rfid
DESCRIPTION
brief about rfidsTRANSCRIPT
Acknowledgment
I have taken efforts in this report. However, it would not have been possible
without the kind support and help of many individuals. I would like to extend
my sincere thanks to all of them.
I am highly indebted to Ms.Gurpreet Kaur for their guidance and constant
supervision as well as for providing necessary information regarding the project
& also for their support in completing the project.
I would also like to thank Mrs. Suneat Mam and Mrs.Renu Vij for helping me
to select this topic and giving me a chance to go into depth of this topic.
I would like to express my gratitude towards my parents & my friends for their
kind co-operation and encouragement which help me in completion of this
report.
1
TABLE OF CONTENTS
CHAPTER NO.
TITLE PAGE NO.
ABSTRACT 3
1 INTRODUCTION 4 1.1 HISTORY 4 1.2 AUTO ID TECHNOLOGIES 5 2 RFID TECHNOLOGY DESCRIPTION 6 2.1 RFID TAGS 7 2.2 RFID READERS 11 2.3 BACK-END DATABASE 11 2.4 THE METHOD OF WIRELESS SIGNALS
USED FOR COMMUNICATION BETWEEN THE TAG AND READER
11
3 CURRENT RFID APPLICATIONS 13
4 STANDARDS 16
4.1 RFID FREQUENCY SPECTRUM 16
4.2 RFID STANDARDS 16
5 SECURITY AND PRIVACY ISSUES 22
5.1 THRAETS 23
5.2 SOLUTIONS 25
6 CONCLUSION 27
References 28
2
Abstract
Radio Frequency Identification (RFID) systems are a common and useful tool
in manufacturing, supply chain management and retail inventory control.
Optical barcodes, another common automatic identification system, have been a
familiar packaging feature on consumer items for years.
Due to advances in silicon manufacturing technology, RFID costs have dropped
significantly. In the near future, low-cost RFID “electronic product codes” or
“smart-labels” may be a practical replacement for optical barcodes on consumer
items.
Apart from this RFID’s are also proving useful in automatic systems like auto
toll collections, automatic payments, healthcare and, animal and human tracking
systems. With advancement in technology these are also part of mobile systems
in form of NFCs.
This report gives a brief introduction of rfid technology , its advantages nd
applications. A brief discussion regarding security and privcy issues is also
made.
3
Chapter-1
Introduction
Although the foundation of the Radio Frequency Identification (RFID)
technology was laid by past generations, only recent advances opened an
expanding application range to its practical implementation
1.1. History
It’s generally said that the roots of radio frequency identification technology can
be traced back to World War II. The Germans, Japanese, Americans and British
were all using radar—which had been discovered in 1935 by Scottish physicist
Sir Robert Alexander Watson-Watt—to warn of approaching planes while they
were still miles away. The problem was there was no way to identify which
planes belonged to the enemy and which were a country’s own pilots returning
from a mission.
Under Watson-Watt, who headed a secret project, the British developed the first
active identify friend or foe (IFF) system. They put a transmitter on each British
plane. When it received signals from radar stations on the ground, it began
broadcasting a signal back that identified the aircraft as friendly. RFID works
on this same basic concept. A signal is sent to a transponder, which wakes up
and either reflects back a signal (passive system) or broadcasts a signal (active
system).
There is no one definitive “RFID technology”; there is a wide range of technical
solutions ranging from simple, inexpensive, and common to those with more
functionality, performance and cost
4
1.2 Auto Id technologies
Automatic identification and data capture (AIDC) refers to the methods of
automatically identifying objects, collecting data about them, and entering that
data directly into computer systems (i.e. without human involvement).
RFID is one of the technologies covered under automatic identification
techniques
Technologies typically considered as part of AIDC include:
bar codes, biometrics, magnetic stripes, Optical Character Recognition
(OCR), smart cards, and voice recognition,etc.
AIDC is also commonly referred to as “Automatic Identification,” “Auto-ID,”
and "Automatic Data Capture.
5
Chapter-2
RFID basics
Fig.1 basic RFID system
In its simplest form in common use today, an RFID system consists of four elements, as shown in Figure 1. : Tags, antenna, reader and host computer.
The functions of these are:
• The RFID tag, or transponder, carries object identifying data.
• The RFID tag reader, or transceiver, reads and writes tag data.
• Antennas enable connection between tags and the reader.
• The back-end database (host computers) stores records associated with tag contents
6
2.1 RFID tags
Every object to be identified in an RFID system is physically labeled with a tag.
Tags are typically composed of a microchip for storage and computation, and a
coupling element, such as an antenna coil for communication. Tags may also
contain a contact pad, as found in smart cards. Tag memory may be read-only,
write-once read-many or fully rewritable.
2.1.1. Tags classification on basis of power source
A key classification of RFID tags is the source of power. Tags may come in
three flavours: active, semi-passive and passive.
Active tags contain an on-board power source, such as a battery, as well as the
ability to initiate their own communications; possibly with other tags.
Semi-passive tags have a battery, but may only respond to incoming
transmissions.
Passive tags receive all power from the reader and necessarily cannot initiate
any communications.
Passive Semi-Passive Active
Power Source Passive Passive Battery
Transmitter Passive Passive Active
Max. Range 10m 100m 1000m
Table 1. Active, passive and semi Passive tags
A tag’s power source determines both its range and cost. Passive tags are the
cheapest
to manufacture and incorporate into packaging, yet have the shortest read range.
Semi-passive tags have moderate range and cost, while active tags have the
7
greatest range and cost. Semi-passive and active tags’ on-board power source
may also power a clock or integrated sensors.
Passive Tags
Fig. 1 . - Simple rfid system with passive tads
Passive tags systems are reader talk first. The tags are mute until a signal is
received from a reader. Passive RFID systems can read multiple tags at once. In
a process called “singulation,” the reader will rapidly cycle through tags and
determine which ones are present. There are many methods of singulation, but
the principle of identifying a single tag is the same. This is very important when
trying to quickly identify all tags in the reader’s field, and is also important
when trying to speak to specific tags.
8
Fig. 2- Rfid system with active tags
Active Tags
An active tag talks first – that is, it beacons.
Since the tag is not depending on a reader to be energized, and because signal
processing technology is so powerful, active tags can be read at much greater
ranges than passive tags. Active tags can also be used for positioning
determining the XYZ location of the tag – through a process of triangulation.
Since there is a communications channel involved, active tags can be integrated
with sensor devices, such as temperature, location or motion sensors. These
devices can take samples from the sensors, store them, and send them back to
the reader along with the standard beacon signal.
9
2.1.2. Tag classification on basis of functionality
It is also convenient to classify tags by their functionality. The MIT Auto-ID
Center has defined five classes based on functionality. We offer similar
classifications defined below and in Table 2.2:
Class 0: Class 0 tags are the most primitive tag, offering only electronic article
surveillance (EAS) functionality. EAS tags only announce their presence and do
not contain any unique identifying data. Class 0 tags may be “chipless” –
containing no logic. They are frequently found in library books or compact
discs.
Class 1: Class 1 tags contain unique identifying data stored in read-only or
write-once read-many (WORM) memory. Class 1 tags will typically be passive,
although may be semi-passive or active. Class 1 tags function as simple
identifiers.
Class 2: Class 2 tags have read-write memory, which allows them to act as
logging devices. Class 2 tags may be recycled and used to identify many
different items throughout their lifetime. Although Class 2 could be passive,
they are more likely to be semi-passive or active.
Class 3: Class 3 tags contain on-board environmental sensors. These may record
temperature, acceleration, motion or radiation. To be more useful than a
memory less sensor, Class 2 tags require writable storage. Since sensor readings
must be taken in absence of a reader, Class 3 tags are necessarily semi-passive
or active.
Class 4: Class 4 tags may establish ad hoc wireless networks with other tags.
Since they may initiate communication, Class 4 tags are necessarily active.
Functionally, these tags lie in the realm of ubiquitous computers or “smart-
dust”.
10
2.2 RFID Readers
The second major component of RFID systems is the reader. For passive tags,
readers energize the tags with energy, receive the results and frequently handle
the low‐level anti‐collision algorithms that allow readers to read more than one
tag at a time. For active tags, readers are responsible for listening for the tags’
beaconing, and for communicating with other readers to determine positioning.
Readers are generally controlled via a software application programming
interface (API) that is provided by the reader manufacturer. Generally, the API
also allows for configuring the reader’s read cycle, power or other settings.
2.3 Back-End Database
Readers may use tag contents as a look-up key into a back-end database. The
back-end database may associate product information, tracking logs or key
management information with a particular tag. Independent databases may be
built by anyone with access to tag contents. This allows unrelated users along
the supply chain to build their own applications.
