rfid

41
Acknowledgment I have taken efforts in this report. However, it would not have been possible without the kind support and help of many individuals. I would like to extend my sincere thanks to all of them. I am highly indebted to Ms.Gurpreet Kaur for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the project. I would also like to thank Mrs. Suneat Mam and Mrs.Renu Vij for helping me to select this topic and giving me a chance to go into depth of this topic. I would like to express my gratitude towards my parents & my friends for their kind co-operation and encouragement which help me in completion of this report. 1

Upload: pranav-jain

Post on 25-Oct-2015

15 views

Category:

Documents


2 download

DESCRIPTION

brief about rfids

TRANSCRIPT

Page 1: Rfid

Acknowledgment

I have taken efforts in this report. However, it would not have been possible

without the kind support and help of many individuals. I would like to extend

my sincere thanks to all of them.

I am highly indebted to Ms.Gurpreet Kaur for their guidance and constant

supervision as well as for providing necessary information regarding the project

& also for their support in completing the project.

I would also like to thank Mrs. Suneat Mam and Mrs.Renu Vij for helping me

to select this topic and giving me a chance to go into depth of this topic.

I would like to express my gratitude towards my parents & my friends for their

kind co-operation and encouragement which help me in completion of this

report.

1

Page 2: Rfid

TABLE OF CONTENTS

CHAPTER NO.

TITLE PAGE NO.

ABSTRACT 3

1 INTRODUCTION 4 1.1 HISTORY 4 1.2 AUTO ID TECHNOLOGIES 5 2 RFID TECHNOLOGY DESCRIPTION 6 2.1 RFID TAGS 7 2.2 RFID READERS 11 2.3 BACK-END DATABASE 11 2.4 THE METHOD OF WIRELESS SIGNALS

USED FOR COMMUNICATION BETWEEN THE TAG AND READER

11

3 CURRENT RFID APPLICATIONS 13

4 STANDARDS 16

4.1 RFID FREQUENCY SPECTRUM 16

4.2 RFID STANDARDS 16

5 SECURITY AND PRIVACY ISSUES 22

5.1 THRAETS 23

5.2 SOLUTIONS 25

6 CONCLUSION 27

References 28

2

Page 3: Rfid

Abstract

Radio Frequency Identification (RFID) systems are a common and useful tool

in manufacturing, supply chain management and retail inventory control.

Optical barcodes, another common automatic identification system, have been a

familiar packaging feature on consumer items for years.

Due to advances in silicon manufacturing technology, RFID costs have dropped

significantly. In the near future, low-cost RFID “electronic product codes” or

“smart-labels” may be a practical replacement for optical barcodes on consumer

items.

Apart from this RFID’s are also proving useful in automatic systems like auto

toll collections, automatic payments, healthcare and, animal and human tracking

systems. With advancement in technology these are also part of mobile systems

in form of NFCs.

This report gives a brief introduction of rfid technology , its advantages nd

applications. A brief discussion regarding security and privcy issues is also

made.

3

Page 4: Rfid

Chapter-1

Introduction

Although the foundation of the Radio Frequency Identification (RFID)

technology was laid by past generations, only recent advances opened an

expanding application range to its practical implementation

1.1. History

It’s generally said that the roots of radio frequency identification technology can

be traced back to World War II. The Germans, Japanese, Americans and British

were all using radar—which had been discovered in 1935 by Scottish physicist

Sir Robert Alexander Watson-Watt—to warn of approaching planes while they

were still miles away. The problem was there was no way to identify which

planes belonged to the enemy and which were a country’s own pilots returning

from a mission.

Under Watson-Watt, who headed a secret project, the British developed the first

active identify friend or foe (IFF) system. They put a transmitter on each British

plane. When it received signals from radar stations on the ground, it began

broadcasting a signal back that identified the aircraft as friendly. RFID works

on this same basic concept. A signal is sent to a transponder, which wakes up

and either reflects back a signal (passive system) or broadcasts a signal (active

system).

