer for processing.

The controller performs several functions. The first is the docking of the reader with the computer ports: USB, RS-232, RS-485. The second is the multiplexing of several readers with one computer. Some developer companies integrate the reader, antenna and controller in one product, while others, on the contrary, in different ones. The computer is directly involved in the storage, processing and use of information received from the tags in various user programs.

Currently existing RFID systems from various manufacturers, as a rule, differ in the carrier frequency of the signals used, the type of modulation, the radio exchange protocol and the volume of information returned by the transponder. Recently, a number of organizations have attempted to standardize these characteristics. This primarily applies to the carrier frequency of the signals.

Currently, there are three main frequency ranges in which RFID systems operate:

  • low-frequency range (100 – 150 kHz);
  • mid-frequency range (10 – 15 MHz);
  • high-frequency range (850 – 950 MHz and 2.4 – 5 GHz).

Among the low-frequency RFID systems widely used on the Russian market are transponders operating at a frequency of 125 kHz (protocol of the Swiss company EM Microelectronic Marin). These transponders use amplitude-modulated signals and Manchester code. A similar exchange protocol is used by transponders of the companies Temic, Atmel, Microchip and transponders produced in Russia by Angstrom. The range of such systems is about 20 cm. Texas Instruments produces equipment for RFID systems operating at frequencies of 132 — 134 kHz, using frequency modulation of the signal and an exchange protocol different from that of other companies. The range of such systems reaches two meters, and the exchange protocol has high noise immunity. The main results of the comparative analysis are presented in Table. 4.

Table 4. Main results of comparative analysis of RFID systems

Advantages Disadvantages
Low-frequency RFID systems
— low cost;
— small weight and dimensions of tags

 

 

 

— low radio exchange speed;
— short radio exchange distances;
— technological complexity of manufacturing highly inductive transponder antennas;
— inability to distinguish between several transponders simultaneously located in the reader's antenna field;
— large reader antenna sizes
Mid-frequency RFID systems
— high speed of radio communication;
— small weight and dimensions;
— technological simplicity of manufacturing high-inductance transponder antennas;
— use of anti-collision protocols that provide the ability to distinguish between several transponders simultaneously located in the field of the reader antenna
— short exchange distances between the reader and the tag;
— low speeds of movement of tags relative to readers, at which exchange is possible
High-frequency RFID systems
— high speed of radio exchange;
— long ranges of radio exchange;
— ease of manufacture of highly inductive transponder antennas;
— the ability to distinguish several transponders simultaneously located in the field of the reader's antenna;
— high speeds of movement of tags relative to readers, at which exchange is possible
— large weight and size indicators;
— high cost of equipment

It should also be noted that spiral or magnetic antennas of low-frequency transponders are large and difficult to transport. This leads to high costs for manufacturing transponder housings and, ultimately, to their high cost. In general, the low cost of low-frequency transponders ($1.2 — 1.5) and readers ($20 — 30) allows for the implementation of inexpensive access control systems, time and attendance systems, etc. The transition to the megahertz frequency range allowed developers to get rid of these shortcomings. The standard frequency in the mid-frequency range for the production of RFID systems is 13.56 MHz. A number of well-known manufacturers have developed transponder microcircuits for this frequency, including Philips, Microchip, Texas Instruments, and many others.

The advantages of mid-frequency RFID systems, including high data exchange speed and small dimensions, make them very attractive. They can be used to transmit information over short distances at low speeds of tags relative to readers. The transition of RFID system developers to the high-frequency range is primarily due to the need to increase the speed of information exchange between the reader and the tag, as well as to increase the distance between them. High-frequency transponder devices are usually designed to identify objects moving at speeds of up to 200 km/h at fairly long distances (10–15 m). In the modern RFID market, such transponders are primarily represented by products from Amtech, Baumer Ident, Balogh, WhereNet and Micro Design ASA.

It is especially necessary to dwell on radio frequency tags. They usually include a receiver, a transmitter, an antenna and a memory unit for storing information. The receiver, transmitter and memory are structurally implemented as a separate microcircuit (chip), so it seems that the radio frequency tag consists of only two parts: a multi-turn antenna and a chip. Sometimes a power source (for example, a lithium battery) is included in the tag design. Tags with power sources are called active. The reading range of active tags does not depend on the energy of the reader.

