RFID Applications - 91-514-201-s2010 - home

tansysoapweedNetworking and Communications

Feb 16, 2014 (3 years and 4 months ago)

71 views

RFID Applications

Presented by: Renato Casipe


Date : May 3, 2010



RFID (Radio Frequency Identification)



Radio Frequency Identification



Tags objects



Identifies object

RFID and The “Internet of Things”
(IoT)


Key enabler



MIT’s Auto
-
ID Center (1999)



Internet of Things refers to a ubiquitous network
society in which a lot of objects are “connected.”

RFID Already a Part of Our Lives


Keyless car entry



Gas payment (i.e. Speedpass)



Ski pass



School ID

Sample RFID Applications

Credit Card


Sample RFID Applications

Toll Pass

Sample RFID Applications

Passport

Advantages of RFID over Barcode
(Source: CIO.com)

Advantages of RFID over Barcode
(Source: CIO.com)


Advantages of RFID over Barcode
(Source: CIO.com)


RFID System Structure

Yan et al., 2009

RFID Components




Tag



Coupling Units



Chips



Sensors



Electronic Product Code (EPC)










RFID Components




Reader



Read



Write



Mobile



Fixed










RFID Components




Antenna



Transducer












RFID Components




Backend System









Tag Types



Passive


No battery or onboard power source and


Backscatter


Active


Onboard power source


can transmit signals autonomously


Semi
-
active / Semi
-
passive


Small battery

Tag Classes

Tag Memory



Passive tags can typically contain about 32 bits to
128 kilobyte of data.



Active tags have up to 1 Megabyte of memory
(AIMGlobal, 2006).

Tag Frequencies

EPC

EPCglobal.org, 2010

EPC Minimalist Approach


Functionality


away from tag


Into the network


Electronic Product Code (EPC)


Object Name Service (ONS )


SAVANT


Transponders

Major RFID Adopters


Wal
-
Mart



22 distribution centers



15,000 suppliers



$2 fee/pallet without RFID tag



By 2010

Major RFID Adopters


Department of Defense



RFID tagging will be required for all DoD manufacturers
and suppliers packaged within



palletized unit



to any DoD location

Major RFID Adopters


Others



USDA


Animal tagging



MasterCard and Visa


Paypass and Wave



Sun Microsystems


Java System RFID Software




ROI Seen



Tagging at container level



Item level for higher value stuff



Sensors

RFID Adoption Barriers


Privacy Concerns



Cost



ROI



Business Processes Change



Standards


Privacy Concerns

Syverson et.al., 2005

Privacy Concerns



Should EU RFID policy draft be implemented


40% no; 15% Yes; 25% Needs modification; 20%
don’t know (RFID journal poll).


New Hampshire HB 478 (vote of 186
-
170)


Notification


Disable on demand


Human implantation on consent


No tags on state issued id’s.







o

Privacy Concerns



Encryption algorithms



Traditional Security features.





Privacy Concerns

Security Threat



Corporate espionage threat



Competitive marketing threat



Infrastructure threat



Trust perimeter threat



Privacy Threat



Action



Association



Location


Privacy Threat



Preference



Constellation



Transaction

Privacy Threat


Breadcrumb



Cloning

Privacy Threat

Some Solutions to Privacy Threat


Killing



Sleeping



Password



Pseudonyms



Some Solutions to Privacy Threat


Encryption



Proxy



Blocking





Specific RFID Applications



Product Monitoring



Online Payment



Attendance System

RFID in Product Monitoring

RFID in Product Monitoring

RFID in Product Monitoring

RFID in Product Monitoring

RFID in Product Monitoring

RFID in Product Monitoring

RFID in Product Monitoring


RFID in Online Payment


Motivating Scenario


Renato forgot his credit shopping at Lowe’s.



A miscreant consequently picks up Renato’s credit
card and uses it for unauthorized purchases online



Renato lost mental peace, and credit card company
waste resources investigating the dispute.



$11.6 Billion online payment transaction on 2009


Current credit card transaction for
remote shopping

Proposed architecture for remote
credit card transactions

System Operation



Registration Phase



Transaction Phase



Reset Phase

Role of mobile
-
phone

Role of RFID tag



Store encrypted data

Role of keys

Registration Phase

Registration Flowchart

Activation Process

Mobile
-
phone flowchart

Transaction Phase

Reset Phase



MRVKEY is deleted from MRVKEY table.



MRAKEY is rendered useless as a result as it can
not be validated from the middleware.



Happens when security is breached.


Scenarios


Loss RFID credit card



Loss mobile phone



Loss both

Other Applications


Drug Index Safety System (DISS)


Vials


Docking station


2 letters


Limited colors


Force function


$50 billion problem counterfeiting



Other Applications


Bicycle Safety

Other Applications


Warehousing


Space Time Array Readers (by Mojix)

Other Applications


Security

Scariest Uses of RFID in 2007



http://www.rfidgazette.org/2007/04/top_15_weirde
st.html

Thank you for your attention….


Partial List of References


Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards


Geethapriya Venkataramani and Srividya Gopalan


Applied Research Group, Satyam Computers Services Limited


SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India


Email: {Geetha_Priya,
Srividya_Gopalan}@satyam.com



Application of RFID and Internet of Things in Monitoring and Anti
-
counterfeiting for Products


Bo Yan et al.


School of Economics and Commerce, South China University of Technology, Guangzhou, China


yanbo@scut.edu.cn



RFID Journal


March/April 2008


www.rfidjournal.com



RFID +Certification


By: Brown et al, 2007


McGrawhill, Osborne