There is no one definitive “RFID technology”; there is a wide range of technical

solutions ranging from simple, inexpensive, and common to those with more

functionality, performance and cost

4

Page 5: Rfid

1.2 Auto Id technologies

Automatic identification and data capture (AIDC) refers to the methods of

automatically identifying objects, collecting data about them, and entering that

data directly into computer systems (i.e. without human involvement).

RFID is one of the technologies covered under automatic identification

techniques

Technologies typically considered as part of AIDC include:

 bar codes, biometrics, magnetic stripes, Optical Character Recognition

(OCR), smart cards, and voice recognition,etc.

AIDC is also commonly referred to as “Automatic Identification,” “Auto-ID,”

and "Automatic Data Capture.

5

Page 6: Rfid

Chapter-2

RFID basics

Fig.1 basic RFID system

In its simplest form in common use today, an RFID system consists of four elements, as shown in Figure 1. : Tags, antenna, reader and host computer.

The functions of these are:

• The RFID tag, or transponder, carries object identifying data.

• The RFID tag reader, or transceiver, reads and writes tag data.

• Antennas enable connection between tags and the reader.

• The back-end database (host computers) stores records associated with tag contents

6

Page 7: Rfid

2.1 RFID tags

Every object to be identified in an RFID system is physically labeled with a tag.

Tags are typically composed of a microchip for storage and computation, and a

coupling element, such as an antenna coil for communication. Tags may also

contain a contact pad, as found in smart cards. Tag memory may be read-only,

write-once read-many or fully rewritable.

2.1.1. Tags classification on basis of power source

A key classification of RFID tags is the source of power. Tags may come in

three flavours: active, semi-passive and passive.

Active tags contain an on-board power source, such as a battery, as well as the

ability to initiate their own communications; possibly with other tags.

Semi-passive tags have a battery, but may only respond to incoming

transmissions.

Passive tags receive all power from the reader and necessarily cannot initiate

any communications.

Passive Semi-Passive Active

Power Source Passive Passive Battery

Transmitter Passive Passive Active

Max. Range 10m 100m 1000m

Table 1. Active, passive and semi Passive tags

A tag’s power source determines both its range and cost. Passive tags are the

cheapest

to manufacture and incorporate into packaging, yet have the shortest read range.

Semi-passive tags have moderate range and cost, while active tags have the

7

Page 8: Rfid

greatest range and cost. Semi-passive and active tags’ on-board power source

may also power a clock or integrated sensors.

Passive Tags

Fig. 1 . - Simple rfid system with passive tads

Passive tags systems are reader talk first. The tags are mute until a signal is

received from a reader. Passive RFID systems can read multiple tags at once. In

a process called “singulation,” the reader will rapidly cycle through tags and

determine which ones are present. There are many methods of singulation, but

the principle of identifying a single tag is the same. This is very important when

trying to quickly identify all tags in the reader’s field, and is also important

when trying to speak to specific tags.

8

Page 9: Rfid

Fig. 2- Rfid system with active tags

Active Tags

An active tag talks first – that is, it beacons.

Since the tag is not depending on a reader to be energized, and because signal

processing technology is so powerful, active tags can be read at much greater

ranges than passive tags. Active tags can also be used for positioning

determining the XYZ location of the tag – through a process of triangulation.

Since there is a communications channel involved, active tags can be integrated

with sensor devices, such as temperature, location or motion sensors. These

devices can take samples from the sensors, store them, and send them back to

the reader along with the standard beacon signal.

9

Page 10: Rfid

2.1.2. Tag classification on basis of functionality

It is also convenient to classify tags by their functionality. The MIT Auto-ID

Center has defined five classes based on functionality. We offer similar

classifications defined below and in Table 2.2:

Class 0: Class 0 tags are the most primitive tag, offering only electronic article

surveillance (EAS) functionality. EAS tags only announce their presence and do

not contain any unique identifying data. Class 0 tags may be “chipless” –

containing no logic. They are frequently found in library books or compact

discs.

