RFID chips have become essential in industry. Here you can find out what RFID means and how communication between transponder and reader works.
RFID is the abbreviation for Radio Frequency Identification. This technology is a type of communication between a transmitter (transponder or tag) and a receiver (reader). The system works fully automatically and is used for contactless communication, identification and localisation of objects such as goods, medicines, vehicles or living beings. RFID therefore also falls under the keyword Auto-ID (Automatic Identification and Data Acquisition). For successful use, a transmitter, a receiver, energy and a certain distance are required. In logistics, technology perfects and simplifies processes and ensures a fast movement of materials. Process optimisation in intralogistics using RFID is also largely standard today, so the technology is an essential element for the success of logistics 4.0. Despite the many advantages, the opportunities and limitations of UHF transponders should always be weighed up.
Use of RFID in logistics 4.0
Hardly any other industry can profit as much from RFID and Auto-ID as logistics. Radio Frequency Identification perfects the Internet of Things through smart technology and therefore all object movements, which is why the use of RFID is of great importance for the Smart Factory. Logistics companies benefit above all from
- the acceleration of complex workflows,
- Simplified and streamlined databases with realistic inventory lists,
- easily trackable goods movements,
- reliable localisation of tagged objects,
- intelligent storage of goods and
- fully digital process logging.
As systems can almost manage themselves thanks to RFID, the need for human resources also decreases because the material flow can be fully automated (Auto-ID). This is probably the biggest disadvantage of RFID, because many jobs depend on logistics. Large pallets or even entire pallet trucks full of tagged objects do not have to be manually unloaded and scanned individually, but can be processed in a single step. Workers no longer have to manually check incoming and outgoing goods for type, quantity, origin and destination, because the RFID system clarifies these questions independently and loads all RFID data into the cloud. On the one hand, the error rate can be minimised and industrial communication can be established through the use of cloud technology.
Functionality of Radio Frequency Identification: The Transponder
The RFID transmitter is called a transponder, sometimes also a tag or simply a radio tag. It consists of an antenna (often a coil), a computer chip and a carrier material or housing. The chip is equipped with analog and digital circuits, and it also has a memory that can sometimes be written to several times. In some cases, the transponder is a semiconductor chip. Tags differ in several factors. Among other things, they have different sizes, lifetimes, clock frequencies, memory sizes or ranges.
The chips have a unique identity in the form of a serial number so that they can be clearly identified. The identity cannot be changed, which can prevent abuse. If it is a rewritable memory, the identity can be extended continuously and fully automatically by additional information (Auto-ID). In this respect, for example, previous locations of goods are interesting. RFID technology is also essential when it comes to choosing the right order picking procedure.
Tags usually do not have their own energy supply. In this case, the transponder is called passive. The reader delivers the necessary energy for data transmission to the tag. The antenna must be a coil that charges a capacitor by induction. Exceptions called active transponders have their own battery. Their use is worth it if the tag is to have a long range and various additional functions.
Transponders can be attached to or in the object to be marked. For example, they are stuck on (e.g. on pallets or cartons), embedded directly in objects (e.g. in screws, shoe soles, banknotes or documents) and even implanted in living beings (in pets behind the ear, in people's hands). Successful research and development have made it possible to use temperature-resistant transponders since 2006. Since then, they can even be cast in metals, which has various advantages: the risk of damage, wear and tear or loss is minimised and they are also invisible.
Functionality of Radio Frequency Identification: The Reader
A reader that must be in close range reads the tag's data using an alternating electromagnetic field or high-frequency radio waves. The receiver is also known as a reader. In addition to purely readout readers, there are also readers that can write new data to the transponder's memory. The transmitted radio waves are influenced by the tag because it reflects part of the energy. First, the unique identity and any other requested information are transmitted. In addition, different data can be stored.
The reader is a combination of hardware and specially programmed software. The more range a reader should have, the more energy in the form of electrical current must be used for its use. Typical ranges are between a few centimeters and a few meters. The smaller the range, the more precisely selected transponders can be addressed.
A longer range can be used, for example, if two objects should not be too close together. This is the case, for example, with containers containing flammable liquids and spark spraying equipment. Readers for radio frequency identification are available as handheld versions for manual operation, but can also take on various other forms, for example in the form of a gate through which goods flows.
The following video illustrates how RFID technology is used in practice. SAP uses the small chips here as electronic storage location management.
Costs for RFID technology as auto-ID
Transponders, or tags, are relatively cheap to buy despite their great benefits. A single tag can be purchased for just a few cents. Depending on the equipment and functional repertoire, however, the price can increase many times over. On average, companies must expect costs of around 50 cents per day. But the more common RFID becomes, the cheaper the purchase price can develop. Unfortunately, RFID chips cannot be reused for other objects, since the identity always remains the same.
Misuse through unauthorised access
If strangers can access the stored data, it may be misused. However, this is not an impossible thing, as the stored data can now be transmitted in encrypted form using appropriate transponders. This puts a stop to cybercrime in logistics. In addition, RFID transponders can be designed in such a way that only selected RFID readers have access to the stored information. Alternatively, passwords can also be set. Usually, the data is transmitted in plain text. However, the short range of the transponders, from a few centimeters to a few meters, provides a degree of protection against unauthorised access. Auto-ID therefore already provides good starting points for secure process control, whereby further development steps can certainly be worthwhile.
Weaknesses of RFID
The transmitting or receiving power of RFID systems can be disrupted, destroyed or interrupted. Possible causes are:
- Electromagnetic pulses (EMP),
- physical destruction of the transponder antenna (e.g. by simple cutting),
- Faraday cage and other forms of shielding (such as aluminium foil)
- interference transmitter with the same frequency as that of the tag
Prevent power outages
Like other Auto-ID technologies, RFID technology is dependent on electricity. While passive transponders do not use their own energy source and active ones usually use their own battery, readers can be connected directly to the power grid. Handheld readers often also use rechargeable batteries. The situation is not the same for permanently installed readers in logistics, which are used, for example, in warehouses. If there is a power failure, the reader of the radio frequency identification system will also fail. To prevent this, it makes sense to set up an automatic emergency power supply that also integrates RFID systems. However, data losses on described tags due to a power failure are not possible in this way.
Attacks on computer systems
As RFID systems become more common in business, they will become increasingly interesting for cyber criminals. To date, only scientists have been able to manipulate RFID chips to spy on databases. In this respect, it is worth keeping up to date at all times in order to offer cyber criminals as few targets as possible. In addition, the usual safety regulations, such as frequent updates and staff training, apply to computer systems related to radio frequency identification.
The History of Radio Frequency Identification
For the first time in human history, a pioneer of this technology was used in British military aircraft in the Second World War. It was used to automatically distinguish between British and non-British aircraft to avoid confusion with enemy aircraft. The main difference between the predecessors, which were about the size of a suitcase at the time, and the systems used today is the size and weight of the transponders. Modern transponders can be as small and light as a grain of rice, although there are still more massive tags.
In the 1960s, RFID found its way from the military sector into the economy and since then has played an important role for technologies in the field of Auto-ID (Automatic Identification and Data Acquisition). In this phase, it was mainly used to protect against theft. Shortly thereafter, the transceiver system was also used in agriculture to identify farm animals. Over the next few years, dozens of other areas of application were opened up. In the 1980s, RFID was found in toll systems. This development took place primarily in the USA and Norway. The system has been further developed and is not yet complete. RFID technology is now used in the economy, healthcare, retail, logistics, (tourist) infrastructure, blind care and many more.