Legal and ethical issues in information technology Seyed Mohammad Serajzadeh 1394 RFID Or Radio Frequency Identification.

Slides:



Advertisements
Similar presentations
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Advertisements

RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.
 Radio Frequency Identification  Microchip combined with antenna  Act as transponders (transmitters/responders)
By: Farnoush Farajpour ( ) Dec Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
ITEC 810 Overview of Micropayment Technology
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
RFID By Jake Schmitt, Neil McLain, Steve Staten. Overview RFID Defined Defined History History Current Applications Controversy Controversy Testing and.
Beyond the Barcode RFIDs Radio Frequency Identification.
Researcher aims to secure RFID tags By: Guillermo Zuniga CSCE 390 Assignment 08 April 20, 2010.
J.J. Faxon Andy Vu Dustin Beck Jessica Bentz Mandi Ellis
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
Radio Frequency Identification Austin Rutkowski Naomi Shaw Jenelle Meeker Maggie Kwong.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
Radio Frequency Identification (rfid) Aaron Roy Prof. Johnson November 28, 2009.
RFID Technologies Master seminar : Tangible User Interfaces Bruno Dumas – DIVA Group University of Fribourg
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID (Radio Frequency IDentification) Sheetal Jain IS-553 Term Paper.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID passports How does is work? Step by step By: Einav Mimram.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Radio-Frequency Identification MBUS 626 IT Seminar Group 5 Kevin Frei Stephen Grant.
Agenda About FILE Pty Limited. What is RFID? RFID in Records Management. Demonstration of RFID Technologies.. Questions.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID’s By Samuel and Sabra. What is an RFID? RFID’s are microchips RFID’s are microchips Antenna emits radio signals to read/write Antenna emits radio.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
IT’s private. Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Tire tracking overview AN ALL IN ONE SOLUTION TIRE TRACKING, IDENTIFICATION AND STOCK KEEPING.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Radio Frequency Identification Securing Your Personal Information November 10, 2005.
Wal-Mart leads RFID adoption Prepared by: Rayma Figueroa Olesya Tkachenko Olya Elfimova.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Introduction of RFID Presented by Group 2
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Radio frequency identification (RFID) Opportunities for mobile telecommunication services ______________ ______________.
What is a Radio-Frequency Identification (RFID) tag?
RFID & applications گردآوری: بیتا تدین
یا حقّ.
Radio Frequency Identification
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Presentation transcript:

Legal and ethical issues in information technology Seyed Mohammad Serajzadeh 1394 RFID Or Radio Frequency Identification

Content History Equipment and Design Uses Concerns Security References

History YearEvent 1948RFID is invented by Leon Theremin Early explorations of RFID technology Development of the theory of RFID Explosion of RFID development Commercial applications of RFID – 2015 Emergence of standards. RFID widely deployed. RFID becomes a part of everyday life.

Equipment and Design Tag Passive tags Active tags Semi-passive tags Two way tags

Equipment and Design Cont. Reader Fixed Handheld Pc card

Equipment and Design RFID Antenna

Uses Public transport (Tbilisi Metro card) Passports (U.S. Passport) Transportation payments Animal identification Human identification Schools and universities Sports SCM

Uses

Cons and concerns High Price Frequency collision Deactivation attack Security in information (EX. Loyalty card) Social concerns Lack of standardization

Security Kill Encrypting and decrypting Faraday cage Private validity Secured bit

References 1. مقاله امنیت و حریم خصوصی در RFID ، مریم چگینی، موسسه آموزش عالی فخر رازی 2. مقاله ملاحظاتی در امنیت اطلاعات و حفظ حریم خصوصی افراد در سیستم ­ های RFID ، محمد مقدسی، دانشگاه تربیت مدرس 3.Keeping pace with RFID, David T, Grenoble Graduate School of Business 4.RFID for track, Ankush Jain and Vinkush Garg, Icfai business school 5.Security in RFID systems, Ms. Safkhani, 2012 computer security workshop 6.RFID Security & Privacy Lounge, Avoine.net. Retrieved