Class 1: Class 1 tags contain unique identifying data stored in read-only or

write-once read-many (WORM) memory. Class 1 tags will typically be passive,

although may be semi-passive or active. Class 1 tags function as simple

identifiers.

Class 2: Class 2 tags have read-write memory, which allows them to act as

logging devices. Class 2 tags may be recycled and used to identify many

different items throughout their lifetime. Although Class 2 could be passive,

they are more likely to be semi-passive or active.

Class 3: Class 3 tags contain on-board environmental sensors. These may record

temperature, acceleration, motion or radiation. To be more useful than a

memory less sensor, Class 2 tags require writable storage. Since sensor readings

must be taken in absence of a reader, Class 3 tags are necessarily semi-passive

or active.

Class 4: Class 4 tags may establish ad hoc wireless networks with other tags.

Since they may initiate communication, Class 4 tags are necessarily active.

Functionally, these tags lie in the realm of ubiquitous computers or “smart-

dust”.

10

Page 11: Rfid

2.2 RFID Readers

The second major component of RFID systems is the reader. For passive tags,

readers energize the tags with energy, receive the results and frequently handle

the low‐level anti‐collision algorithms that allow readers to read more than one

tag at a time. For active tags, readers are responsible for listening for the tags’

beaconing, and for communicating with other readers to determine positioning.

Readers are generally controlled via a software application programming

interface (API) that is provided by the reader manufacturer. Generally, the API

also allows for configuring the reader’s read cycle, power or other settings.

2.3 Back-End Database

Readers may use tag contents as a look-up key into a back-end database. The

back-end database may associate product information, tracking logs or key

management information with a particular tag. Independent databases may be

built by anyone with access to tag contents. This allows unrelated users along

the supply chain to build their own applications.

2.4 The method of wireless signal used for communication

between the tag and reader

1. Induction

-Close proximity electromagnetic, or inductive coupling—near field

- Generally use. LF and HF frequency bands

11

Page 12: Rfid

Fig. 3

2. Propagation

- Propagating electromagnetic waves—far field

- Operate in the UHF and microwaves frequency bands

Fig. 4

12

Page 13: Rfid

Chapter – 3

RFID Technology advantages and applications

Advantages of RFID Technology

1. Tag detection don’t require human intervention and hence reduce human

error from data collection.

2. No line of sight is required, tag placement is not a constrained

3. RFID tags have a longer read range than bar codes

4. Tags can have read writ capability

5. An RFID tag can store large amount of data additionally to unique

identifier

6. Many tags can be read simultaneously

7. RFID tags can be combined with sensors

Current RFID applications:

1. Manufacturing and supply chain management:

A popular, emerging application of RFID is in the area of supply chain

visibility. The trend is to attach an RFID tag containing a unique

identifier to an object at its point of manufacture. This tag would then be

read at various intervals up to its point of sale. Manufacturers, retailers

and third party logistics providers are in differing states of pilots on

products, with the major target benefits being reduction in inventory, a

13

Page 14: Rfid

decrease in material handling time, safer and more secure supply chains,

and potential post sale applications.

Major retailers such as Wal*Mart, Best Buy and Albertsons are leading

the charge, mandating usage of RFID tags on cases and pallets. Furthermore,

the U.S. Department of Defense (DoD) has issued similar mandates for its

suppliers, also at the case and pallet level. These retailers and the DoD are all

specifying the use of UHF band chips in the EPCglobal standard

2. Toll Collection:

In many states, toll collection for vehicles traveling at or near highway

speeds is accomplished through the use of active RFID tags. There are many

systems available today: This prose is under process in India. In Parwano,

near Panchkula became India’s first auto toll collection Highway. Mumbai –

Ahmadabad highway became India’s first interoperable electronic toll

collection system in April 2013.

3. Animal Tracking:

RFID has a long history of being used for animal tracking. From livestock

management (for animal movement, feeding, health, and market visibility) to

pet tracking, RFID is relatively mature in this field. Animal tracking can be

considered one of the largest implementations of asset management using

RFID. Generally speaking, low frequency tags are used for animal tracking.