Passive tags do not have their own power source, and the energy required for operation is obtained from the electromagnetic signal coming from the reader. The reading range of passive tags depends on the energy of the reader.

The advantage of active tags over passive tags is a significantly greater, 2-3 times, range of information reading and a high permissible speed of movement of the active tag relative to the reader. The advantage of passive tags is their virtually unlimited service life (they do not require battery replacement). The disadvantage of passive tags is the need to use more powerful information reading devices with appropriate power sources. Thus, it is advisable to use active tags to transmit information over tens of meters in motion. Passive tags can be used for long-term storage of information, due to their energy independence.

Information can be entered into the memory of a radio frequency tag in various ways, depending on its design features. The following types of tags are distinguished:

  • RO – tags (Read Only), which only work to read information. The data required for storage is entered into the tag’s memory by the manufacturer and cannot be changed during operation.

  • WORM– tags (Write Once Read Many) for single recording and multiple reading of information. They come from the manufacturer without any user data in the memory device. The necessary information is written by the user himself, but only once. If it is necessary to change the data, a new tag will be required.

  • R/W – tags (Read/Write) for multiple recording and multiple reading of information.

R/W tags have the main advantage: the data of the identification tag can be changed if necessary. The data of the RO tag is written only once (during manufacture), while the information stored by the radio frequency R/W tag can be changed, supplemented or even replaced with other information (except for the identification code). Thus, tags with multiple writes and multiple readings of information are of the greatest interest and are more promising. Table 5 presents the generalized parameters of modern RFID systems.

Table 5. Generalized parameters of modern RFID systems

Company Name of equipment F,
MHz
Mass,

g

Dimensions, mm DT, °C D, m V,
kbit/s
W, kbyte Price, $
Texas Instruments RI-ANT-G01E Antenna 0.1342 425 200x200x25 -30..+60 2      
  RI-STU-MRD1 reader 5 38х29х13 -20..+50    
&nbsp ; Label          
Baumer Ident PC3352 reader 2450 4000 300х200х85 0…+50 4 40 6800
  PC3104/33A tag 100 87х64х30 -40..+70 32 350
  PC3312 Antenna 1300     5060
Balogh HF-RSR0945 Reader 2450 1500 263х178х30   10   3412
  HF-TCP0141 tag 15 85.6х54х3.5 -20..+70   0.02 22
Omron Reader V620-CD1D 2450 360 165х68х80 -10..+50 2   1100
  Mark V620-D8KR01 120 86x54x23 -25..+70 8 820
  Antenna V620-H02 2000 240х190х41 -25..+70 5000
Philips Reader
MF RD560
13.56 100 110х67х18 -10..+70 0.1 106 300
  Mark S50 MF 2   -25..+70 8 3

Note. F – operating frequency; DT – operating temperature range; V – data transfer rate; W – information volume on the tag; D – exchange range.

As can be seen from Table 5, modern RFID systems provide storage, processing and transmission of information at a distance of up to 8 – 10 m, which largely solves the “last inch” problem.

Based on the results of the analysis, Fig. 3 shows the ratio of the considered wireless technologies of the “last inch” by parameters D(range without retransmission) and V (technical transmission speed). For comparison, the same figure shows a similar relationship for GPRS and UMTS mobile technologies, which, if necessary, can also be used to solve the “last inch” problem.


Fig. 3. The ratio “range – speed of wireless communication technologies

As an example, Fig. 4 shows a block diagram of the possible use of wireless communication technologies in a modern home.


Fig. 4. Block diagram of the possible use of wireless communication technologies in a modern home: 1 – Bluetooth; 2 – IrDA; 3 – RFI; 4 – Wi-Fi; 5 DECT; 6 – GSM, GPRS, UMTS; 7 – Wi-MAX

To sum it up, we can state that modern capabilities of wireless data transmission technologies provide a solution to a wide range of information security problems, including access control, identification, blocking unauthorized access, hidden mobile communications, etc. The main thing now is to keep up with the development of technologies, to be able to see in them and use what many do not notice.

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять