8/14/2019 RFID Modulation
1/19
8/14/2019 RFID Modulation
2/19
1
Contents
1. Introduction 22. RFID types 3
2.1 Tags 3
2.2 Operating frequencies 4
3. General Working principles 64. Data encoding 8
4.1 NRZ encoding 8
4.2 PIE encoding 8
4.3 Manchester encoding 84.4 Miller encoding 9
4.5 FM0 encoding 9
4.6 PPM encoding 9
4.7 MFM encoding 10
5. Modulation techniques 115.1 PR-ASK modulation 11
5.2 PJM modulation 11
5.3 GMSK modulation 12
6. RFID standards 136.1 ISO/IEC 18000-2 13
6.2 ISO/IEC 18000-3 14
6.3 ISO/IEC 18000-4 15
6.4 ISO/IEC 18000-6 16
6.5 ISO/IEC 18000-7 17
References 18
8/14/2019 RFID Modulation
3/19
2
1. Introduction
Radio Frequency Identification (RFID) is a wireless system that uses radio-
frequency electromagnetic fields to transfer information, and information in this
case is identification number. In the simplest sense, it is like a digital barcode reader
as it helps to identify particular products. But in this case Barcodes are
transponders (tags) which have identification code that is read by RFID readers when
tag is in the range of reader. Ranges differ by technology and used device. And
comparing with barcode reading technology, tag does not need to be within the line
of sight because it uses magnetic fields. However RFID technology has more
advantages over barcodes for example tags have read and also write capabilities and
with the ability to store, change and transmit much more data. RFID also is more
complex as generally it means that it provides identification using radio frequency so
there are hundreds of possible uses. And for different applications there need to be
different approaches for example RFID technology used for door opening cannot
be used for aircraft identification. That is why RFID technology includes different
versions which use different kind of tags, readers, frequencies, standards, etc.
Historically predecessor of this technology was developed in year 1948 when the
idea of identifying friendly aircrafts was introduced. However just in year 1978
passive radio transponder with memory was introduced. That was the first true
ancestor of RFID [1].
RFID is used for different appliances such as tracking, identifying, sorting,
locating, even for paying and toll collection. There are lots of possible appliances. In
the future, it is even expected that there will be a system for shopping in
supermarkets to attach a tag to every product and after crossing the purchasing zone
all products will be counted in system without barcode reading to each product
separately [1].
However as RFID technology goes towards more and more serious appliances,
security needs to be considered and security and privacy threats should be avoided.
These risks include possibilities to access data in tag without the owners allowance.
If someone could access protocols used in some application, this person could cheat
for example by changing information in shops price tags. And even there could be
viruses in tags which could create security threats in the system.
8/14/2019 RFID Modulation
4/19
3
2. RFID types
As identification using electromagnetic waves offers lots of usage possibilities there
are lots of RFID versions which include different protocols, frequencies, modulation
techniques, data speeds, etc., as well as different kinds of tags.
2.1Tags:From power source viewpoint there are 3 kinds of tags: active, semi-passive and
passive. Active tags have their inner power source such as battery which provides
tags with power. These tags usually periodically send out their signal even if the
readers signals are not present. Passive tags doesnt contain inner power source and
is fully dependent on interrogators sent energy. When interrogator radiates out
radio waves, antennas on the tag receive energy and it is accumulated in chip in
order for the Integrated Circuit (IC) to work and send out signal. Semi-passive tag is
something in between as it has its own power source however the power source is
not used as in active mode to periodically send out signal but provides tag with
energy just if the interrogators signals are present. So it is like passive tag but with
exception that it takes energy not from interrogator but from its inner power source.
The most often used type of tags is passive as it is much cheaper to produce tags
without energy element. [2]
Another way to classify tags, is by considering the storage type. There are basically 3
such types [3].
1) Read-only memory: This is the simplest type of tags, because their ID number iswritten in factory and later it is just possible to read it. For a lot of applications, it
is acceptable solution as ID is in the database and after reading tag, computer
compares the obtained ID with the ones which are in the database.
2) Write once, read many (WORM): it is clear from its title that this type is similar tothe previous type but with a possibility for the system administrator to write the
ID on his own. After that the tag can be just read.
