RFID Applications Presented by: Renato Casipe Date : May 3, 2010.
-
date post
19-Dec-2015 -
Category
Documents
-
view
212 -
download
0
Transcript of RFID Applications Presented by: Renato Casipe Date : May 3, 2010.
![Page 1: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/1.jpg)
RFID ApplicationsPresented by: Renato Casipe Date : May 3, 2010
![Page 2: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/2.jpg)
RFID (Radio Frequency Identification)
Radio Frequency Identification
Tags objects
Identifies object
![Page 3: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/3.jpg)
RFID and The “Internet of Things” (IoT) Key enabler
MIT’s Auto-ID Center (1999)
Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”
![Page 4: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/4.jpg)
RFID Already a Part of Our Lives Keyless car entry
Gas payment (i.e. Speedpass)
Ski pass
School ID
![Page 5: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/5.jpg)
Sample RFID ApplicationsCredit Card
![Page 6: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/6.jpg)
Sample RFID ApplicationsToll Pass
![Page 7: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/7.jpg)
Sample RFID ApplicationsPassport
![Page 8: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/8.jpg)
Advantages of RFID over Barcode (Source: CIO.com)
![Page 9: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/9.jpg)
Advantages of RFID over Barcode (Source: CIO.com)
![Page 10: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/10.jpg)
Advantages of RFID over Barcode (Source: CIO.com)
![Page 11: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/11.jpg)
RFID System Structure
Yan et al., 2009
![Page 12: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/12.jpg)
RFID Components Tag
Coupling Units
Chips
Sensors
Electronic Product Code (EPC)
![Page 13: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/13.jpg)
RFID Components Reader
Read
Write
Mobile
Fixed
![Page 14: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/14.jpg)
RFID Components Antenna
Transducer
![Page 15: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/15.jpg)
RFID Components Backend System
![Page 16: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/16.jpg)
Tag Types
Passive No battery or onboard power source and Backscatter
Active Onboard power source can transmit signals autonomously
Semi-active / Semi-passive Small battery
![Page 17: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/17.jpg)
Tag Classes
![Page 18: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/18.jpg)
Tag Memory
Passive tags can typically contain about 32 bits to 128 kilobyte of data.
Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).
![Page 19: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/19.jpg)
Tag Frequencies
![Page 20: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/20.jpg)
EPC
EPCglobal.org, 2010
![Page 21: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/21.jpg)
EPC Minimalist Approach Functionality
away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders
![Page 22: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/22.jpg)
Major RFID Adopters Wal-Mart
22 distribution centers
15,000 suppliers
$2 fee/pallet without RFID tag
By 2010
![Page 23: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/23.jpg)
Major RFID Adopters Department of Defense
RFID tagging will be required for all DoD manufacturers and suppliers packaged within
palletized unit
to any DoD location
![Page 24: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/24.jpg)
Major RFID Adopters Others
USDA Animal tagging
MasterCard and Visa Paypass and Wave
Sun Microsystems Java System RFID Software
![Page 25: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/25.jpg)
ROI Seen
Tagging at container level
Item level for higher value stuff
Sensors
![Page 26: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/26.jpg)
RFID Adoption Barriers Privacy Concerns
Cost
ROI
Business Processes Change
Standards
![Page 27: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/27.jpg)
Privacy Concerns
Syverson et.al., 2005
![Page 28: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/28.jpg)
Privacy Concerns Should EU RFID policy draft be implemented
40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170)
Notification Disable on demand Human implantation on consent No tags on state issued id’s.
o
![Page 29: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/29.jpg)
Privacy Concerns
Encryption algorithms
Traditional Security features.
![Page 30: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/30.jpg)
Privacy Concerns
![Page 31: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/31.jpg)
Security Threat
Corporate espionage threat
Competitive marketing threat
Infrastructure threat
Trust perimeter threat
![Page 32: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/32.jpg)
Privacy Threat
Action
Association
Location
![Page 33: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/33.jpg)
Privacy Threat
Preference
Constellation
Transaction
![Page 34: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/34.jpg)
Privacy Threat Breadcrumb
Cloning
![Page 35: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/35.jpg)
Privacy Threat
![Page 36: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/36.jpg)
Some Solutions to Privacy Threat Killing
Sleeping
Password
Pseudonyms
![Page 37: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/37.jpg)
Some Solutions to Privacy Threat Encryption
Proxy
Blocking
![Page 38: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/38.jpg)
Specific RFID Applications
Product Monitoring
Online Payment
Attendance System
![Page 39: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/39.jpg)
RFID in Product Monitoring
![Page 40: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/40.jpg)
RFID in Product Monitoring
![Page 41: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/41.jpg)
RFID in Product Monitoring
![Page 42: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/42.jpg)
RFID in Product Monitoring
![Page 43: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/43.jpg)
RFID in Product Monitoring
![Page 44: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/44.jpg)
RFID in Product Monitoring
![Page 45: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/45.jpg)
RFID in Product Monitoring
![Page 46: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/46.jpg)
RFID in Online Payment Motivating Scenario
Renato forgot his credit shopping at Lowe’s.
A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online
Renato lost mental peace, and credit card company waste resources investigating the dispute.
$11.6 Billion online payment transaction on 2009
![Page 47: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/47.jpg)
Current credit card transaction for remote shopping
![Page 48: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/48.jpg)
Proposed architecture for remote credit card transactions
![Page 49: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/49.jpg)
System Operation
Registration Phase
Transaction Phase
Reset Phase
![Page 50: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/50.jpg)
Role of mobile-phone
![Page 51: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/51.jpg)
Role of RFID tag
Store encrypted data
![Page 52: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/52.jpg)
Role of keys
![Page 53: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/53.jpg)
Registration Phase
![Page 54: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/54.jpg)
Registration Flowchart
![Page 55: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/55.jpg)
Activation Process
![Page 56: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/56.jpg)
Mobile-phone flowchart
![Page 57: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/57.jpg)
Transaction Phase
![Page 58: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/58.jpg)
Reset Phase
MRVKEY is deleted from MRVKEY table.
MRAKEY is rendered useless as a result as it can not be validated from the middleware.
Happens when security is breached.
![Page 59: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/59.jpg)
Scenarios Loss RFID credit card
Loss mobile phone
Loss both
![Page 60: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/60.jpg)
Other Applications Drug Index Safety System (DISS)
Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting
![Page 61: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/61.jpg)
Other Applications Bicycle Safety
![Page 62: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/62.jpg)
Other Applications Warehousing
Space Time Array Readers (by Mojix)
![Page 63: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/63.jpg)
Other Applications Security
![Page 64: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/64.jpg)
Scariest Uses of RFID in 2007
http://www.rfidgazette.org/2007/04/top_15_weirdest.html
![Page 65: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.](https://reader035.fdocuments.in/reader035/viewer/2022070323/56649d3a5503460f94a1592b/html5/thumbnails/65.jpg)
Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards
Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited
SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India
Email: {Geetha_Priya, Srividya_Gopalan}@satyam.com
Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products
Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China [email protected]
RFID Journal March/April 2008 www.rfidjournal.com
RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne