Test: Difference between revisions

From PC5214 wiki
Jump to navigation Jump to search
E0271462 (talk | contribs)
E0271462 (talk | contribs)
Line 30: Line 30:
Step 5: Repeat Step 3 & 4 for different shield parameters to be investigated
Step 5: Repeat Step 3 & 4 for different shield parameters to be investigated


[[File:Setup e0271462.jpeg|400px|thumb|right|Experimental set up for testing shielding properties]]
[[File:Setup e0271462.jpeg|400px|thumb|center|Experimental set up for testing shielding properties]]


==Simulated Emitter==
==Simulated Emitter==

Revision as of 14:07, 30 April 2022

Team members

Radio-Frequency and its applications

Radio-frequency (RF) is a part of the electromagnetic spectrum typically in the range from 10kHz to 300GHz (cite). RF technology is an integral part of our everyday lives. Common examples include phone signals, radio broadcast, ID cards used for various public transport and access control (RFID), various forms of wireless payments which we know as NFC (Near Field Communication). More niche applications of RF would be control electronics, modulation of electro-optical components, ion traps etc.

In the case of RFIDs, there is usually an emitter and receiver. The emitter is usually connected to a power source and is constantly emitting a RF signal. This is known as an active component. The receiver on the other hand only has doesnt have a power supply and is usually powered by the RF wave produced by the emitter. It is also known as a passive component. In the receiver, there is also a microchip which stores data which can be extracted and transmitted through these RF waves back to the emitter to trigger certain actions.

Because most of the information transfer happens in the form of an EM wave, it can be transmitted through free space which removes the need for a physical electrical connection between users and hence the term 'Wireless'. However, just like how physical wired connections could be tapped to steal information or to manipulate data stored, such wireless technology is also susceptible to tampering.

To combat this, developments have been made to protect us from such tampering and the solution is to develop shields around the devices that prevent external EM waves from communicating with the device in the case of passive components.

Some properties which may or may not affect the shield strength would include:

  • Conductivity of material
  • Shape of material
  • Thickness of material
  • Frequency

Setup

To learn about how effective a shield is to RF, we first need to emulate an emitter and a receiver. For the emitter we will be using a function generator (Tektronix AFG 3102) connected to a loop of wire. For the receiver we will be using a second loop of wire that has approximately the same dimensions as the receiver. This will then be connected to an oscilloscope to observe the pick up of the RF signal. The design of the loop of wire is complex and there are proper studies conducted to optimize design for the most effective transfer of EM signal. However, this is not the objective of the experiment and hence a simple wire loop with dimensions comparable to typical RFID tags (5.4cm x 8.6cm) will suffice.

Size comparison of receiver used and typical RFID card (may or may not have been used in the tests)

After the loops of wires are connected to their respective equipment, we then align both the loops of wire close to each other, maximizing the pick up signal from the receiver loop. However, a gap of 2cm is left intentionally between the 2 loops in order to leave room to insert shielding material. To quantify the strength of the signal picked up, we will be using the peak to peak voltage (Vpp) as a metric for the measurements performed.

The experimental sequence goes as follows:
Step 1: Choose a frequency value on the function generator and record Vpp on the oscilloscope
Step 2: Repeat for a list of frequency values and voltage values will act as the maximum signal picked up for a specific frequency
Step 3: Insert a shield material between the 2 loops of wire and record Vpp for that frequency
Step 4: Repeat for all the other frequency values recorded in Step 2
Step 5: Repeat Step 3 & 4 for different shield parameters to be investigated

Experimental set up for testing shielding properties

Simulated Emitter

One of the properties that we might think of intuitively when it comes to shielding is the thickness. Here, we vary the thickness a metal plate between both the loops of wire for a range of frequencies available from the function generator.

data

Another property which we can think of is the size (surface area) of the shield. Similarly, we recorded the signal strength in the oscilloscope for a few sizes of the shield to observe the overall effectiveness for various frequencies.

data

Actual Emitter

After testing with a simulated emitter, we then move on to a real life scenario with actual RFID emitter to test the conditions in which we can shield the actual passive component. To prevent the data from being misused maliciously, we will omit any specific details of the emitter. Firstly, we will look at the emitted signal from the actual emitter along with a shielding plate roughly the size of the receiver

data

Next, we see how the emitted signal is influenced when there is a shield plate present. When the shield plate was between the emitter and receiver, there is no signal picked up by the receiver which indicates that the design of the emitter is not a simple one as simulated in the previous section. Further investigations in that aspect could be done to determine why that is the case. Therefore there is only meaningful information when the receiver is between the shield plate and the emitter. The receiver was kept almost in contact with the emitter while distance of the shield plate to the receiver is varied.

data

We could see that even if the plate is not between the receiver and emitter, the signal picked up is also reduced to some extent, providing a shield for the receiver.

In some cases, there were advice given to not use multiple cards on a emitter. Out of curiosity, we test the receiver along with an actual RFID card meant for the receiver.

data

From the data, we can see that there is some attentuation due to the presence of a second card. However, it is not much and in this case, both changes to both 'cards' could have been made which is usually a non ideal outcome.

Comparison of a shielding plate to a Faraday cage

The shielding mechanism works the same way as how Faraday cages work as portrayed in some movies. For a Faraday cage, when an EM field is applied to a conductor, it causes electrons to move within the conductor such that it produces an opposite field that interferes with the incoming EM field. Hence producing a shielding effect. However, this leads to the question of whether or not we need actual material to cover the entire surface of the plate. To put that to the test, holes were drilled into shielding plate to test the quality of shielding after reducing the amount of material in the shield. We compared 3 cases where there were no holes, 16 holes and 28 holes drilled in to the shield. Nevertheless, all 3 plates were able to shield the actual RFID tag from the actual emitter.

data

Perhaps in the future, more detailed investigation could be performed either experimentally or simulated to investigate various parameters such as:

  • Hole density for different frequency
  • Shape of holes for different frequency