3) Read-write tag: Tag can be read and written as many times as it is needed.However there is also the 4
thtype, which is like pseudo-type since it is a tag without
any memory. These are the tags which are attached to for example clothes. As there
is no memory, the only thing that these tags can do is to signal its existence. For
prevention from stealing it is an acceptable solution, since after buying the item, the
tag is removed.
8/14/2019 RFID Modulation
5/19
4
2.2 Operating frequencies:
Different RFID systems operate in different frequency bands because each frequency
range offers particular possibilities over others including operating range, powerrequirements and performance, also the size of the tag.
There are frequency bands [2]:
Low Frequency (LF) range: 120150 kHz
High Frequency (HF) range: 13.56 MHz
Ultra High Frequency range: 433 MHz,
In Europe 865.6 867.6 MHz (regulated
by ETSI), USA 902 928 MHz, other
countries particular range in between860960 MHz
Microwave: 2450 MHz, 5.8 GHz (standardization
discontinued)
Ultra Wide Band (UWB) 3.110 GHz
Low frequency range advantages include being able to operate in proximity of
liquids, metal or dirt. Commonly they are passively powered and have short range
around 10 cm. Disadvantage could be low data rates.
13.56 MHz frequency in high frequency range offers better data rate than LF but
doesnt perform so good in proximity of liquids and metals. As 13.56 MHz frequency
is in highly regulated band where in nearby frequencies some sensitive electronics
like medical equipment works, it makes them undesirable in places such as hospitals.
In this frequency also passive tags are used so it is good choice for short range
identification. In addition these tags are quite cheap, for example as in 2006, one tag
could be bought for less than 0.50 US Dollars.
UHF 860960 MHz advantages include wider read range and the tags are cheaper
to manufacture. In 2006, the price per tag was approximately 0.15 US dollars and
nowadays it is around just 5 US cents. However the tag cannot operate in proximity
of liquids and metals because of interference. So applications like metal container
tracking, animal tracking and access control are not feasible with UHF systems.
In 433 MHz frequency active tags are used because of low power allowance of
10mW. Two major advantages are maximum communication range and propagation
within crowded environments. However in 433 MHz system only active tags are used
which means increased price, size and weight of the tag comparing with passive tag
and battery changing.
8/14/2019 RFID Modulation
6/19
8/14/2019 RFID Modulation
7/19
6
3. General working principles
As RFID is a wireless technology, it uses radio waves for data transferring. RFID
systems differ very much, but in figure 1 traditional working principle with passive
tag is shown.
Figure 1. Typical RFID system overview
This kind of system with passive tag and reader connected to database could be
used for example as door unlocking system using the tag instead of the key. All
initiation comes from the interrogator (reader) unit which typically sends out
periodical RF signals in order to power up tag if it is present [5]. Tag then
accumulates energy obtained from reader and rectifies and filters it in order to get
direct current which powers up tags IC with memory. From memory data are sent to
modulator which encodes and modulates the ID code. The signal then goes to the
antenna which transmits the signal in space. The interrogator needs to be sensitive
enough to receive signal from the tag. Tag signal is very weak comparing with
interrogators signal, that is why the working distance with passive tags is limited. The
code from the reader usually goes to a computer where it is compared with another
IDs in database and can for example permit an access. Figure 2 illustrates a typical
communication system which is used also in RFID.
Figure 2. RFID System from Communications System viewpoint [6, figure 4]
8/14/2019 RFID Modulation
8/19
7
In order for the reader to communicate with tags, it needs to send out radio
signals which can be either just a ping for powering up tag - or could be multi
round communication signals. If there are many tags present reader could perform
anti-collision protocol. Tag usually consists of:
An antenna, which in active tags case just transmits and receives radiosignal, in passive tags also collects energy,
Integrated circuit with memory which performs communicationalgorithms such as encoding,
Tags inner clock, which generates frequency to transfer data frommemory in particular data rate,
Rectifier, filter and regulator help to provide tag with direct current, In rewritable tags there could be also memory writing circuit.
8/14/2019 RFID Modulation
9/19
8
4. Data encoding
4.1 Non-return to zero Coding(NRZ):
Figure 4. NRZ coding[4, figure 6.8]
This is the simplest coding scheme, because there actually is no encoding. It is used
rarely because of many disadvantages for example produce high DC level.
