rfid applications

65
RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Upload: roth-elliott

Post on 15-Mar-2016

35 views

Category:

Documents


1 download

DESCRIPTION

RFID Applications. Presented by: Renato Casipe Date : May 3, 2010. RFID (Radio Frequency Identification). Radio Frequency Identification Tags objects Identifies object. RFID and The “Internet of Things” (IoT). Key enabler MIT’s Auto-ID Center (1999) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: RFID Applications

RFID ApplicationsPresented by: Renato Casipe Date : May 3, 2010

Page 2: RFID Applications

RFID (Radio Frequency Identification)

Radio Frequency Identification

Tags objects

Identifies object

Page 3: RFID Applications

RFID and The “Internet of Things” (IoT) Key enabler

MIT’s Auto-ID Center (1999)

Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”

Page 4: RFID Applications

RFID Already a Part of Our Lives Keyless car entry

Gas payment (i.e. Speedpass)

Ski pass

School ID

Page 5: RFID Applications

Sample RFID ApplicationsCredit Card

Page 6: RFID Applications

Sample RFID ApplicationsToll Pass

Page 7: RFID Applications

Sample RFID ApplicationsPassport

Page 8: RFID Applications

Advantages of RFID over Barcode (Source: CIO.com)

Page 9: RFID Applications

Advantages of RFID over Barcode (Source: CIO.com)

Page 10: RFID Applications

Advantages of RFID over Barcode (Source: CIO.com)

Page 11: RFID Applications

RFID System Structure

Yan et al., 2009

Page 12: RFID Applications

RFID Components Tag

Coupling Units

Chips

Sensors

Electronic Product Code (EPC)

Page 13: RFID Applications

RFID Components Reader

Read

Write

Mobile

Fixed

Page 14: RFID Applications

RFID Components Antenna

Transducer

Page 15: RFID Applications

RFID Components Backend System

Page 16: RFID Applications

Tag Types Passive

No battery or onboard power source and Backscatter

Active Onboard power source can transmit signals autonomously

Semi-active / Semi-passive Small battery

Page 17: RFID Applications

Tag Classes

Page 18: RFID Applications

Tag Memory

Passive tags can typically contain about 32 bits to 128 kilobyte of data.

Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).

Page 19: RFID Applications

Tag Frequencies

Page 20: RFID Applications

EPC

EPCglobal.org, 2010

Page 21: RFID Applications

EPC Minimalist Approach Functionality

away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders

Page 22: RFID Applications

Major RFID Adopters Wal-Mart

22 distribution centers

15,000 suppliers

$2 fee/pallet without RFID tag

By 2010

Page 23: RFID Applications

Major RFID Adopters Department of Defense

RFID tagging will be required for all DoD manufacturers and suppliers packaged within

palletized unit

to any DoD location

Page 24: RFID Applications

Major RFID Adopters Others

USDA Animal tagging

MasterCard and Visa Paypass and Wave

Sun Microsystems Java System RFID Software

Page 25: RFID Applications

ROI Seen

Tagging at container level

Item level for higher value stuff

Sensors

Page 26: RFID Applications

RFID Adoption Barriers Privacy Concerns

Cost

ROI

Business Processes Change

Standards

Page 27: RFID Applications

Privacy Concerns

Syverson et.al., 2005

Page 28: RFID Applications

Privacy Concerns Should EU RFID policy draft be implemented

40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170)

Notification Disable on demand Human implantation on consent No tags on state issued id’s.

o

Page 29: RFID Applications

Privacy Concerns

Encryption algorithms

Traditional Security features.

Page 30: RFID Applications

Privacy Concerns

Page 31: RFID Applications

Security Threat Corporate espionage threat

Competitive marketing threat

Infrastructure threat

Trust perimeter threat

Page 32: RFID Applications

Privacy Threat

Action

Association

Location

Page 33: RFID Applications

Privacy Threat

Preference

Constellation

Transaction

Page 34: RFID Applications

Privacy Threat Breadcrumb

Cloning

Page 35: RFID Applications

Privacy Threat

Page 36: RFID Applications

Some Solutions to Privacy Threat Killing

Sleeping

Password

Pseudonyms

Page 37: RFID Applications

Some Solutions to Privacy Threat Encryption

Proxy

Blocking

Page 38: RFID Applications

Specific RFID Applications

Product Monitoring

Online Payment

Attendance System

Page 39: RFID Applications

RFID in Product Monitoring

Page 40: RFID Applications

RFID in Product Monitoring

Page 41: RFID Applications

RFID in Product Monitoring

Page 42: RFID Applications

RFID in Product Monitoring

Page 43: RFID Applications

RFID in Product Monitoring

Page 44: RFID Applications

RFID in Product Monitoring

Page 45: RFID Applications

RFID in Product Monitoring

Page 46: RFID Applications

RFID in Online Payment Motivating Scenario

Renato forgot his credit shopping at Lowe’s.

A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online

Renato lost mental peace, and credit card company waste resources investigating the dispute.

$11.6 Billion online payment transaction on 2009

Page 47: RFID Applications

Current credit card transaction for remote shopping

Page 48: RFID Applications

Proposed architecture for remote credit card transactions

Page 49: RFID Applications

System Operation

Registration Phase

Transaction Phase

Reset Phase

Page 50: RFID Applications

Role of mobile-phone

Page 51: RFID Applications

Role of RFID tag

Store encrypted data

Page 52: RFID Applications

Role of keys

Page 53: RFID Applications

Registration Phase

Page 54: RFID Applications

Registration Flowchart

Page 55: RFID Applications

Activation Process

Page 56: RFID Applications

Mobile-phone flowchart

Page 57: RFID Applications

Transaction Phase

Page 58: RFID Applications

Reset Phase

MRVKEY is deleted from MRVKEY table.

MRAKEY is rendered useless as a result as it can not be validated from the middleware.

Happens when security is breached.

Page 59: RFID Applications

Scenarios Loss RFID credit card

Loss mobile phone

Loss both

Page 60: RFID Applications

Other Applications Drug Index Safety System (DISS)

Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting

Page 61: RFID Applications

Other Applications Bicycle Safety

Page 62: RFID Applications

Other Applications Warehousing

Space Time Array Readers (by Mojix)

Page 63: RFID Applications

Other Applications Security

Page 64: RFID Applications

Scariest Uses of RFID in 2007

http://www.rfidgazette.org/2007/04/top_15_weirdest.html

Page 65: RFID Applications

Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India Email: {Geetha_Priya, Srividya_Gopalan}@satyam.com

Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China [email protected]

RFID Journal March/April 2008 www.rfidjournal.com

RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne