0% found this document useful (0 votes)
79 views

Epc C1G2 Passive Rfid Baseband Uhf 860Mhz-960 MHZ: Bhanu Singh

This document discusses an EPC C1G2 passive RFID baseband design. It describes the key factors that determine tag read range, including radiated reader power, tag antenna gain, conversion efficiency, and wavelength. It also outlines the baseband architecture, including analog and digital blocks, a clock gating unit for power savings, and plans to implement AES-128 encryption. Initial synthesis results show a dynamic power of 277uW, which needs to be reduced, and leakage power of 55.4677nw. Further work includes strengthening the weak security protocol by adding encryption to queries and responses between the reader and tag.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Epc C1G2 Passive Rfid Baseband Uhf 860Mhz-960 MHZ: Bhanu Singh

This document discusses an EPC C1G2 passive RFID baseband design. It describes the key factors that determine tag read range, including radiated reader power, tag antenna gain, conversion efficiency, and wavelength. It also outlines the baseband architecture, including analog and digital blocks, a clock gating unit for power savings, and plans to implement AES-128 encryption. Initial synthesis results show a dynamic power of 277uW, which needs to be reduced, and leakage power of 55.4677nw. Further work includes strengthening the weak security protocol by adding encryption to queries and responses between the reader and tag.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

EPC C1G2 Passive RFID Baseband

UHF 860MHz-960 MHz

Bhanu Singh
RFID Reader Tag Communication
Why Power is Important

• In passive backscatter systems, the range is set by the forward link (reader-to-tag)
through the radiated power available at the tag. The goal for the design of a Gen-2
tag is to maximize read range while providing full compliance with the protocol. The
Range Equation below determines the theoretical range in which the tag will receive
adequate power levels to respond to the reader.

• Where:
• EIRP = the effective isotropic radiated power,
(≤ 4 Watts in US as Per FCC regulation)
• Panalog + Pdigital = Ptag = the power required at the tag antenna Input
• G = the tag antenna gain, and ɳ = RF to DC conversion Efficiency of Rectifier
• λ= the free-space wavelength of the RF carrier.
Interrogator to Tag Date Encoding - PIE
Link Communication
Baseband Architecture

Power Saving through Dynamic Clock Gating using Intelligent Clock controller

PIE Decoder Rx Fsm

symbIn
Analog Front End

EEPROM
Clock Control
CRC/RNG Protocol FSM EEPROM
clkOsc Unit
I/F

symbOut
TX Encoder Tx FSM

8-bit AES-128 To be Implemented AES-128

I have uploaded Design Spec at :


http://embeddedsensors.wikispaces.com/file/detail/RFID_EPC_C1G2_DVSpec.pdf
Test Bench
Initial Synthesis Results
• Library used – lec25reduceDff.db
• Dynamic Power – 277 µW ( Too high)
Need to do a VCD based simulation to know real Dynamic Power
• Leakage power - 55.4677nw
Further Work - Encryption
The EPC C1G2 has a very weak security protocol. The security is based on
cover coding. To cover –code data or password the Reader first requests a
Random number from the Tag. The Interrogator then performs a bit-wise
EXOR of the data or password with this random number, and transmits this
cover coded (also called ciphertext) string to the Tag. The Tag uncovers the
data or password by performing a bitwise EXOR of the received cover-coded
string with the original random number.
Encrypted Communication

Query

Ek(R1)
Ek(ACK(R1))
Ek(PC, EPC)
Tag Reader
Ek(ReqRN(R1))
Ek(R1)
Ek(Command)

You might also like