4.2 Pulse interval encoding (PIE):
Figure 5. PIE coding [3, Figure 4-3]
In this type of encoding pulse interval is modulated, where for 1 there is longer
pulse than for 0. For pulse ending signalizes constant zero pulse.
4.3 Manchester encoding:
Figure 6. Manchester encoding[4, figure 6.8]
8/14/2019 RFID Modulation
10/19
9
Manchester encoding is quite popular in RFID systems. It is simple and easy to
implement, just by checking phase to clock signal. With this kind of encoding
problem of transmitting long dc values is eliminated. It is also good from
synchronization and error control viewpoint.
4.4 Miller encoding:
Figure 7. Miller encoding [4, figure 6.8]
From the first look it is not so easy to understand, but there is a transition in the
middle of a bit period if it is a 1 bit. There is a transition at the start of the bit period
if the 0 bit is followed by a 0 bit. For a 0 followed by a 1 or a 1 followed by a 0, no
transition occurs at the symbol interval. This code is very effective in terms of used
bandwidth.
4.5 FM0 encoding:
Figure 8. FM0 encoding[4, figure 6.8]
This also is often used type of encoding, where 1 consists of constant pulse duringbit interval and 0 consists of 2 different level pulses. But there need to be transition
between 2 bits. So duty cycle is between 45% and 55%.
4.6 Pulse position modulation data coding:
In 18000-3 standard there is used data coding mode 1 of 4 and 1 of 256. In this kind
of data coding in constant symbol time interval pulse can be in different places. In 1
of 4 mode, pulse can be in one of 4 places pulse position determines two bits at a
8/14/2019 RFID Modulation
11/19
10
time. With mode 1 of 256 is the same principle but one pulse position determines 8
bits.
Figure 9. PPM 1 of 4 data encoding[9, ISO 18000-3, Figure G.5]
4.7 Modified frequency modulation
MFM advantage is the lowest bandwidth occupancy of the binary encoding methods.
Simple principle is: A bit 1 is defined by a state change at the middle of a bit interval,
A bit 0 is defined by a state change at the beginning of a bit interval and where a bit
0 immediately follows a bit 1 there is no state change.
Figure 10. MFM encoding.[9, ISO 18000-3, Figure 41]
8/14/2019 RFID Modulation
12/19
11
5. Modulation Techniques
Typically ASK, PSK, FSK and their forms are used in RFID systems. Mostly ASK is
used and in many cases in form of OOK. For ISO 18000-6c standard there is used
different forms of ASK - SSB ASK, DSB ASK and PR ASK.
5.1 Phase reversal ASK:
PR-ASK changes phase 180 each time a symbol is sent , it allows narrow band while
maximizes power transport to tag. It creates AM index 100%.
Figure 11. Traditional ASK modulation compared with PR-ASK modulation
[10, Figure 4]
5.2 Phase Jitter Modulation:
Figure 12. PJM example[9, Figure A.1]
8/14/2019 RFID Modulation
13/19
12
This is the variation of PSK where phase is changed just by 1 - 2. The advantage of
using this kind of modulation is that sideband levels can be set to any arbitrary level
without affecting the data rate.
5.3 Gaussian Minimum Shift Keying (GMSK):
It is variation of FSK, but it uses spectrum more efficiently. It doesnt use amplitude
modulation that is why it is more resilient to noise. Gaussian minimum shift keying is
originated from Minimum Shift Keying (MSK) but after this modulation is digital data
is shaped with Gaussian filter.
Figure 12. MSK signal waveforms.[11]
With MSK there are just 4 different types of bit signal. 1 is with some particular
frequency and 0 is with frequency that is 1,5 times bigger. Also for each frequency
there are 2 phase angle states for smooth 0 to 1 or opposite transition.
8/14/2019 RFID Modulation
14/19
8/14/2019 RFID Modulation
15/19
14
assuming equally distributed 0 and 1 bits the average data rate is 5.1 kbps.
Channel bandwidth is 4 kHz.
For tag to interrogator communication: inductive coupling is the way to
transfer signal. 4 kbps Manchester encoding is used. To improve tags collision
detection, during the inventory process 2 kbps Dual Pattern (DP) data coding is
used. In Figure 3 Manchester encoding with DP coding is compared. Channel
bandwidth is 10 kHz.
Start Of Frame (SOF) pattern is code used to start communication. In this
standard it is Manchester coded bit sequence of 110 and no End Of Frame
(EOF) pattern is used. End of frame pattern signals to tag that communication
ends.
