rfid applications
DESCRIPTION
RFID Applications. Presented by: Renato Casipe Date : May 3, 2010. RFID (Radio Frequency Identification). Radio Frequency Identification Tags objects Identifies object. RFID and The “Internet of Things” (IoT). Key enabler MIT’s Auto-ID Center (1999) - PowerPoint PPT PresentationTRANSCRIPT
RFID ApplicationsPresented by: Renato Casipe Date : May 3, 2010
RFID (Radio Frequency Identification)
Radio Frequency Identification
Tags objects
Identifies object
RFID and The “Internet of Things” (IoT) Key enabler
MIT’s Auto-ID Center (1999)
Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”
RFID Already a Part of Our Lives Keyless car entry
Gas payment (i.e. Speedpass)
Ski pass
School ID
Sample RFID ApplicationsCredit Card
Sample RFID ApplicationsToll Pass
Sample RFID ApplicationsPassport
Advantages of RFID over Barcode (Source: CIO.com)
Advantages of RFID over Barcode (Source: CIO.com)
Advantages of RFID over Barcode (Source: CIO.com)
RFID System Structure
Yan et al., 2009
RFID Components Tag
Coupling Units
Chips
Sensors
Electronic Product Code (EPC)
RFID Components Reader
Read
Write
Mobile
Fixed
RFID Components Antenna
Transducer
RFID Components Backend System
Tag Types Passive
No battery or onboard power source and Backscatter
Active Onboard power source can transmit signals autonomously
Semi-active / Semi-passive Small battery
Tag Classes
Tag Memory
Passive tags can typically contain about 32 bits to 128 kilobyte of data.
Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).
Tag Frequencies
EPC
EPCglobal.org, 2010
EPC Minimalist Approach Functionality
away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders
Major RFID Adopters Wal-Mart
22 distribution centers
15,000 suppliers
$2 fee/pallet without RFID tag
By 2010
Major RFID Adopters Department of Defense
RFID tagging will be required for all DoD manufacturers and suppliers packaged within
palletized unit
to any DoD location
Major RFID Adopters Others
USDA Animal tagging
MasterCard and Visa Paypass and Wave
Sun Microsystems Java System RFID Software
ROI Seen
Tagging at container level
Item level for higher value stuff
Sensors
RFID Adoption Barriers Privacy Concerns
Cost
ROI
Business Processes Change
Standards
Privacy Concerns
Syverson et.al., 2005
Privacy Concerns Should EU RFID policy draft be implemented
40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170)
Notification Disable on demand Human implantation on consent No tags on state issued id’s.
o
Privacy Concerns
Encryption algorithms
Traditional Security features.
Privacy Concerns
Security Threat Corporate espionage threat
Competitive marketing threat
Infrastructure threat
Trust perimeter threat
Privacy Threat
Action
Association
Location
Privacy Threat
Preference
Constellation
Transaction
Privacy Threat Breadcrumb
Cloning
Privacy Threat
Some Solutions to Privacy Threat Killing
Sleeping
Password
Pseudonyms
Some Solutions to Privacy Threat Encryption
Proxy
Blocking
Specific RFID Applications
Product Monitoring
Online Payment
Attendance System
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Online Payment Motivating Scenario
Renato forgot his credit shopping at Lowe’s.
A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online
Renato lost mental peace, and credit card company waste resources investigating the dispute.
$11.6 Billion online payment transaction on 2009
Current credit card transaction for remote shopping
Proposed architecture for remote credit card transactions
System Operation
Registration Phase
Transaction Phase
Reset Phase
Role of mobile-phone
Role of RFID tag
Store encrypted data
Role of keys
Registration Phase
Registration Flowchart
Activation Process
Mobile-phone flowchart
Transaction Phase
Reset Phase
MRVKEY is deleted from MRVKEY table.
MRAKEY is rendered useless as a result as it can not be validated from the middleware.
Happens when security is breached.
Scenarios Loss RFID credit card
Loss mobile phone
Loss both
Other Applications Drug Index Safety System (DISS)
Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting
Other Applications Bicycle Safety
Other Applications Warehousing
Space Time Array Readers (by Mojix)
Other Applications Security
Scariest Uses of RFID in 2007
http://www.rfidgazette.org/2007/04/top_15_weirdest.html
Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India Email: {Geetha_Priya, Srividya_Gopalan}@satyam.com
Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China [email protected]
RFID Journal March/April 2008 www.rfidjournal.com
RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne