Presentation is loading. Please wait.

Presentation is loading. Please wait.

RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Similar presentations


Presentation on theme: "RFID Applications Presented by: Renato Casipe Date : May 3, 2010."— Presentation transcript:

1 RFID Applications Presented by: Renato Casipe Date : May 3, 2010

2 RFID (Radio Frequency Identification) Radio Frequency Identification Tags objects Identifies object

3 RFID and The “Internet of Things” (IoT) Key enabler MIT’s Auto-ID Center (1999) Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”

4 RFID Already a Part of Our Lives Keyless car entry Gas payment (i.e. Speedpass) Ski pass School ID

5 Sample RFID Applications Credit Card

6 Sample RFID Applications Toll Pass

7 Sample RFID Applications Passport

8 Advantages of RFID over Barcode (Source: CIO.com)

9

10

11 RFID System Structure Yan et al., 2009

12 RFID Components Tag Coupling Units Chips Sensors Electronic Product Code (EPC)

13 RFID Components Reader Read Write Mobile Fixed

14 RFID Components Antenna Transducer

15 RFID Components Backend System

16 Tag Types Passive No battery or onboard power source and Backscatter Active Onboard power source can transmit signals autonomously Semi-active / Semi-passive Small battery

17 Tag Classes

18 Tag Memory Passive tags can typically contain about 32 bits to 128 kilobyte of data. Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).

19 Tag Frequencies

20 EPC EPCglobal.org, 2010

21 EPC Minimalist Approach Functionality away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders

22 Major RFID Adopters Wal-Mart 22 distribution centers 15,000 suppliers $2 fee/pallet without RFID tag By 2010

23 Major RFID Adopters Department of Defense RFID tagging will be required for all DoD manufacturers and suppliers packaged within palletized unit to any DoD location

24 Major RFID Adopters Others USDA Animal tagging MasterCard and Visa Paypass and Wave Sun Microsystems Java System RFID Software

25 ROI Seen Tagging at container level Item level for higher value stuff Sensors

26 RFID Adoption Barriers Privacy Concerns Cost ROI Business Processes Change Standards

27 Privacy Concerns Syverson et.al., 2005

28 Privacy Concerns Should EU RFID policy draft be implemented 40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170) Notification Disable on demand Human implantation on consent No tags on state issued id’s. o

29 Privacy Concerns Encryption algorithms Traditional Security features.

30 Privacy Concerns

31 Security Threat Corporate espionage threat Competitive marketing threat Infrastructure threat Trust perimeter threat

32 Privacy Threat Action Association Location

33 Privacy Threat Preference Constellation Transaction

34 Privacy Threat Breadcrumb Cloning

35 Privacy Threat

36 Some Solutions to Privacy Threat Killing Sleeping Password Pseudonyms

37 Some Solutions to Privacy Threat Encryption Proxy Blocking

38 Specific RFID Applications Product Monitoring Online Payment Attendance System

39 RFID in Product Monitoring

40

41

42

43

44

45

46 RFID in Online Payment Motivating Scenario Renato forgot his credit shopping at Lowe’s. A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online Renato lost mental peace, and credit card company waste resources investigating the dispute. $11.6 Billion online payment transaction on 2009

47 Current credit card transaction for remote shopping

48 Proposed architecture for remote credit card transactions

49 System Operation Registration Phase Transaction Phase Reset Phase

50 Role of mobile-phone

51 Role of RFID tag Store encrypted data

52 Role of keys

53 Registration Phase

54 Registration Flowchart

55 Activation Process

56 Mobile-phone flowchart

57 Transaction Phase

58 Reset Phase MRVKEY is deleted from MRVKEY table. MRAKEY is rendered useless as a result as it can not be validated from the middleware. Happens when security is breached.

59 Scenarios Loss RFID credit card Loss mobile phone Loss both

60 Other Applications Drug Index Safety System (DISS) Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting

61 Other Applications Bicycle Safety

62 Other Applications Warehousing Space Time Array Readers (by Mojix)

63 Other Applications Security

64 Scariest Uses of RFID in 2007 http://www.rfidgazette.org/2007/04/top_15_weirde st.html

65 Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India Email: {Geetha_Priya, Srividya_Gopalan}@satyam.comSrividya_Gopalan}@satyam.com Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China yanbo@scut.edu.cn RFID Journal March/April 2008 www.rfidjournal.com RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne


Download ppt "RFID Applications Presented by: Renato Casipe Date : May 3, 2010."

Similar presentations


Ads by Google