rfid applications presented by: renato casipe date : may 3, 2010

65
RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Post on 19-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID ApplicationsPresented by: Renato Casipe Date : May 3, 2010

Page 2: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID (Radio Frequency Identification)

Radio Frequency Identification

Tags objects

Identifies object

Page 3: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID and The “Internet of Things” (IoT) Key enabler

MIT’s Auto-ID Center (1999)

Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”

Page 4: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Already a Part of Our Lives Keyless car entry

Gas payment (i.e. Speedpass)

Ski pass

School ID

Page 5: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Sample RFID ApplicationsCredit Card

Page 6: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Sample RFID ApplicationsToll Pass

Page 7: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Sample RFID ApplicationsPassport

Page 8: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Advantages of RFID over Barcode (Source: CIO.com)

Page 9: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Advantages of RFID over Barcode (Source: CIO.com)

Page 10: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Advantages of RFID over Barcode (Source: CIO.com)

Page 11: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID System Structure

Yan et al., 2009

Page 12: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Components Tag

Coupling Units

Chips

Sensors

Electronic Product Code (EPC)

Page 13: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Components Reader

Read

Write

Mobile

Fixed

Page 14: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Components Antenna

Transducer

Page 15: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Components Backend System

Page 16: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Tag Types

Passive No battery or onboard power source and Backscatter

Active Onboard power source can transmit signals autonomously

Semi-active / Semi-passive Small battery

Page 17: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Tag Classes

Page 18: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Tag Memory

Passive tags can typically contain about 32 bits to 128 kilobyte of data.

Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).

Page 19: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Tag Frequencies

Page 20: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

EPC

EPCglobal.org, 2010

Page 21: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

EPC Minimalist Approach Functionality

away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders

Page 22: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Major RFID Adopters Wal-Mart

22 distribution centers

15,000 suppliers

$2 fee/pallet without RFID tag

By 2010

Page 23: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Major RFID Adopters Department of Defense

RFID tagging will be required for all DoD manufacturers and suppliers packaged within

palletized unit

to any DoD location

Page 24: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Major RFID Adopters Others

USDA Animal tagging

MasterCard and Visa Paypass and Wave

Sun Microsystems Java System RFID Software

Page 25: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

ROI Seen

Tagging at container level

Item level for higher value stuff

Sensors

Page 26: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID Adoption Barriers Privacy Concerns

Cost

ROI

Business Processes Change

Standards

Page 27: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Concerns

Syverson et.al., 2005

Page 28: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Concerns Should EU RFID policy draft be implemented

40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170)

Notification Disable on demand Human implantation on consent No tags on state issued id’s.

o

Page 29: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Concerns

Encryption algorithms

Traditional Security features.

Page 30: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Concerns

Page 31: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Security Threat

Corporate espionage threat

Competitive marketing threat

Infrastructure threat

Trust perimeter threat

Page 32: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Threat

Action

Association

Location

Page 33: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Threat

Preference

Constellation

Transaction

Page 34: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Threat Breadcrumb

Cloning

Page 35: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Privacy Threat

Page 36: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Some Solutions to Privacy Threat Killing

Sleeping

Password

Pseudonyms

Page 37: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Some Solutions to Privacy Threat Encryption

Proxy

Blocking

Page 38: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Specific RFID Applications

Product Monitoring

Online Payment

Attendance System

Page 39: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 40: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 41: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 42: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 43: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 44: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 45: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Product Monitoring

Page 46: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

RFID in Online Payment Motivating Scenario

Renato forgot his credit shopping at Lowe’s.

A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online

Renato lost mental peace, and credit card company waste resources investigating the dispute.

$11.6 Billion online payment transaction on 2009

Page 47: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Current credit card transaction for remote shopping

Page 48: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Proposed architecture for remote credit card transactions

Page 49: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

System Operation

Registration Phase

Transaction Phase

Reset Phase

Page 50: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Role of mobile-phone

Page 51: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Role of RFID tag

Store encrypted data

Page 52: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Role of keys

Page 53: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Registration Phase

Page 54: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Registration Flowchart

Page 55: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Activation Process

Page 56: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Mobile-phone flowchart

Page 57: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Transaction Phase

Page 58: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Reset Phase

MRVKEY is deleted from MRVKEY table.

MRAKEY is rendered useless as a result as it can not be validated from the middleware.

Happens when security is breached.

Page 59: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Scenarios Loss RFID credit card

Loss mobile phone

Loss both

Page 60: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Other Applications Drug Index Safety System (DISS)

Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting

Page 61: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Other Applications Bicycle Safety

Page 62: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Other Applications Warehousing

Space Time Array Readers (by Mojix)

Page 63: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Other Applications Security

Page 64: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Scariest Uses of RFID in 2007

http://www.rfidgazette.org/2007/04/top_15_weirdest.html

Page 65: RFID Applications Presented by: Renato Casipe Date : May 3, 2010

Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards

Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited

SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India

Email: {Geetha_Priya, Srividya_Gopalan}@satyam.com

Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products

Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China [email protected]

RFID Journal March/April 2008 www.rfidjournal.com

RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne