Designing Logical Topology for Wireless Sensor Networks: A Multi-Chain Oriented Approach
Sensor System Technology Conversion for Real/Logical World ...
-
Upload
petersam67 -
Category
Business
-
view
643 -
download
1
Transcript of Sensor System Technology Conversion for Real/Logical World ...
Sensor System Technology Conversion for Real/Logical World
Conjunction
October 26, 2006Tsuneo KatsuyamaFujitsu Laboratories
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.2
• Activity on RFID systems(current)
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.3
FUJITSU RFID Total SolutionsFUJITSU RFID Total Solutions
RFID Tags
Business Solution
RFID Support Services
・ Work Analysis・ Systems Integration Support・ Tag Printing・ Making Manuals/Training・ Operational Support
Asset ManagementProduct Management/Warehouse ManagementLogistics/Retail/Library ManagementRental Product Management
RFID Middleware
Readers, Writers, RFID Printers
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.4
UHF RFID Technologies
FRAMFRAM Based Tag LSI Based Tag LSI Low Power, High speed memory access256/1KByte memory256/1KByte memory
Use for data carrier
Long range type
Reader/WritersThe world smallest R/W for handheld terminal
Tags corresponding to applications
Tag LSI
Antenna
Tag LSI
Antenna
Tag LSI
Antenna
Waterproof Rewritable sheet
Soft laundry CD/DVD
For metal surface
ロジック
BGR
FR
AM
(2
Kb
)
1.5
0 m
m
1.23 mm
VCO
電流モードデモジュレータ
Antenna
Tag LSI
TagLO G IC
BGR
O VER PO W ERPRO TEC TIO N
FR
AM
(2
56B
)
1.5
0 m
m
1.23 mm
VCO
D EM O D U LATO RAntenna
Tag LSI
TagREC TIFIER
CF interface
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.5
RFID tags for various applications
Linen TagsLinen Tags
Paper Label Tags/PETPaper Label Tags/PET
Flexible software-molding linen tags
Durability performance to the bend or the impact
on daily cleaning process
Batch processing (reading) of linen goods
■■FlexibilityFlexibility
■■WaterproofWaterproof
■■Resistance to chemicalsResistance to chemicals
Ultraslim Metal CompatibleUltraslim Metal Compatible Tags Tags
Rewritable SheetsRewritable Sheets
Compared with normal metal compatible
tags, the ultraslim tags are less than 2mm
thick■ Successfully develop the technologies Successfully develop the technologies necessary fornecessary for sticking a tag to the sticking a tag to the metal surfacemetal surface
■ Successfully developSuccessfully develop to trim down on to trim down on tags less than 2mmtags less than 2mm
■ Distance of signals about Distance of signals about 11 mm
Resin TagsResin Tags
■ ■ Refastenable on Refastenable on palettes, platespalettes, plates
■Operational cost Operational cost reduction for reusingreduction for reusing
■ It is possible not only to It is possible not only to read but also to take a read but also to take a visible confirmvisible confirm
■ Paper label typePaper label type
■ Plastic card typePlastic card type
■ ■ Heat-resistingHeat-resisting
■ ■ Pressure-proofPressure-proof
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.6
・ The batch reading and writing can be done just in getting past a security gate with palletized products(Operation) started on May 24, 2006
【 Effects 】- Improve the accuracy of inspection goods- Reduce the workload (Data input for inspection goods, and other related operations)- Prevent mistakes for delivery (Data input; address of receivers, and inventory locations)
The product’s carton case is clearly labeled UHF-band RFID tagged rewritable-sheet (on front to back/side to side). It has the technology available for the batch reading and writing.(After the starting of formal operation, reading error→None!)
Application case in Fujitsu SCM of Oyama Works and Nasu Works
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.7
2. Technology for the Next Stage
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.8
Direction
Current RFID Systems
Next Generation Systems
Integration into the ICT systemsfor daily services
Real world - Logical world conjunction
Easy-to-use the advanced technology in the actual fields
Fit to physical environment/Operation skill/…Sophisticated functions for good services
Networking/System integration sensors, business systems,…
Creating new application area (Tracing, Real-time management, ..)
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.9
• Easy-to-use in physical environments
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.10
Motivation
To use advanced technology in actual environments Adjustability for daily changes in the fields Optimization without any skill
System design fitting to each environment → Simulation technology
Skill-less tuning in the fields → Measurement technology
Basic wireless technology for small area analysis is important.