2.4 The method of wireless signal used for communication
between the tag and reader
1. Induction
-Close proximity electromagnetic, or inductive coupling—near field
- Generally use. LF and HF frequency bands
11
Fig. 3
2. Propagation
- Propagating electromagnetic waves—far field
- Operate in the UHF and microwaves frequency bands
Fig. 4
12
Chapter – 3
RFID Technology advantages and applications
Advantages of RFID Technology
1. Tag detection don’t require human intervention and hence reduce human
error from data collection.
2. No line of sight is required, tag placement is not a constrained
3. RFID tags have a longer read range than bar codes
4. Tags can have read writ capability
5. An RFID tag can store large amount of data additionally to unique
identifier
6. Many tags can be read simultaneously
7. RFID tags can be combined with sensors
Current RFID applications:
1. Manufacturing and supply chain management:
A popular, emerging application of RFID is in the area of supply chain
visibility. The trend is to attach an RFID tag containing a unique
identifier to an object at its point of manufacture. This tag would then be
read at various intervals up to its point of sale. Manufacturers, retailers
and third party logistics providers are in differing states of pilots on
products, with the major target benefits being reduction in inventory, a
13
decrease in material handling time, safer and more secure supply chains,
and potential post sale applications.
Major retailers such as Wal*Mart, Best Buy and Albertsons are leading
the charge, mandating usage of RFID tags on cases and pallets. Furthermore,
the U.S. Department of Defense (DoD) has issued similar mandates for its
suppliers, also at the case and pallet level. These retailers and the DoD are all
specifying the use of UHF band chips in the EPCglobal standard
2. Toll Collection:
In many states, toll collection for vehicles traveling at or near highway
speeds is accomplished through the use of active RFID tags. There are many
systems available today: This prose is under process in India. In Parwano,
near Panchkula became India’s first auto toll collection Highway. Mumbai –
Ahmadabad highway became India’s first interoperable electronic toll
collection system in April 2013.
3. Animal Tracking:
RFID has a long history of being used for animal tracking. From livestock
management (for animal movement, feeding, health, and market visibility) to
pet tracking, RFID is relatively mature in this field. Animal tracking can be
considered one of the largest implementations of asset management using
RFID. Generally speaking, low frequency tags are used for animal tracking.
4. E-Passport:
A biometric passport, also known as an e-passport, e-Passport or a digital
passport, is a combined paper and electronic passport that contains
biometric information that can be used to authenticate the identity of
travellers. It uses RFID technology, including a microprocessor chip
(computer chip) and antenna (for both power to the chip and
14
communication) embedded in the front or back cover, or centre page, of
the passport. Document and chip characteristics are documented in
the International Civil Aviation Organization's (ICAO) Doc 9303. The
passport's critical information is both printed on the data page of the
passport and stored in the chip. Public Key Infrastructure (PKI) is used to
authenticate the data stored electronically in the passport chip making it
expensive and difficult to forge when all security mechanisms are fully
and correctly implemented.
5. Safety:
Indian schools are all set to implement a high-tech solution that will
enable the school and parents to monitor students’ entry into and exit
from school, called RFID and GPS based tracking system; the state-of-
an-art monitoring system will already been adopted by many renowned
schools and the process of adoption is still going on.
Apart from these other application areas of RFID include:
1. Healthcare
2. Luggage Handling
3. Library Inventory management
4. Smart car key
5. Access control and identification
15
Chapter- 4
RFID Standards
RFID standards are developed and issued by international, regional, national,
and industry specific entities. The more global the standard, the more entities
are involved in the development. Very often, a standard issued by one entity is
applicable to a standard being developed by another entity.
4.1 The RFID frequency spectrum
RFID is considered as a non specific short range device. It can use frequency
bands without a license. Nevertheless, RFID has to be compliant with local
regulations (ETSI.)
1. 1. LF: 125 kHz – 134.2 kHz, FCC etc: low frequencies
2. 2. HF: 13.56 MHz: high frequencies
3. 3. UHF: 860 MHz - 960 MHz: ultra high frequencies
4. 4. SHF: 2.45 GHz: super high frequencies
5. These frequency bands normally belong to ISM bands.
The Electronic Product Code (EPC) is designed as a universal identifier that
provides a unique identity for every physical object anywhere in the world, for
all time. Its structure is defined in the EPCglobal Tag Data Standard
In India frequencies allocated for electronic product code is 965-967MHz.
4.2 RFID STANDRDS
RFID standards are created to:
1. Help to ensure that products inter-operate between different entities
(commercial, government, etc).