4. E-Passport:

A biometric passport, also known as an e-passport, e-Passport or a digital

passport, is a combined paper and electronic passport that contains

biometric information that can be used to authenticate the identity of

travellers. It uses RFID technology, including a microprocessor chip

(computer chip) and antenna (for both power to the chip and

14

Page 15: Rfid

communication) embedded in the front or back cover, or centre page, of

the passport. Document and chip characteristics are documented in

the International Civil Aviation Organization's (ICAO) Doc 9303. The

passport's critical information is both printed on the data page of the

passport and stored in the chip. Public Key Infrastructure (PKI) is used to

authenticate the data stored electronically in the passport chip making it

expensive and difficult to forge when all security mechanisms are fully

and correctly implemented.

5. Safety:

Indian schools are all set to implement a high-tech solution that will

enable the school and parents to monitor students’ entry into and exit

from school,  called RFID and GPS based tracking system; the state-of-

an-art monitoring system will already been adopted by many renowned

schools and the process of adoption is still going on.

Apart from these other application areas of RFID include:

1. Healthcare

2. Luggage Handling

3. Library Inventory management

4. Smart car key

5. Access control and identification

15

Page 16: Rfid

Chapter- 4

RFID Standards

RFID standards are developed and issued by international, regional, national,

and industry specific entities. The more global the standard, the more entities

are involved in the development. Very often, a standard issued by one entity is

applicable to a standard being developed by another entity.

4.1 The RFID frequency spectrum

RFID is considered as a non specific short range device. It can use frequency

bands without a license. Nevertheless, RFID has to be compliant with local

regulations (ETSI.)

1. 1. LF: 125 kHz – 134.2 kHz, FCC etc: low frequencies

2. 2. HF: 13.56 MHz: high frequencies

3. 3. UHF: 860 MHz - 960 MHz: ultra high frequencies

4. 4. SHF: 2.45 GHz: super high frequencies 

5. These frequency bands normally belong to ISM bands.

The Electronic Product Code (EPC) is designed as a universal identifier that

provides a unique identity for every physical object anywhere in the world, for

all time. Its structure is defined in the EPCglobal Tag Data Standard

In India frequencies allocated for electronic product code is 965-967MHz.

4.2 RFID STANDRDS

RFID standards are created to:

1. Help to ensure that products inter-operate between different entities

(commercial, government, etc). 

16

Page 17: Rfid

2. Provide guidelines in which to develop complementary and

interoperable products (tags, readers, software, and accessories).

3. Broaden markets and thereby encourage competition which should

result in lower prices for users of RFID products that adhere to

standards.

4. Increase confidence in new technologies.

.

There are standards relating to different aspects of RFID:

Air Interface Communications protocol standards typically define how the

reader and the tag 'talk' to one another. This includes the:

1. Physical characteristics of the radio communication sometimes called the

'physical layer'

2. Structure of commands and responses.

3. "Anti-collision" algorithm or method of detecting and communicating with

only one tag when more than one tag is present.

Data content standards describe how information is to be formatted, such as

what is stored on an RFID tag.

Device communication standards explain how data is communicated from the

reader to computer.

17

Page 18: Rfid

Application Standards illustrate how products are to be used, such as where do I

place label.

Conformance standards provide instructions on how a specific device is to be

evaluated to ensure it complies with a standard.

Many RFID Systems have their standard categorized as "Identification cards" or

"Contactless integrated circuit(s) cards". There are specific RFID standards for

the identification of tires, wheels, freight containers, reusable plastic containers,

and even animals. All of these types of standards must be considered and

adhered to when designing a product, such as a RFID Tag or a RFID Reader.

Additionally, many products support more than one standard.

The leading bodies issuing RFID related standards are:

International Organizations

IEC - International Electrotechnical Commission

ISO - International Standards Organization

GS1 – EPCglobal

JTC 1 – A joint committee of ISO and IEC (Joint Technical Committee)

Regional

CEN - European Committee for Standardization

NAFTA - North American Free Trade Agreement

Industry Specific

18

Page 19: Rfid

AAR - Association of American Railroads S-918 mandated standard for

automatic equipment identification.