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.11
Wireless Technologies for RFID
EM simulation
Antenna design
Link simulation
Container yard Simulation model Electrical field distribution
Dense R/W environment
Modeling 3D directivity
-10
-5
0
50
90
180
270
Upper antenna
Lower antenna2 4 6 8 10 12 14 16 18 20
0
20
40
60
80
100
チャネル数
平均
時間
率 (%)
リーダ
タグ
#1 #2 #4 #5#3
#11 #12 #14 #15#13
#16 #17#19 #20#18
#21 #22 #24 #25#23
#6 #7 #9 #10#8
D
Reader
Tag
P1: R/W TxP2: Tag Rx w/o errorP3: Duplex communication
P1
P2
P3
P1
P2
P3
△:LBT○:Method 1□:Method 2
Number of channel
Tim
e p
rob
ab
ilit
y(%
)
Simulation Engine
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.12
B. Sophisticated functions integrated into tags
Only RFID basic function is not enough for real applications.
Topics: Active tag technology for security
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.13
Problem/solution of active tags
It can be read radio signal regularly from active RFID tag using a cheaper reader device. Emission of radio wave becomes a threat because anyone
can know existence of source from the remote place ID is tapped.
Tracing behavior Spoofing by resend attack
Spoofing by catching & resending radio signal
It does not emit except when it is necessary, that is, it responds only when there is inquiry from a right reader device.
Additionally, it responds by the signal encrypted at random.
Problem
Solution
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.14
Secure RFID system
< Cross certification flow >
RFID tag
Reader writer(R/W)
(every time different value)
Tag ID is encrypted with timeinformation and responded.
1.
2.
3. 4.
5.
OK!ID Key, Time, SysID
7.ID extraction
NG!STOP !! Do not respond.
Key, Time, SysID
Encryption data6.
8.
ID requests commandis encrypted with time information.
Attestation 2(decode and attestation of the tag)
Attestation 1(decode and attestation of the R/W)
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.15
Specification of the prototype Common specification
Reader writer specification
Tag specification
38.4kbpsTransmission ratecommon key cryptosystem (DES)Security method
315MHz and slight wireless standard conformingCommunication method
About 10mCommunication distance2^128 or less pieceNumber of tag
ContentItem
100mmx80mmx25mmSize
less than 0.5WPower consumption
USB Bus Powered / DC5V AC AdaptorPower supplyUSB 、 LAN 、 WLANHost I/F
ContentItem
fixed type
77mmx25mmx8mmSize
less than 0.5WPower consumption
USB Bus PoweredPower supplyUSBHost I/F
ContentItem
USB dongle type
34mmx34mmx5mm(except Battery )Size
Around 1 year (CR2032, depend on the specification. )
Power consumption (battery life)
Lithium button battery ( DC 3 V)Power supplyContentItem
tag
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.16
Comparison of RFID tag
around 1 year2 )around 1 year2 )
semipermanent (no battery)(Operate by the electromagnetic
induction)Lifetime
with sensorsensor NW
intercommunication with sensorNo Extendibility
Tracking person(no restriction)
Tracking person (restricted area)
DistributionInventory control of goods
Application
around $103 )less than $103 )less than $13 )Cost
◎Respond to inquiry from the authenticated reader
ID encryption
×Always emitting radio
signal
△Respond to inquiry from the
readerID non-encryption
Security
~ 10m> 10m~ 4m 1)Comm. distance
Secure RFID tagActive RFID tagPassive RFID tag
1): UHF band RFID tag, 2): depends on specification (one operation per second is assumed), 3): The expectation.