Figure 3. Manchester coding (left) inventory command coding (right). [9,
figure 5]
HDX tags:
For interrogator to tag communication: ASK modulation with PIE is used. Data
rates for slow communication is 1 kbps and for fast data rate 2.3 kbps. Slow rate and
fast rate differ on pulse width.
For communication tag to interrogator: NRZ coding with FSK modulation is
used. Low bit frequency is the same carrier frequency 134.2 kHz and High bit
frequency is in range 123,7 4,2 kHz. Data rate is improved in such a way and
average data rate is 8 kbit/s. SOF and EOF patterns consist each of 6 bits.
Interrogator to tag bandwidth is 8 kHz, whereas for tag to interrogator it is 15 kHz.
6.2 ISO/IEC 18000-3 [9]: Parameters for Air Interface Communications at 13.56
MHz
In ISO 18000-3 standard there are 2 operating modes which can work
without interfering with each other.
8/14/2019 RFID Modulation
16/19
15
MODE 1: When communication is initiated, there are 2 tag response formats - with
precursor and without it. Precursor is first part of communication, it helps to
perform anti-collision algorithms in early stages. During the precursor
communication, frequency that is 32 times smaller than carrier frequency and
Differential Binary Phase Shift Keying (DBPSK) is used for modulation.
Interrogator to tag communication is in bandwidth 13,56 MHz +/- 7 kHz. 2 kinds of
amplitude modulation are used with 100% or 10% modulation index. Tags shall
decode both. Data coding technique is Pulse Position Modulation (PPM). 2 data
coding modes shall be supported by tag1 of 256 (with data rate 1.65 kbit/s) and
1 of 4(with data rate 26.48 kbps).
For tag to interrogator communication 1 or 2 subcarrier frequencies are used: either
just 423.75 kHz or also 484.28 kHz. With 2 subcarriers occupied channel bandwidth is
13,56 MHz (484,28 kHz 40 kHz). Manchester coding is used for data encoding and
CRC 16 code for error correction.
MODE 2:
Interrogator to tag communication: 13,56 MHz +/- 7 kHz bandwidth is occupied.
Data are modulated in Phase Jitter Modulation (PJM) with min level +/- 1,0 and
max. level +/- 2,0 . PJM is PM variation where signal phase differ by just small angle
in this case 1 - 2. For data coding is used Modified Frequency Modulation (MFM).
In this way data rate is 423.75 kbps.
Tag to interrogator communication uses 13,56 MHz 3,013 MHz frequency
range. Tag can use one of 8 subcarrier frequencies in this range (969; 1233; 1507;
1808; 2086; 2465; 2712; 3013 kHz) where each subcarrier frequency has 106 kHz
bandwidth. BPSK is used for modulation in this case with MFM data coding. MFM is
used because it has the lowest bandwidth occupancy comparing with other binary
encoding methods. From tag to reader data rate is 105,9375 kbps. This is full-duplex
system. CRC codes are used also in this standard: 16 bit CRC for interrogator to tag
and 32 bit - tag to interrogator.
When many tags are present, Time and Frequency Division Multiple Access
(FTDMA) principle is used. Tags then each randomly choose one of 8 subcarrier
channels and after valid command, transmit the reply, after next command
choose another channel and sends again. Tags which are identified are muted so
they dont respond to commands anymore.
6.3 ISO/IEC 18000-4 [9]: Parameters for Air Interface Communications at 2.45 GHz
In this standard there also are 2 modes.
MODE 1 is a passive backscatter RFID system.
8/14/2019 RFID Modulation
17/19
16
Interrogator to tag Tag to interrogator
Encoding Manchester encoding FM0
Error control coding CRC 16
Operating frequency
range2400 to 2483.5 MHz
Max occupied channel
bandwidth0.5 MHz
Modulation ASK with modulation
index of 99%ASK
Data rate 3040 kbps
MODE 2: Long range high data rate RFID system it is appropriate for long
range with active tags.