AIAG - Automotive Industry Standards Group; includes Tire and Wheel Label

and Radio Frequency Identification (RFID) Standard (also known as AIAG B-

11)

ATA - American Trucking Associations standard for automatic equipment

identification.

ASTM - American Society for Testing and Materials

IATA - International Air Transport Association

Organizations that issue Radio Frequency standards

ETSI - European Telecommunications Standards Institute 

FCC - United States Federal Communications Commission

ERO - European Radio-communications Office 

A brief description of some of these is as:

ISO:

ISO manages several standards related to the area of RFID. ISO 11784/11785

relates to animal tracking. ISO 14443A/14443B relates to proximity style RFID

while ISO 15963 relates to vicinity tagging. ISO 18000 pertains to radio

frequency identification for item management, and contains six subsections

covering differing frequency ranges. There are many other ISO standards

relating to test methods, APIs and conformance standards.

19

Page 20: Rfid

ICAO

The International Civil Aviation Organization (ICAO) is another standards body

creating RFID related standards. In 2003, ICAO specified the technical

requirements for RFID technology used in electronic passports. These

specifications were published in ICAO Doc 9303, and are the focus of the

ePassport activities taking place within Department of State.

GS1

GS1 is an international not-for-profit association with Member Organisations in

over 100 countries.

GS1 is dedicated to the design and implementation of global standards and

solutions to improve the efficiency and visibility of supply and demand chains

globally and across sectors. The GS1 system of standards is the most widely

used supply chain standards system in the world.

Most companies initially come to GS1 to get a bar code number for their

products. However, GS1 standards provide a much wider framework for supply

chain visibility. The current architecture of GS1 standards is as follows:

Identify: Standards for the identification of items, locations, shipments, assets,

etc.. and associated data

Capture: Standards for encoding and capturing data in physical data carriers

such as barcodes and RFID tags

Share: Standards for sharing data between parties

GS1 identification standards do not provide identification of country of origin

for a given product. Member companies may manufacture products anywhere in

the world.

20

Page 21: Rfid

IEC

ISO/IEC 18000-6:2013 defines the air interface for radio frequency

identification (RFID) devices operating in the 860 MHz to 960 MHz Industrial,

Scientific, and Medical (ISM) band used in item management applications. It

provides a common technical specification for RFID devices that can be used by

ISO committees developing RFID application standards.

SO/IEC 18000-6:2013 together with ISO/IEC 18000-61, ISO/IEC 18000-62,

ISO/IEC 18000-63 and ISO/IEC 18000-64 specifies the physical and logical

requirements for a passive-backscatter, Interrogator-Talks-First (ITF) or tag-

only-talks-after-listening (TOTAL) RFID system. The system comprises

Interrogators, also known as readers, and tags, also known as labels.

21

Page 22: Rfid

Chapter-5

Security and Privacy Issues:

The great efficiency gains offered by RFID systems may come at the cost of

both privacy and security. Vulnerabilities to physical attacks, counterfeiting,

spoofing, eavesdropping, traffic analysis or denial of service could all threaten

unprotected tags.

Each of these risks may affect the privacy and security of both individuals and

organizations. A cast of human characters will represent various attacks against

RFID systems.

1. Phyllis: Phyllis is the strongest attacker. She may conduct physical

attacks against tags. Phyllis is assumed to be able to physically obtain

tags and conduct sophisticated attacks in a laboratory setting. Her attacks

may include probe attacks, material removal through shaped charges or

water etching, energy attacks, radiation imprinting, circuit disruption or

clock glitching.

2. Mallory: Mallory does not have physical tag access, but may actively

participate in protocols or construct her own counterfeit tags. Mallory

may initiate queries to tags or respond to reader queries at will.

3. Eve: Eve plays a passive role. She cannot actively take part in protocols

and is limited to eavesdropping. Eve may only listen to “logical”

messages - the 1’s and 0’s transmitted in protocols.

