1 / 65

RFID Applications

RFID Applications. Presented by: Renato Casipe Date : May 3, 2010. RFID (Radio Frequency Identification). Radio Frequency Identification Tags objects Identifies object. RFID and The “Internet of Things” (IoT). Key enabler MIT’s Auto-ID Center (1999)

Download Presentation

RFID Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFID Applications Presented by: Renato Casipe Date : May 3, 2010

  2. RFID (Radio Frequency Identification) • Radio Frequency Identification • Tags objects • Identifies object

  3. RFID and The “Internet of Things” (IoT) • Key enabler • MIT’s Auto-ID Center (1999) • Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”

  4. RFID Already a Part of Our Lives • Keyless car entry • Gas payment (i.e. Speedpass) • Ski pass • School ID

  5. Sample RFID Applications Credit Card

  6. Sample RFID Applications Toll Pass

  7. Sample RFID Applications Passport

  8. Advantages of RFID over Barcode (Source: CIO.com)

  9. Advantages of RFID over Barcode (Source: CIO.com)

  10. Advantages of RFID over Barcode (Source: CIO.com)

  11. RFID System Structure Yan et al., 2009

  12. RFID Components • Tag • Coupling Units • Chips • Sensors • Electronic Product Code (EPC)

  13. RFID Components • Reader • Read • Write • Mobile • Fixed

  14. RFID Components • Antenna • Transducer

  15. RFID Components • Backend System

  16. Tag Types • Passive • No battery or onboard power source and • Backscatter • Active • Onboard power source • can transmit signals autonomously • Semi-active / Semi-passive • Small battery

  17. Tag Classes

  18. Tag Memory • Passive tags can typically contain about 32 bits to 128 kilobyte of data. • Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).

  19. Tag Frequencies

  20. EPC EPCglobal.org, 2010

  21. EPC Minimalist Approach • Functionality • away from tag • Into the network • Electronic Product Code (EPC) • Object Name Service (ONS ) • SAVANT • Transponders

  22. Major RFID Adopters • Wal-Mart • 22 distribution centers • 15,000 suppliers • $2 fee/pallet without RFID tag • By 2010

  23. Major RFID Adopters • Department of Defense • RFID tagging will be required for all DoD manufacturers and suppliers packaged within • palletized unit • to any DoD location

  24. Major RFID Adopters • Others • USDA • Animal tagging • MasterCard and Visa • Paypass and Wave • Sun Microsystems • Java System RFID Software

  25. ROI Seen • Tagging at container level • Item level for higher value stuff • Sensors

  26. RFID Adoption Barriers • Privacy Concerns • Cost • ROI • Business Processes Change • Standards

  27. Privacy Concerns Syverson et.al., 2005

  28. Privacy Concerns • Should EU RFID policy draft be implemented • 40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). • New Hampshire HB 478 (vote of 186-170) • Notification • Disable on demand • Human implantation on consent • No tags on state issued id’s. • o

  29. Privacy Concerns • Encryption algorithms • Traditional Security features.

  30. Privacy Concerns

  31. Security Threat • Corporate espionage threat • Competitive marketing threat • Infrastructure threat • Trust perimeter threat

  32. Privacy Threat • Action • Association • Location

  33. Privacy Threat • Preference • Constellation • Transaction

  34. Privacy Threat • Breadcrumb • Cloning

  35. Privacy Threat

  36. Some Solutions to Privacy Threat • Killing • Sleeping • Password • Pseudonyms

  37. Some Solutions to Privacy Threat • Encryption • Proxy • Blocking

  38. Specific RFID Applications • Product Monitoring • Online Payment • Attendance System

  39. RFID in Product Monitoring

  40. RFID in Product Monitoring

  41. RFID in Product Monitoring

  42. RFID in Product Monitoring

  43. RFID in Product Monitoring

  44. RFID in Product Monitoring

  45. RFID in Product Monitoring

  46. RFID in Online Payment • Motivating Scenario • Renato forgot his credit shopping at Lowe’s. • A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online • Renato lost mental peace, and credit card company waste resources investigating the dispute. • $11.6 Billion online payment transaction on 2009

  47. Current credit card transaction for remote shopping

  48. Proposed architecture for remote credit card transactions

  49. System Operation • Registration Phase • Transaction Phase • Reset Phase

  50. Role of mobile-phone

More Related