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.17
Applications
Nurse callCallbutton
BuzzerTag
Tag
Reader
Hospital Two-way and secure
communication with
a buzzer and button
SearchingReader
Packages with tags
Blinking LED
Locationdetection
Two-way Communication
with LED indication
Temperature sensor
Temperature controller
Reader
Multi-functional tag
Packages with UHF passive tags
Pallet
Storage Management for distribution
Two-way communication
with sensing capability, and
cooperation with the passive tags
Get environment information
Patient call
Temperature control signal
Warehouse
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.18
C. Networking the sensors/systems
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.19
Sensor Network
Carefully covered the entire target zone for monitoringQuick auto-detection a problem such as natural phenomena, and small sign of changes (natural, business, …)
Rate of Soil moisture Condition of soil excavationThe inclination changes
Water level changes
VibrationSlope
Implementation of the Sensor Network system just like wired net which can be set up easily and at low cost.
intrusion by suspicious individuals
Raising of water dangerous level
Traffic jamsAccidentsTunnel fire disasters
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.20
System model
Management servers
Backbonegateway
CameraTemperature, stress, acceleration,…
Video
control
Automatic path finding
Power supply box
Data Center
Wireless ad-hoc
Watcher/sensor
sensor
access
notify
Trifle networkAd hoc technology basis
We focus on here!
Storage of collected sensor data, analyze, reuse and notify to watcherData center
Highway network for collection of sensor data from trifle networksBackbone
Fine grain network to connect between backbone and sensorsTrifle network
Collection of data and site watchingWatcher/sensor
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.21
Wired sensor network: S-wire
Technology for trifle network Wired mesh net for sensor nodes
Communication and remote power supply functions Each node has several joints to connect wire and sensor interface Easy to deploy, configure and modify on the site Security
Encryption communication data Detect cut cable quickly, and re-route
S-wire nodejoint
sensor
gatewaywire
Actuator
Power supply boxSerial Sensor interface
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.22
3cm3cm2.3cm
S-wire node
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.23
Sensor network system
Fully distributed message transfer Ad-hoc routing Self checking the
adjacent nodes
Remote power supply
Node
Watersenso
r
Node
Watersenso
r Node
Temperatur
e
Node
Acceralation
sensor
Node
Node
Notify the resultsNotify the resultsServerServer
GatewayGateway
Backbone network
Self-managing architecture
Node
Motion
sensor
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.24
Advantages
High communication quality Independent from density of sensor nodes
Good flexibility Re-route quickly in the case of disconnection of cables or destruction
of nodes Notify warnings when disconnection, destruction, and other errors Load balancing in the case of traffic jam of sensor data Easy to know the position of nodes: Relative logical position from
gateways Easy to deploy nodes: just connect with uniform nodes, just put
sensor sheet or net
Good maintenance condition No worry about power supply for each node
Compact and cheap (no radio module/power unit, one chip configuration)
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.25
Ex : landslide watching system
Paste sensor sheet to watching areaWatching condition, and notify abnormal events
Forward sensor data with multi-hop
S-wire sheet
Watching application
Soar, wind power
Battery powerWireless LAN
Multi-hop unit
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.26
3. For the future
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.27
Sensor System Convergence
Find by word of mouth, reputations
Correlation Analysis
Analysis Value-Added Processing (Semantic Interpretation)
Complaints about the shortage of goods increase
Structure EquationModeling
Buying process
Reputations
Sales cost
Words Analysis
Simulation/Optimization
Management
Semantic Structure
taskSales Cost
Scheduling Service Interaction
CustomizeIT System/IT System/User-centricUser-centric
・・・
09:00 inventory check 10:00 Time Discounting12:00 Change a backup member 14:00 inventory check
Service Area Deployment
StoreManage Sales
StorePromotion Planning
StoreStock Planning
BehaviorAnalysis
PromotionPlan
Work StructureManuals
20% OFF!!
20% OFF!!
Inside of the store
POS Registers OperationRecorder
Blog
Hard SensorHard Sensor
Soft SensorSoft Sensor
CGM SensorCGM Sensor
Image Recognition
○○/ が / 、 / 品不足 / で /買え / なか / った / !
Purchase Pattern Extraction
Information Processing
Language Processing Morphological Analysis (Japanese)
¥
Event Extraction
Preprocessing
Sales Log12:13 Onion Buy312:13 Pork 1Pack12:24 Milk 2Pack…
Network
Time Discounting(e.g. bargain goods )
Action PatternExtraction
Motion VectorExtraction
Replenish stocks /Inventory check etc..
Commodity price
Sensors
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.28
Conclusion
Combine the technology + Create new technology
Make new common sense/literature Like GUI of Personal Computer
Interface standard for integration Sensor data transfer – Event message, … Middleware …
Status of RFID related technology: Entrance of next stage
All Rights Reserved. Copyright (C) 2006 FUJITSU LABORATORIES LTD.29