1 of 13

X International conference�“Information Technology and Implementation” (IT&I-2023)�Kyiv, Ukraine

1

Dedicated to the tenth anniversary of the Faculty of Information Technology

A Model of an IoT System Based on RFID Tags for Mine Defense�under War Conditions and in the Post-War Period

M. Gladka, K. Kolesnikova, M. Kostikov, and N. Myronova

2 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

Radio frequency identification (RFID) technology is widely used in various industries. In recent years, RFID has also been explored for military applications. RFID tags can be used to protect military and civilian population during war by providing real-time tracking of people, vehicles and equipment.

However, the use of RFID tags for mine security has not yet been fully explored. The use of mines for the security of territories must comply with international norms and conventions regarding the prohibition of the use of anti-personnel mines, and with the principles of humanitarian law to protect the civilian population and minimize humanitarian consequences.

The use of RFID tags on mines is a solution that fully ensures the implementation of these norms and conventions.

Abstract

2

3 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

Radio frequency identification (RFID) is a technology that uses radio waves for object identification and tracking. RFID tags are small electronic devices that can be attached to objects or implanted in living beings. Each tag contains a unique identifier that can be read by an RFID reader.

The use of RFID tags can have significant advantages for protecting the military and civilians during wartime. RFID tags can be used to track the movement of military personnel, vehicles and equipment, and to monitor the location and condition of critical infrastructure such as power grids, water purification facilities and hospitals.

One of the key advantages of RFID tags is that they can be read remotely, without line of sight or physical contact. This means they can be used in situations when traditional identification methods such as barcodes or QR codes may not be applicable.

Introduction

3

4 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

RFID tags can be important components in mine defense and countering mine threats.

Some ways for using them in this field include:

1. Mine identification and tracking.

2. Ensuring the safety of minesweepers.

3. Identification of safe areas.

4. Inventory of equipment and resources.

5. Reporting and analytics.

4

RFID Tags in Mine Defense�and Combating Mine Threats

5 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

Active RFID tags have their own power sources and can transmit signals over much longer distances than passive tags, making them efficient for use in such tasks. The general algorithm for creating an IoT tag system consists of the following steps:

5

Algorithm for Designing Active RFID Tags�for Use in IoT Mine Safety Systems

Fig. 1: Algorithm for the development of a mine safety system based on RFID tags

6 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

The Friis formula is used to determine signal loss over distance as a function of signal frequency, absorption loss, and signal propagation loss:

6

Calculation of RFID Tags Range

(1)

  • L is the signal loss (dB);
  • d is the distance between the tag and the reader (m);
  • f is the signal frequency (Hz);
  • K is correction factor that takes into account� other signal losses (dB).

The greater the transmission power of the tag and the sensitivity of the reader, the greater is the possible range.

A larger antenna usually provides a longer communication range.

7 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

The environmental conditions such as humidity, surface type, metal obstructions, vegetation and other factors can also affect the signal range:

7

Environmental Conditions and Obstacles

Fig. 2: An example of a surface type for calculating the range of active RFID tags

8 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

8

The Effect of Terrain on the Range of RFID Tags

(2)

  • L is the communication range (m);
  • EIRP is the effective power of the reader transmitter (dBm);
  • Tx is the tag transmitter power (dBm);
  • Rx is the reader receiver sensitivity (dBm);
  • f is the operating frequency of the RFID system (GHz);
  • d is the distance between the tag antenna and the reader antenna (m);
  • PL is the signal loss caused by barriers and other factors (dB).

The main factors that affect the range of active RFID tags include: transmitter power (Tx), receiver sensitivity (Rx), antenna height (H), frequency (f), barriers (path loss), location of antennas (d), reader transmitter power (Effective Isotropic Radiated Power).�

To calculate the approximate range of active RFID tags in specific terrain conditions, we may use the following formula:

9 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

The location of the tags on the earth surface is less than or equal to L which is the distance of the wireless transmission of the equipment and devices fixing the position location.�

When installing the tag directly on the mine itself, tag detection substations can be placed above the surface, both on moving (drones) and non-moving objects. This will allow to quickly determine maps of tag locations on the basis of data exchange.�

A feature of such measurements is the establishment of calibration points and the use of two or more substations (S1, S2, S3) for tag readers.

9

Peculiarities of Measuring the Distance�to RFID Tags on Cross-Country Terrain

10 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

10

The process of detecting the tag (M) on the mine is as follows:�

1. Measuring the calibration point at a distance d(S1, M) from substation S1, d(S2, M) from S2, d(S3, M) from S3.

2. In case of absence of a signal from one of the calibration points, it is rational to use an additional substation or perform calculations based on signal data from at least two substations.

3. Record the absolute strength of the tag detection signal received by substations S1, S2, S3 during signal transmission as P(S1, M), P(S2, M), P(S3, M).

4. According to the received data, generate data for the table of distances to the substation that generates detection data corresponding to the absolute signal strength.

5. Calculate the absolute signal strength of each substation and the absolute signal strength and the ratio of two remote substations.

The Process of Detecting the Tag

11 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

11

When calculating all three positions of the distance between the tag and the reader, we get the positional physical location of the tag to determine the location of the mine.

It is rational to use additional substation readers, and in the case of weak signals to ignore the location data of substations that have the maximal distance to the tag, taking into account the arithmetic mean values for the group of each reference axis with the value of the residual location point.

Therefore, the coordinate points become the physical location of the equipment for determining the location.

Calculating the Position of the Tag

12 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

Military IoT systems based on RFID must be especially reliable and secure. Key aspects of security for these applications include:�

• Data encryption;

• Authentication (passwords etc.);

• Physical security (to prevent physical break-in or theft);

• Protection against interference;

• Audit and monitoring (to identify potential threats);

• Protection against cloning (counterfeit tags → unauthorized access);

• Tactical security (electronic warfare adversary detection);

• Physical security of tags (to protect from damage and destruction);

• Protection against interception or intrusion;

• Anti-spoofing (protection against false signals).

12

Security of RFID-Based IoT Systems

13 of 13

Information Technology and Implementation, November 20, 2023, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

The prospect of using RFID-based IoT devices in military operations promises many opportunities to improve security, efficiency and command.

The use of RFID tags for the positioning of mines is an urgent task for the safety of the military and the population staying in these territories.

This technology allows monitoring the condition of mine fortifications in the territory without saving mine maps or using barrage mines.

The exact range for the identification of a mine tag will depend on the specific conditions of the area (terrain relief leads to signal loss). So, the actual range should be determined by on-site measurements using RFID equipment.

In military applications, information security is crucial. IoT systems open up new opportunities for collecting and sharing information, but at the same time they are becoming more vulnerable to cyber attacks. Therefore, the questions of cyber security must be taken into account.

Conclusions

13