Editor's Choice


Passive RFID using UHF delivers long-range benefits in the IoT

29 May 2019 Editor's Choice Telecoms, Datacoms, Wireless, IoT

For consumers, the impact of the IoT may be summarised as greater convenience. We have grown to expect certain things to happen ‘automatically’, without knowing how, and the IoT will accelerate and expand that.

For consumers, the impact of the IoT may be summarised as greater convenience. We have grown to expect certain things to happen ‘automatically’, without knowing how, and the IoT will accelerate and expand that.

For example, many people now use contactless payment, something that is enabled by short-range RF communications between a payment terminal and a bank card, mobile phone or smart watch equipped with the same technology. This avoids the need to physically insert a card into the payment terminal and enter a PIN; on the face of it, it may seem like a small thing, but as anyone who uses it regularly will appreciate, it can significantly speed up the purchasing process.

RF technology has the potential to change many more aspects of modern life. One of the most established forms of RF communication used in the IoT is RFID technology, and research shows that its adoption amongst retailers to tag clothing is set to increase massively before the end of the century. Tagging items allows them to be identified by a payment terminal as soon as they are presented, making the customer’s purchasing experience even more convenient.

RFID technology has been around for many years and its use in the IoT is entirely synergistic. Because each RFID device has a unique identity, it can be used to identify practically anything. When the reader is part of a connected system, it enables almost unlimited potential for new applications. Recently, the introduction of ultra-high frequency (UHF) RFID technology has further extended that potential.

UHF RFID

RFID is a contactless technology that can operate over a range from a few centimetres to several metres, using frequencies of 120 to 150 kHz (low frequency, or LF), 13,56 MHz (high frequency, or HF) and 860 to 960 MHz (ultra-high frequency, or UHF).

Most of the existing applications (such as identification, access control and payment) use passive devices; that is, the RFID device does not have its own power source, such as a primary cell. This is the primary feature of RFID devices and, in general, devices in the LF and HF frequency ranges receive their power through inductive coupling (or near-field), while UHF devices use electromagnetic wave (or far-field) propagation.

Standards organisations are actively developing the standards necessary to make RFID more widely deployable, which includes ISO and IEC as well as EPC Global; in 2009, ISO/IEC integrated UHF EPC Gen 2 into ISO 18000-6 as Mode C. RFID UHF bands vary in different countries and include frequencies between 860 MHz and 960 MHz (EPC global standard).

The most important characteristic in RFID system performance is range, or the maximum distance over which an RFID reader can either read information from, or write information to, the tag. Tag range is defined in terms of a successful read/write rate, expressed as a percentage. The rate will vary with distance, but it also depends on the RFID reader’s characteristics and how the operating environment affects the propagation of the signal.

In general, read and write ranges are different due to the different amounts of power required by the transponder chip for each of these operations. The main challenges involved with developing and operating a UHF RFID system reside in the reader and the passive tag, as outlined below.

Tag limitations

The most important tag limitation is the chip sensitivity threshold. This is the minimum amount of received RF energy that is needed in order to power the RFID chip.

• Antenna gain.

• Antenna polarisation. For maximum range this must be matched between the tag and the reader antenna.

• Impedance matching between the antenna and the RFID chip.

Reader limitations

• EIRP (equivalent isotropic radiated power). This determines the power of the signal transmitted by the reader in the direction of the tag.

• Reader sensitivity. This is usually defined with respect to a certain signal-to-noise ratio or error probability at the receiver.

In general, the range of passive UHF RFID systems is limited by factors such as the tag characteristics, the propagation environment and the RFID reader parameters. Typically, if reader sensitivity is high then the tag limitations prevail. However, tag range can be maximised by designing a high-gain antenna that is well matched to the chip impedance.

UHF RFID in the IoT

In order to support the use of UHF RFID as an IoT solution, a global alliance was formed in 2014 by Google, Intel, Impinj, Smartrac and AIM (the industry association representing the automatic identification industry). It now has over 160 members, including NXP Semiconductors.

Marketed as RAIN RFID, it has adopted the EPC Gen 2 specification, as incorporated into the ISO/IEC 18000-63 standard. If a solution is referred to as RAIN RFID, it will be using UHF RFID technology that complies with this standard and the alliance’s goals.

UCODE DNA makes toll roads simpler

Toll roads are becoming more common across regions including Europe, providing a solution to congestion through charges that help expand and maintain the transport infrastructure. Collecting tolls can often require the driver to slow down, but using UHF RFID it is possible to make the process transparent.

By working together, Avnet Silica, systems integrator Kathrein Solutions, and vehicle identification specialist Tönnjes successfully developed a system that can identify individual vehicles travelling on a motorway at a range of 20 metres and speeds of up to 250 km/h. As such, the technology can be mounted in gantries over the motorway and collect data completely unobtrusively. This can be more reliable and carry a lower total cost of ownership than an image-based approach using cameras and vehicle registration recognition algorithms.