Interrogator
to tag
Tag to interrogator
R/O-tag R/W-tag
(notification)
R/W-tag
(communication)
Encoding No encoding Miller Miller Manchester
Error control
codingDifferent types of CRCs for detection are used
Operating
frequency
range
2400 to 2483.5 MHz
Max
occupied
channel
bandwidth
1 MHz
ModulationGMSK
DBPSK or
OOKDBPSK DBPSK
Data rate 384 kbps 76,8 kbit/s 76,8 kbit/s 384 kbit/s
The communication between interrogator and tag is based on Time DivisionDuplexing/Time Division Multiplexing (TDD/TDM).
6.4 ISO/IEC 18000-6 [9]: Parameters for Air Interface Communications at 860
to 960 MHz
This is half-duplex system. In this group there are 3 types of RFID systems.
Type A:
Interrogator to tag Tag to interrogator
Data coding PIE FM0
8/14/2019 RFID Modulation
18/19
17
Modulation ASK
Modulation index 27% to 100%
Data rate 33 kbps (mean) 40 or 160 kbps
Error control coding 5 bit CRC; 16 bit CRC 16 bit CRC
Type B characteristics:
Interrogator to tag Tag to interrogator
Data coding Manchester FM0
Modulation ASK
Modulation index 18% or 100%
Data rate 10 or 40 kbit/s (according to local regulations)
Error control coding 16 bit CRC
EPC Global had class 1 and class 2 standards which were not compatible with ISO
18000 standards. As EPC Global grew in popularity their new standard - Class1
Generation 2 (Gen2) - was included in ISO 18000-6 part as type C in year 2006.
Type C characteristics:
Interrogator to tag Tag to interrogator
Encoding PIE FM0 or Miller
Modulation DSB-ASK, SSB-ASK or
PRASK (Phase-reversalamplitude shift keying)
PRASK
Modulation depth not less than 80%
Data rates up to 128 kbps up to 320 kbps
Error correction codes 16 bit CRC
6.5 ISO/IEC 18000-7 [9]: Parameters for Air Interface Communications at
433.92 MHz
Interrogator to tag Tag to interrogatorEncoding Manchester
Modulation FSK with frequency deviation of +/- 50 kHz
Data rate 27,7 kbps
Error correction codes 16 bit CRC
Channel bandwidth 500 kHz 200 kHz
ISO/IEC 18000-5 was standard for microwave communications at 5.8 GHz, but
is withdrawn.
8/14/2019 RFID Modulation
19/19
18
References
[1] Wikipedia web page. Last edited 13. april 2013. Available:
http://en.wikipedia.org/wiki/Radio-frequency_identification
[2] Stephen A. Weis, RFID (Radio Frequency Identification): Principles and Applications, MIT
CSAIL, pp. Available: http://www.eecs.harvard.edu/cs199r/readings/rfid-article.pdf
[3] Jerry Banks et al., RFID applied, Wiley & Sons inc., 2007, pp. 61 123.
[4] Harvey Lehpamer, RFID design principles, Artech House inc., 2008, pp. 103132, 223-
227.
[5] Louis E. Frenzel Jr, McGraw Hill, Principles of Electronic Communication Systems
3rdedition, 2008, pp. 840844.
[6] Guang Yang, Coding for passive RFID commuication, Ph. D. dissertation, The
selmer center, department of informatics, University of Bergen, Norway, March
2012, Available:
https://bora.uib.no/bitstream/handle/1956/6208/44996%20Yang%20main_thesis.pdf?sequ
ence=1
[7] rfid.net webpage, last updated: 13 March 2012, Available:
http://rfid.net/basics/196-rfid-standards-101-
[8] Bob Violino, A Summary of RFID Standards, 16 January 2005, Available:
http://www.rfidjournal.com/articles/view?1335/
[9] ISO/IEC 18000 standards: Information technology -- Radio frequency identification for
item management. (ISO/IEC 18000-2:2009, ISO/IEC 18000-3: 2010, ISO/IEC 18000-4: 2008,
ISO/IEC 18000-6: 2013, ISO/IEC 18000-7: 2009)
[10] Darren McCarthy, RFID Technology and Testing 3 February, 2009, Available:
http://www.eetimes.com/design/microwave-rf-design/4019025/RFID-Technology-and-
Testing
[11] Radio-electronics.com webpage, What is GMSK Modulation - Gaussian Minimum Shift
Keying, Available: http://www.radio-electronics.com/info/rf-technology-design/pm-phase-
modulation/what-is-gmsk-gaussian-minimum-shift-keying-tutorial.php