16
2. Provide guidelines in which to develop complementary and
interoperable products (tags, readers, software, and accessories).
3. Broaden markets and thereby encourage competition which should
result in lower prices for users of RFID products that adhere to
standards.
4. Increase confidence in new technologies.
.
There are standards relating to different aspects of RFID:
Air Interface Communications protocol standards typically define how the
reader and the tag 'talk' to one another. This includes the:
1. Physical characteristics of the radio communication sometimes called the
'physical layer'
2. Structure of commands and responses.
3. "Anti-collision" algorithm or method of detecting and communicating with
only one tag when more than one tag is present.
Data content standards describe how information is to be formatted, such as
what is stored on an RFID tag.
Device communication standards explain how data is communicated from the
reader to computer.
17
Application Standards illustrate how products are to be used, such as where do I
place label.
Conformance standards provide instructions on how a specific device is to be
evaluated to ensure it complies with a standard.
Many RFID Systems have their standard categorized as "Identification cards" or
"Contactless integrated circuit(s) cards". There are specific RFID standards for
the identification of tires, wheels, freight containers, reusable plastic containers,
and even animals. All of these types of standards must be considered and
adhered to when designing a product, such as a RFID Tag or a RFID Reader.
Additionally, many products support more than one standard.
The leading bodies issuing RFID related standards are:
International Organizations
IEC - International Electrotechnical Commission
ISO - International Standards Organization
GS1 – EPCglobal
JTC 1 – A joint committee of ISO and IEC (Joint Technical Committee)
Regional
CEN - European Committee for Standardization
NAFTA - North American Free Trade Agreement
Industry Specific
18
AAR - Association of American Railroads S-918 mandated standard for
automatic equipment identification.
AIAG - Automotive Industry Standards Group; includes Tire and Wheel Label
and Radio Frequency Identification (RFID) Standard (also known as AIAG B-
11)
ATA - American Trucking Associations standard for automatic equipment
identification.
ASTM - American Society for Testing and Materials
IATA - International Air Transport Association
Organizations that issue Radio Frequency standards
ETSI - European Telecommunications Standards Institute
FCC - United States Federal Communications Commission
ERO - European Radio-communications Office
A brief description of some of these is as:
ISO:
ISO manages several standards related to the area of RFID. ISO 11784/11785
relates to animal tracking. ISO 14443A/14443B relates to proximity style RFID
while ISO 15963 relates to vicinity tagging. ISO 18000 pertains to radio
frequency identification for item management, and contains six subsections
covering differing frequency ranges. There are many other ISO standards
relating to test methods, APIs and conformance standards.
19
ICAO
The International Civil Aviation Organization (ICAO) is another standards body
creating RFID related standards. In 2003, ICAO specified the technical
requirements for RFID technology used in electronic passports. These
specifications were published in ICAO Doc 9303, and are the focus of the
ePassport activities taking place within Department of State.
GS1
GS1 is an international not-for-profit association with Member Organisations in
over 100 countries.
GS1 is dedicated to the design and implementation of global standards and
solutions to improve the efficiency and visibility of supply and demand chains
globally and across sectors. The GS1 system of standards is the most widely
used supply chain standards system in the world.
Most companies initially come to GS1 to get a bar code number for their
products. However, GS1 standards provide a much wider framework for supply
chain visibility. The current architecture of GS1 standards is as follows:
Identify: Standards for the identification of items, locations, shipments, assets,
etc.. and associated data
Capture: Standards for encoding and capturing data in physical data carriers
such as barcodes and RFID tags
Share: Standards for sharing data between parties
GS1 identification standards do not provide identification of country of origin
for a given product. Member companies may manufacture products anywhere in
the world.
20
IEC
ISO/IEC 18000-6:2013 defines the air interface for radio frequency
identification (RFID) devices operating in the 860 MHz to 960 MHz Industrial,
Scientific, and Medical (ISM) band used in item management applications. It
provides a common technical specification for RFID devices that can be used by
ISO committees developing RFID application standards.
SO/IEC 18000-6:2013 together with ISO/IEC 18000-61, ISO/IEC 18000-62,
ISO/IEC 18000-63 and ISO/IEC 18000-64 specifies the physical and logical
requirements for a passive-backscatter, Interrogator-Talks-First (ITF) or tag-
only-talks-after-listening (TOTAL) RFID system. The system comprises
Interrogators, also known as readers, and tags, also known as labels.
21
Chapter-5
Security and Privacy Issues:
The great efficiency gains offered by RFID systems may come at the cost of
both privacy and security. Vulnerabilities to physical attacks, counterfeiting,
spoofing, eavesdropping, traffic analysis or denial of service could all threaten
unprotected tags.
Each of these risks may affect the privacy and security of both individuals and
organizations. A cast of human characters will represent various attacks against
RFID systems.
1. Phyllis: Phyllis is the strongest attacker. She may conduct physical
attacks against tags. Phyllis is assumed to be able to physically obtain
tags and conduct sophisticated attacks in a laboratory setting. Her attacks
may include probe attacks, material removal through shaped charges or
water etching, energy attacks, radiation imprinting, circuit disruption or
clock glitching.
2. Mallory: Mallory does not have physical tag access, but may actively
participate in protocols or construct her own counterfeit tags. Mallory
may initiate queries to tags or respond to reader queries at will.
3. Eve: Eve plays a passive role. She cannot actively take part in protocols
and is limited to eavesdropping. Eve may only listen to “logical”
messages - the 1’s and 0’s transmitted in protocols.
4. Tracy: Tracy is weaker than Eve. Tracy cannot read the contents of
messages, but still may detect their presence. In other words, Tracy is
limited to traffic analysis and may detect how many and when messages
are sent. Tracy may conduct attacks against “location privacy”. In some
situations, Tracy may be as threatening as Eve.
22
5. Denise: Denise is the weakest of all the characters. She can neither read
nor even detect the presence of messages. Denise is limited to disrupting
broadcasts, blocking messages or any other denial of service attacks. As
RFID becomes more main stream, Denise’s attacks may become ever
more damaging.
Such kind of attacks poses certain threats which are as:
5.1 Threats
Corporate data security threats
1. Corporate espionage threat: Tagged objects in the supply chain make it easier for competitors to remotely gather supply chain data, which is some of industry’s most confidential information. For example, an agent could purchase a competitor’s products from several locations, then monitor the locations’ replenishment dynamics. In some scenarios, they could read tags in a store or even as the merchandise is unloaded. Because tagged objects are uniquely numbered, it’s easier for competitors to unobtrusively gather large volumes of data.
2. Competitive marketing threat: Tagged objects make it easier for competitors to gain unauthorized access to customer preferences and use the data in competitive marketing scenarios.
3. Infrastructure threatI: This is not a threat specific to RFID per se. However, a corporate infrastructure that’s dependent on easily jammed radio frequency signals makes organizations susceptible to new kinds of denial-of-service attacks. Such attacks could be especially devastating as RFID becomes a mission-critical component of corporate infrastructure.
4. Trust perimeter threat: Although not specific to RFID, as organizations increasingly share larger volumes of data electronically, the sharing mechanisms offer new opportunities for attack.
23
Personal privacy threats
1. Action threat: In this threat, an individual’s behavior (or possibly his or her intent) is inferred by monitoring the action of a group of tags. Some manufacturers of “smart shelves,” for example, have suggested that the sudden disappearance of tags corresponding to several high-value objects might indicate that a person plans to shoplift, and could result in the person’s photograph being taken. However, said tags might also disappear if the person accidentally knocked the tagged objects to the floor.
2. Association threat. When a customer purchases an EPC- tagged item, the customer’s identity can be associated with the item’s electronic serial number. This threat is fundamentally different than the current practice of associating customer loyalty cards with purchases, because the EPC associates the consumer with a specific item (a unique aspirin package)rather than with a class of items (an aspirin package). Also, unlike with loyalty cards, this type of association can be clandestine and even involuntary.
3. Location threat: Placing covert readers at specific locations creates two types of privacy threats. First, individuals carrying unique tags can be monitored and their location revealed if the monitoring agency knows the tags associated with those individuals. Second, a tagged object’s location—regardless of who (or what) is carrying it—is susceptible to unauthorized disclosure.
4. Preference threat: With the EPC network, the tag on an item uniquely identifies the manufacturer, the product type, and the item’s unique identity. This exposes otherwise unavailable customer preferences to competitive (and inquisitive) forces at low marginal cost. This is also a value threat if the adversary can easily determine the item’s monetary value. A common example of this threat is a thief who targets victims based on their preferences (such as for high-value RFID-containing watches rather than low-cost ones).
5. Constellation threat: Regardless of whether individual identity is associated with a tag set or not, the tags form a unique RFID shadow or constellation around the person. Adversaries can use this constellation to track people, without necessarily knowing their identities.
24
6. Transaction threat. When tagged objects move from one constellation to another, it is easy to infer a transaction between the individuals associated with those constellations.
7. Breadcrumb threat: This threat is also a consequence of association. As individuals collect tagged items, they’re building an items database associated with their identity in corporate information systems. When they discard these electronic breadcrumbs, the association between them and the items isn’t broken. The threat arises when discarded breadcrumbs are used, for example, to commit a crime or some other malicious act. The only identity associated with the breadcrumb is that of the original owner, who is liable, at the very least, to be bothered by law enforcement.
5.2 Solutions
1. Tag Killing
It would be ideal if we could address RFID’s privacy and security threats by making minor modifications to the technology itself. Technical solutions have great appeal. Implementation and testing costs are fixed and up-front. Once developed, the solutions can be directly integrated into the product and usually require little user education or regulatory enforcement.
Indeed, the Auto-ID Center explicitly designed the EPC kill command as a pro-privacy technology. The designers realized that EPC tags might be irretrievably embedded in consumer devices and that consumers might not want to be tracked. They viewed killing EPC tags at the point-of-sale as an easy way out of the apparent privacy dilemma. The underlying principle is that “dead tags don’t talk.” As an alternative to killing, tags can also be attached to a product’s price tag and discarded at the point-of-sale.
2. Tag Password
Basic EPC RFID tags have sufficient resources to verify PINs or passwords. At first glance, this appears to be a possible vehicle for privacy protection: A tag could emit important information only if it receives the right password.
25
Passwords might still prove useful in certain environments. For example, retail stores could program tags at checkout to respond to a particular password. Permitted by the RFID network in a consumer’s home. This would protect consumers’ privacy between a store and their homes. If consumers want to use RFID tags in multiple environments, however, they’d face a thorny password management problem.
3. Tag pseudonyms
Rather than be programmed with passwords, RFID tags could maintain consumer privacy simply by changing their serial numbers. One basic implementation would be to give each tag a set of pseudonyms p1, p2, … pkand have the tag cycle through them each time it’s read. Unauthorized tag tracking would be more difficult, because potential adversaries wouldn’t know that two different pseudonyms, piand pj, belong to the same tag. The tag’s owner, on the other hand, would have a list of all the tag’s pseudonyms, and the tag could be identified whenever it was queried.
4. Blocker tags
The RFID blocker tag takes a different approach to enhancing RFID privacy. It involves no modification to consumer tags. Rather, the blocker tag creates an RF environment that is hostile to RFID readers. The blocker tag is a specially configured, ancillary RFID tag that prevents unauthorized scanning of consumer items. In a nutshell, the blocker tag “spams” misbehaving readers so they can’t locate the protected tags’ identifiers. At the same time, it permits authorized scanners to proceed normally.
5. Antenna-energy analysis
One approach to RFID privacy doesn’t rely on logical protocols at all. Kenneth Fishkin and Sumit Roy have proposed a system based on the premise that legitimate readers are likely to be quite close to tags (such as at a checkout counter), whereas malicious readers are likely to be far away (such as a competitor in the parking lot).In preliminary experiments, Fishkin and Roy found that a reader signal’s signal-to-noise ratio decreases measurably with distance. The farther away a reader is, the greater the noise level in the signal a tag receives. With some additional circuitry, therefore, an RFID tag might be able to obtain a rough estimate of the querying reader’s distance and change its behaviour accordingly.
26
CHAPTER-6
CONCLUSION
RFID is a technology based on simple principles of communications. Being an automatic technology it reduces our workload and proves a boon for big business and management houses. Its application in transportation and authencation of things is also making this technology popular. Further standardization of rfid tags is making them usable word wide, giving us better experience in everyday life. NFC in mobile phones is its example
No doubt rfid tags poses threat to our privacy, but using certain precautions and awareness we can avoid them. More over understanding this research is also done in this field of assuring privacy security of the people.
On above basis it can be said that in near future rfid tags and readers may become a common part of daily life completely changing the way of doings the shopping, management of places like inventory, library , parking, authencation, etc.
27
References:
1. www.rfidjournal.com
2. www.centrenational-rfid.com
3. www.wikipedia.com
4. www.indiantollways.com
5. Paper-Security and Privacy in Radio-Frequency Identification
Devices by Stephen August Weis
6. RFID Privacy: An Overview of Problems and Proposed Solutions
by SIMSON L.GARFINKEL(Massachusetts Institute of Technology),
ARI JUELS (RSA Laboratories), RAVI PAPPU (ThingMagic)
28