RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

65
RFID Applications Presented by: Renato Casipe Date : May 3, 2010
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    212
  • download

    0

Transcript of RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Page 1: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID ApplicationsPresented by: Renato Casipe Date : May 3, 2010

Page 2: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID (Radio Frequency Identification)

Radio Frequency Identification

Tags objects

Identifies object

Page 3: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID and The “Internet of Things” (IoT) Key enabler

MIT’s Auto-ID Center (1999)

Internet of Things refers to a ubiquitous network society in which a lot of objects are “connected.”

Page 4: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Already a Part of Our Lives Keyless car entry

Gas payment (i.e. Speedpass)

Ski pass

School ID

Page 5: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Sample RFID ApplicationsCredit Card

Page 6: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Sample RFID ApplicationsToll Pass

Page 7: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Sample RFID ApplicationsPassport

Page 8: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Advantages of RFID over Barcode (Source: CIO.com)

Page 9: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Advantages of RFID over Barcode (Source: CIO.com)

Page 10: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Advantages of RFID over Barcode (Source: CIO.com)

Page 11: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID System Structure

Yan et al., 2009

Page 12: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Components Tag

Coupling Units

Chips

Sensors

Electronic Product Code (EPC)

Page 13: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Components Reader

Read

Write

Mobile

Fixed

Page 14: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Components Antenna

Transducer

Page 15: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Components Backend System

Page 16: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Tag Types

Passive No battery or onboard power source and Backscatter

Active Onboard power source can transmit signals autonomously

Semi-active / Semi-passive Small battery

Page 17: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Tag Classes

Page 18: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Tag Memory

Passive tags can typically contain about 32 bits to 128 kilobyte of data.

Active tags have up to 1 Megabyte of memory (AIMGlobal, 2006).

Page 19: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Tag Frequencies

Page 20: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

EPC

EPCglobal.org, 2010

Page 21: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

EPC Minimalist Approach Functionality

away from tag Into the network Electronic Product Code (EPC) Object Name Service (ONS ) SAVANT Transponders

Page 22: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Major RFID Adopters Wal-Mart

22 distribution centers

15,000 suppliers

$2 fee/pallet without RFID tag

By 2010

Page 23: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Major RFID Adopters Department of Defense

RFID tagging will be required for all DoD manufacturers and suppliers packaged within

palletized unit

to any DoD location

Page 24: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Major RFID Adopters Others

USDA Animal tagging

MasterCard and Visa Paypass and Wave

Sun Microsystems Java System RFID Software

Page 25: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

ROI Seen

Tagging at container level

Item level for higher value stuff

Sensors

Page 26: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID Adoption Barriers Privacy Concerns

Cost

ROI

Business Processes Change

Standards

Page 27: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Concerns

Syverson et.al., 2005

Page 28: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Concerns Should EU RFID policy draft be implemented

40% no; 15% Yes; 25% Needs modification; 20% don’t know (RFID journal poll). New Hampshire HB 478 (vote of 186-170)

Notification Disable on demand Human implantation on consent No tags on state issued id’s.

o

Page 29: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Concerns

Encryption algorithms

Traditional Security features.

Page 30: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Concerns

Page 31: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Security Threat

Corporate espionage threat

Competitive marketing threat

Infrastructure threat

Trust perimeter threat

Page 32: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Threat

Action

Association

Location

Page 33: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Threat

Preference

Constellation

Transaction

Page 34: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Threat Breadcrumb

Cloning

Page 35: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Privacy Threat

Page 36: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Some Solutions to Privacy Threat Killing

Sleeping

Password

Pseudonyms

Page 37: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Some Solutions to Privacy Threat Encryption

Proxy

Blocking

Page 38: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Specific RFID Applications

Product Monitoring

Online Payment

Attendance System

Page 39: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 40: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 41: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 42: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 43: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 44: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 45: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Product Monitoring

Page 46: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

RFID in Online Payment Motivating Scenario

Renato forgot his credit shopping at Lowe’s.

A miscreant consequently picks up Renato’s credit card and uses it for unauthorized purchases online

Renato lost mental peace, and credit card company waste resources investigating the dispute.

$11.6 Billion online payment transaction on 2009

Page 47: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Current credit card transaction for remote shopping

Page 48: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Proposed architecture for remote credit card transactions

Page 49: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

System Operation

Registration Phase

Transaction Phase

Reset Phase

Page 50: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Role of mobile-phone

Page 51: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Role of RFID tag

Store encrypted data

Page 52: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Role of keys

Page 53: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Registration Phase

Page 54: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Registration Flowchart

Page 55: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Activation Process

Page 56: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Mobile-phone flowchart

Page 57: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Transaction Phase

Page 58: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Reset Phase

MRVKEY is deleted from MRVKEY table.

MRAKEY is rendered useless as a result as it can not be validated from the middleware.

Happens when security is breached.

Page 59: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Scenarios Loss RFID credit card

Loss mobile phone

Loss both

Page 60: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Other Applications Drug Index Safety System (DISS)

Vials Docking station 2 letters Limited colors Force function $50 billion problem counterfeiting

Page 61: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Other Applications Bicycle Safety

Page 62: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Other Applications Warehousing

Space Time Array Readers (by Mojix)

Page 63: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Other Applications Security

Page 64: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Scariest Uses of RFID in 2007

http://www.rfidgazette.org/2007/04/top_15_weirdest.html

Page 65: RFID Applications Presented by: Renato Casipe Date : May 3, 2010.

Thank you for your attention…. Partial List of References Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards

Geethapriya Venkataramani and Srividya Gopalan Applied Research Group, Satyam Computers Services Limited

SID Block, Entrepreneurship Centre, IISC Campus, Bangalore 560012, India

Email: {Geetha_Priya, Srividya_Gopalan}@satyam.com

Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products

Bo Yan et al. School of Economics and Commerce, South China University of Technology, Guangzhou, China [email protected]

RFID Journal March/April 2008 www.rfidjournal.com

RFID +Certification By: Brown et al, 2007 McGrawhill, Osborne