Download presentation
Presentation is loading. Please wait.
1
RFID Applications Presented by: Renato Casipe Date : May 3, 2010
2
RFID (Radio Frequency Identification) Radio Frequency Identification Tags objects Identifies object
3
RFID and The “Internet of Things” (IoT) Key enabler MIT’s Auto-ID Center (1999) Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”
4
RFID Already a Part of Our Lives Keyless car entry Gas payment (i.e. Speedpass) Ski pass School ID
5
Sample RFID Applications Credit Card
6
Sample RFID Applications Toll Pass
7
Sample RFID Applications Passport
8
Advantages of RFID over Barcode (Source: CIO.com)
11
RFID System Structure Yan et al., 2009
12
RFID Components Tag Coupling Units Chips Sensors Electronic Product Code (EPC)
13
RFID Components Reader Read Write Mobile Fixed
14
RFID Components Antenna Transducer
15
RFID Components Backend System
16
Tag Types Passive No battery or onboard power source and Backscatter Active Onboard power source can transmit signals autonomously Semi-active / Semi-passive Small battery
17
Tag Classes
18
Tag Memory Passive tags can typically contain about 32 bits to 128 kilobyte of data. Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).
19
Tag Frequencies
20
EPC EPCglobal.org, 2010
21
EPC Minimalist Approach Functionality away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders
22
Major RFID Adopters Wal-Mart 22 distribution centers 15,000 suppliers $2 fee/pallet without RFID tag By 2010
23
Major RFID Adopters Department of Defense RFID tagging will be required for all DoD manufacturers and suppliers packaged within palletized unit to any DoD location
24
Major RFID Adopters Others USDA Animal tagging MasterCard and Visa Paypass and Wave Sun Microsystems Java System RFID Software
25
ROI Seen Tagging at container level Item level for higher value stuff Sensors
26
RFID Adoption Barriers Privacy Concerns Cost ROI Business Processes Change Standards
27
Privacy Concerns Syverson et.al., 2005
28
Privacy Concerns Should EU RFID policy draft be implemented 40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170) Notification Disable on demand Human implantation on consent No tags on state issued id’s. o
29
Privacy Concerns Encryption algorithms Traditional Security features.
30
Privacy Concerns
31
Security Threat Corporate espionage threat Competitive marketing threat Infrastructure threat Trust perimeter threat
32
Privacy Threat Action Association Location
33
Privacy Threat Preference Constellation Transaction
34
Privacy Threat Breadcrumb Cloning
35
Privacy Threat
36
Some Solutions to Privacy Threat Killing Sleeping Password Pseudonyms
37
Some Solutions to Privacy Threat Encryption Proxy Blocking
38
Specific RFID Applications Product Monitoring Online Payment Attendance System
39
RFID in Product Monitoring
46
RFID in Online Payment Motivating Scenario Renato forgot his credit shopping at Lowe’s. A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online Renato lost mental peace, and credit card company waste resources investigating the dispute. $11.6 Billion online payment transaction on 2009
47
Current credit card transaction for remote shopping
48
Proposed architecture for remote credit card transactions
49
System Operation Registration Phase Transaction Phase Reset Phase
50
Role of mobile-phone
51
Role of RFID tag Store encrypted data
52
Role of keys
53
Registration Phase
54
Registration Flowchart
55
Activation Process
56
Mobile-phone flowchart
57
Transaction Phase
58
Reset Phase MRVKEY is deleted from MRVKEY table. MRAKEY is rendered useless as a result as it can not be validated from the middleware. Happens when security is breached.
59
Scenarios Loss RFID credit card Loss mobile phone Loss both
60
Other Applications Drug Index Safety System (DISS) Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting
61
Other Applications Bicycle Safety
62
Other Applications Warehousing Space Time Array Readers (by Mojix)
63
Other Applications Security
64
Scariest Uses of RFID in 2007 http://www.rfidgazette.org/2007/04/top_15_weirde st.html
65
Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India Email: {Geetha_Priya, Srividya_Gopalan}@satyam.comSrividya_Gopalan}@satyam.com Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China yanbo@scut.edu.cn RFID Journal March/April 2008 www.rfidjournal.com RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.