The system brings together the RRU 4500 UHF RAIN RFID reader unit developed by Kathrein, with the IDePLATE and IDeSTIX from Tönnjes, which is also RAIN RFID compliant and enabled by the ‘UCODE DNA’ UHF RFID integrated solution developed by NXP.

The IDePLATE is a number plate which replaces the vehicle’s existing plate, and contains the passive UHF RFID chip, while the IDeSTIX contains the same technology housed in a simple label that is attached to the inside of the vehicle’s windscreen.

RFID revolutionises car rental

Using RFID technology to locate assets can streamline processes, including car rental. By implementing RFID in its rental vehicles, Sixt has reduced the amount of time it takes to locate keys for rental customers, but in addition it can now offer more precise time stamps on vehicle returns, more easily track a returned vehicle through its booking system, and more quickly unite a customer with their rental.

With 2200 branches worldwide and over 144 000 vehicles in its fleet, adding RFID has changed the way Sixt operates, reducing the average wait for customers picking up the keys to their rental vehicle from 3 minutes to just 20 seconds. As many branches are located in airports, servicing upwards of 600 rentals per day, this represents a significant improvement to the customer experience.

RFID and security

Every conversation about the IoT must also acknowledge the need for security in a more connected world. RFID is no exception, and as the technology has evolved it has introduced greater levels of security in terms of authentication and cryptography. The latest iteration of NXP’s UHF RFID technology, available through Avnet Silica, is UCODE DNA.

It adds high levels of security to its existing long-range UCODE UHF RFID portfolio, combining all the functionality and security into a single IC. It adds two 128-bit AES keys securely stored on the chip, that are used by the on-chip AES accelerator for cryptographic authentication. The keys are stored in an area of memory that is locked at production; the keys can be generated by NXP or by the customer, and are typically used for tag authentication and tag group authentication.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Quectel’s RG255C-NA and RM255C-GL accelerate 5G RedCap adoption
iCorp Technologies Editor's Choice Telecoms, Datacoms, Wireless, IoT
Quectel’s RG255C-NA and RM255C-GL modules represent a strategic move into this fast-growing segment, delivering Sub-6 GHz 5G connectivity optimised for mid-tier IoT applications.

Read more...
SDRs – Which RF architecture should you choose?
RFiber Solutions Editor's Choice Telecoms, Datacoms, Wireless, IoT
There are several common methods of implementing SDR architectures. This paper discusses which is best when meeting a specific need.

Read more...
Surviving the extremes: Understanding shock and vibration in MEMS sensors
Altron Arrow Editor's Choice Test & Measurement
By considering factors such as mechanical headroom, damping, and system-level robustness, designers can ensure that the chosen sensor not only survives, but performs reliably over time.

Read more...
A two-stage approach to super-wide input voltage range DC-DC converters
RFiber Solutions Editor's Choice
Teaser: In addition to handling the various input voltage ranges required, the SynQor line of InQor DC-DC converters are fully encased and ruggedised to handle the harsh environments that often accompany systems that have such challenging technical requirements.

Read more...
From the editor's desk: Engineering the future
Technews Publishing Editor's Choice
As we welcome the first issue of Dataweek in a new year, it is an exciting time to be part of the electronics community, especially for our readers. The pace of change across our industry continues to accelerate, reshaping how we design, build, and interact with technology.

Read more...
Barracuda commissions new IPC Class 3 aerospace facility
Barracuda Holdings Editor's Choice News
The company has commissioned a new dedicated IPC Class 3 facility in Somerset West. and has concluded a new investment partnership that will provide the capital and management capacity required to scale operations.

Read more...
Engineering copper grain structure for high-yield hybrid bonding in 3D packaging
Testerion Editor's Choice Manufacturing / Production Technology, Hardware & Services
The way copper grains are sized and distributed forms the metallurgical foundation of hybrid bonding, enabling lower bonding temperatures, greater reliability, and stable grain structures throughout integration.

Read more...
Understanding solder dross: causes and control strategies
Truth Electronic Manufacturing Editor's Choice Manufacturing / Production Technology, Hardware & Services
Dross formation is an inevitable consequence of wave soldering. It occurs when molten solder comes into contact with oxygen, forming metal oxides that float on the surface of the solder bath. Over time, this oxidation byproduct accumulates and must be removed to maintain solder quality and process consistency.

Read more...
From the editor's desk: Could X-ray lithography disrupt the economics of advanced chip manufacturing?
Technews Publishing Editor's Choice
Advanced semiconductor manufacturing has reached a point where technical progress is increasingly constrained by economic reality, and the proposed use of X-ray lithography represents a bold attempt to reset these economics.

Read more...
Could the EU’s Cyber Resilience Act affect your electronics manufacturing business?
Altron Arrow Editor's Choice
South African companies exporting IoT devices to the European Union face a significant regulatory shift with the Cyber Resilience Act becoming mandatory in December 2027.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved