RFID Applications
Presented by: Renato Casipe
Date : May 3, 2010
RFID (Radio Frequency Identification)
Radio Frequency Identification
Tags objects
Identifies object
RFID and The “Internet of Things”
(IoT)
Key enabler
MIT’s Auto
-
ID Center (1999)
Internet of Things refers to a ubiquitous network
society in which a lot of objects are “connected.”
RFID Already a Part of Our Lives
Keyless car entry
Gas payment (i.e. Speedpass)
Ski pass
School ID
Sample RFID Applications
Credit Card
Sample RFID Applications
Toll Pass
Sample RFID Applications
Passport
Advantages of RFID over Barcode
(Source: CIO.com)
Advantages of RFID over Barcode
(Source: CIO.com)
Advantages of RFID over Barcode
(Source: CIO.com)
RFID System Structure
Yan et al., 2009
RFID Components
Tag
Coupling Units
Chips
Sensors
Electronic Product Code (EPC)
RFID Components
Reader
Read
Write
Mobile
Fixed
RFID Components
Antenna
Transducer
RFID Components
Backend System
Tag Types
Passive
No battery or onboard power source and
Backscatter
Active
Onboard power source
can transmit signals autonomously
Semi
-
active / Semi
-
passive
Small battery
Tag Classes
Tag Memory
Passive tags can typically contain about 32 bits to
128 kilobyte of data.
Active tags have up to 1 Megabyte of memory
(AIMGlobal, 2006).
Tag Frequencies
EPC
EPCglobal.org, 2010
EPC Minimalist Approach
Functionality
away from tag
Into the network
Electronic Product Code (EPC)
Object Name Service (ONS )
SAVANT
Transponders
Major RFID Adopters
Wal
-
Mart
22 distribution centers
15,000 suppliers
$2 fee/pallet without RFID tag
By 2010
Major RFID Adopters
Department of Defense
RFID tagging will be required for all DoD manufacturers
and suppliers packaged within
palletized unit
to any DoD location
Major RFID Adopters
Others
USDA
Animal tagging
MasterCard and Visa
Paypass and Wave
Sun Microsystems
Java System RFID Software
ROI Seen
Tagging at container level
Item level for higher value stuff
Sensors
RFID Adoption Barriers
Privacy Concerns
Cost
ROI
Business Processes Change
Standards
Privacy Concerns
Syverson et.al., 2005
Privacy Concerns
Should EU RFID policy draft be implemented
40% no; 15% Yes; 25% Needs modification; 20%
don’t know (RFID journal poll).
New Hampshire HB 478 (vote of 186
-
170)
Notification
Disable on demand
Human implantation on consent
No tags on state issued id’s.
o
Privacy Concerns
Encryption algorithms
Traditional Security features.
Privacy Concerns
Security Threat
Corporate espionage threat
Competitive marketing threat
Infrastructure threat
Trust perimeter threat
Privacy Threat
Action
Association
Location
Privacy Threat
Preference
Constellation
Transaction
Privacy Threat
Breadcrumb
Cloning
Privacy Threat
Some Solutions to Privacy Threat
Killing
Sleeping
Password
Pseudonyms
Some Solutions to Privacy Threat
Encryption
Proxy
Blocking
Specific RFID Applications
Product Monitoring
Online Payment
Attendance System
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Product Monitoring
RFID in Online Payment
Motivating Scenario
Renato forgot his credit shopping at Lowe’s.
A miscreant consequently picks up Renato’s credit
card and uses it for unauthorized purchases online
Renato lost mental peace, and credit card company
waste resources investigating the dispute.
$11.6 Billion online payment transaction on 2009
Current credit card transaction for
remote shopping
Proposed architecture for remote
credit card transactions
System Operation
Registration Phase
Transaction Phase
Reset Phase
Role of mobile
-
phone
Role of RFID tag
Store encrypted data
Role of keys
Registration Phase
Registration Flowchart
Activation Process
Mobile
-
phone flowchart
Transaction Phase
Reset Phase
MRVKEY is deleted from MRVKEY table.
MRAKEY is rendered useless as a result as it can
not be validated from the middleware.
Happens when security is breached.
Scenarios
Loss RFID credit card
Loss mobile phone
Loss both
Other Applications
Drug Index Safety System (DISS)
Vials
Docking station
2 letters
Limited colors
Force function
$50 billion problem counterfeiting
Other Applications
Bicycle Safety
Other Applications
Warehousing
Space Time Array Readers (by Mojix)
Other Applications
Security
Scariest Uses of RFID in 2007
http://www.rfidgazette.org/2007/04/top_15_weirde
st.html
Thank you for your attention….
Partial List of References
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards
Geethapriya Venkataramani and Srividya Gopalan
Applied Research Group, Satyam Computers Services Limited
SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India
Email: {Geetha_Priya,
Srividya_Gopalan}@satyam.com
Application of RFID and Internet of Things in Monitoring and Anti
-
counterfeiting for Products
Bo Yan et al.
School of Economics and Commerce, South China University of Technology, Guangzhou, China
yanbo@scut.edu.cn
RFID Journal
March/April 2008
www.rfidjournal.com
RFID +Certification
By: Brown et al, 2007
McGrawhill, Osborne
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Comments 0
Log in to post a comment