4. Tracy: Tracy is weaker than Eve. Tracy cannot read the contents of

messages, but still may detect their presence. In other words, Tracy is

limited to traffic analysis and may detect how many and when messages

are sent. Tracy may conduct attacks against “location privacy”. In some

situations, Tracy may be as threatening as Eve.

22

Page 23: Rfid

5. Denise: Denise is the weakest of all the characters. She can neither read

nor even detect the presence of messages. Denise is limited to disrupting

broadcasts, blocking messages or any other denial of service attacks. As

RFID becomes more main stream, Denise’s attacks may become ever

more damaging.

Such kind of attacks poses certain threats which are as:

5.1 Threats

Corporate data security threats

1. Corporate espionage threat: Tagged objects in the supply chain make it easier for competitors to remotely gather supply chain data, which is some of industry’s most confidential information. For example, an agent could purchase a competitor’s products from several locations, then monitor the locations’ replenishment dynamics. In some scenarios, they could read tags in a store or even as the merchandise is unloaded. Because tagged objects are uniquely numbered, it’s easier for competitors to unobtrusively gather large volumes of data.

2. Competitive marketing threat: Tagged objects make it easier for competitors to gain unauthorized access to customer preferences and use the data in competitive marketing scenarios.

3. Infrastructure threatI: This is not a threat specific to RFID per se. However, a corporate infrastructure that’s dependent on easily jammed radio frequency signals makes organizations susceptible to new kinds of denial-of-service attacks. Such attacks could be especially devastating as RFID becomes a mission-critical component of corporate infrastructure.

4. Trust perimeter threat: Although not specific to RFID, as organizations increasingly share larger volumes of data electronically, the sharing mechanisms offer new opportunities for attack.

23

Page 24: Rfid

Personal privacy threats

1. Action threat: In this threat, an individual’s behavior (or possibly his or her intent) is inferred by monitoring the action of a group of tags. Some manufacturers of “smart shelves,” for example, have suggested that the sudden disappearance of tags corresponding to several high-value objects might indicate that a person plans to shoplift, and could result in the person’s photograph being taken. However, said tags might also disappear if the person accidentally knocked the tagged objects to the floor.

2. Association threat. When a customer purchases an EPC- tagged item, the customer’s identity can be associated with the item’s electronic serial number. This threat is fundamentally different than the current practice of associating customer loyalty cards with purchases, because the EPC associates the consumer with a specific item (a unique aspirin package)rather than with a class of items (an aspirin package). Also, unlike with loyalty cards, this type of association can be clandestine and even involuntary.

3. Location threat: Placing covert readers at specific locations creates two types of privacy threats. First, individuals carrying unique tags can be monitored and their location revealed if the monitoring agency knows the tags associated with those individuals. Second, a tagged object’s location—regardless of who (or what) is carrying it—is susceptible to unauthorized disclosure.

4. Preference threat: With the EPC network, the tag on an item uniquely identifies the manufacturer, the product type, and the item’s unique identity. This exposes otherwise unavailable customer preferences to competitive (and inquisitive) forces at low marginal cost. This is also a value threat if the adversary can easily determine the item’s monetary value. A common example of this threat is a thief who targets victims based on their preferences (such as for high-value RFID-containing watches rather than low-cost ones).

5. Constellation threat: Regardless of whether individual identity is associated with a tag set or not, the tags form a unique RFID shadow or constellation around the person. Adversaries can use this constellation to track people, without necessarily knowing their identities.

24

Page 25: Rfid

6. Transaction threat. When tagged objects move from one constellation to another, it is easy to infer a transaction between the individuals associated with those constellations.

7. Breadcrumb threat: This threat is also a consequence of association. As individuals collect tagged items, they’re building an items database associated with their identity in corporate information systems. When they discard these electronic breadcrumbs, the association between them and the items isn’t broken. The threat arises when discarded breadcrumbs are used, for example, to commit a crime or some other malicious act. The only identity associated with the breadcrumb is that of the original owner, who is liable, at the very least, to be bothered by law enforcement.

5.2 Solutions

1. Tag Killing

It would be ideal if we could address RFID’s privacy and security threats by making minor modifications to the technology itself. Technical solutions have great appeal. Implementation and testing costs are fixed and up-front. Once developed, the solutions can be directly integrated into the product and usually require little user education or regulatory enforcement.

Indeed, the Auto-ID Center explicitly designed the EPC kill command as a pro-privacy technology. The designers realized that EPC tags might be irretrievably embedded in consumer devices and that consumers might not want to be tracked. They viewed killing EPC tags at the point-of-sale as an easy way out of the apparent privacy dilemma. The underlying principle is that “dead tags don’t talk.” As an alternative to killing, tags can also be attached to a product’s price tag and discarded at the point-of-sale.

2. Tag Password

Basic EPC RFID tags have sufficient resources to verify PINs or passwords. At first glance, this appears to be a possible vehicle for privacy protection: A tag could emit important information only if it receives the right password.

25

Page 26: Rfid

Passwords might still prove useful in certain environments. For example, retail stores could program tags at checkout to respond to a particular password. Permitted by the RFID network in a consumer’s home. This would protect consumers’ privacy between a store and their homes. If consumers want to use RFID tags in multiple environments, however, they’d face a thorny password management problem.

3. Tag pseudonyms

Rather than be programmed with passwords, RFID tags could maintain consumer privacy simply by changing their serial numbers. One basic implementation would be to give each tag a set of pseudonyms p1, p2, … pkand have the tag cycle through them each time it’s read. Unauthorized tag tracking would be more difficult, because potential adversaries wouldn’t know that two different pseudonyms, piand pj, belong to the same tag. The tag’s owner, on the other hand, would have a list of all the tag’s pseudonyms, and the tag could be identified whenever it was queried.

4. Blocker tags

The RFID blocker tag takes a different approach to enhancing RFID privacy. It involves no modification to consumer tags. Rather, the blocker tag creates an RF environment that is hostile to RFID readers. The blocker tag is a specially configured, ancillary RFID tag that prevents unauthorized scanning of consumer items. In a nutshell, the blocker tag “spams” misbehaving readers so they can’t locate the protected tags’ identifiers. At the same time, it permits authorized scanners to proceed normally.

5. Antenna-energy analysis

One approach to RFID privacy doesn’t rely on logical protocols at all. Kenneth Fishkin and Sumit Roy have proposed a system based on the premise that legitimate readers are likely to be quite close to tags (such as at a checkout counter), whereas malicious readers are likely to be far away (such as a competitor in the parking lot).In preliminary experiments, Fishkin and Roy found that a reader signal’s signal-to-noise ratio decreases measurably with distance. The farther away a reader is, the greater the noise level in the signal a tag receives. With some additional circuitry, therefore, an RFID tag might be able to obtain a rough estimate of the querying reader’s distance and change its behaviour accordingly.

26

Page 27: Rfid

CHAPTER-6

CONCLUSION

RFID is a technology based on simple principles of communications. Being an automatic technology it reduces our workload and proves a boon for big business and management houses. Its application in transportation and authencation of things is also making this technology popular. Further standardization of rfid tags is making them usable word wide, giving us better experience in everyday life. NFC in mobile phones is its example

No doubt rfid tags poses threat to our privacy, but using certain precautions and awareness we can avoid them. More over understanding this research is also done in this field of assuring privacy security of the people.

On above basis it can be said that in near future rfid tags and readers may become a common part of daily life completely changing the way of doings the shopping, management of places like inventory, library , parking, authencation, etc.

27

Page 28: Rfid

References:

1. www.rfidjournal.com

2. www.centrenational-rfid.com

3. www.wikipedia.com

4. www.indiantollways.com

5. Paper-Security and Privacy in Radio-Frequency Identification

Devices by Stephen August Weis

6. RFID Privacy: An Overview of Problems and Proposed Solutions

by SIMSON L.GARFINKEL(Massachusetts Institute of Technology),

ARI JUELS (RSA Laboratories), RAVI PAPPU (ThingMagic)

28