A Research On Radio Frequency Identification

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Radio Frequency Identification (RFID) is an automatic identification system. It make use of Radio Frequency (RF) to identify "tagged" items .Data collected were transmitted to a host system using a Radio Frequency Reader. RFID is one of the numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition (OCR), voice recognition, touch memory, smart cards, biometrics etc. Auto ID technologies are the new ways of getting data and controlling information flow of a material, especially suitable for large production networks.

The RFID technology is a means of gathering data about a certain item without the need of touching or seeing the data carrier, through the use of inductive coupling or electromagnetic waves. The data carrier is a microchip attached to an antenna (together called transponder or tag), then latter enabling the chip to transmit information to a reader (or transceiver) within a given range, which can forward the information to a host computer. The middleware (software for reading and writing tags) and the tag can be enhanced by data encryption for security-critical application at an extra cost, and anti-collision algorithms may be implemented for the tags if several of them are to be read simultaneously. RFID is composed of three elements: A tag (The tag comprises of a simple silicon microchip typically less than half a millimeter in size attached to a small flat aerial and mounted on a substrate.) formed by a chip connected with an antenna. A reader that emits radio signals and receives in return answers from tags, and finally a Middleware that bridges RFID hardware and enterprise applications. According to EPC-Global standards, the chip memory contains an Electronic Product Code (EPC) which allows the identification of each product in a unique way.C:\Users\AKINSOWON\Desktop\RFID An Introduction2_files\IC50305.gif

Fig 1.0 A RFID working process System

1.1 PROBLEM DEFINITION

RFID is evolving as a major technology enabler for identifying and tracking goods and assets around the world. But while the technology has received more than its fair share of media coverage recently, many are still unfamiliar with RFID benefits and the CRITICS.

1.2 AIMS

In the face of this, there is a need for clear, comprehensive information about RFID (present, Future application, security implications and Critics) were discussed thoroughly.

1.3 METHODOLOGY

Review papers on Radio Frequency Identification and Detections. Making use of search engines, internet, and journals. Etc.

LITERATURE REVIEW

2.1 ORIGIN OF RFID

Radio Frequency Identification (RFID) has been in existence since 1960’s. It was first used over sixty years ago .It can be traced back to World War II. The British used radar to warn of approaching planes while they were still miles away. The problem was how to differentiate between an enemy airplane and their country’s airplane. They discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected back.

This method alerted the radar crew on the ground that these were German planes and not allied aircraft (this was, essentially, the first passive RFID system). Under Watson-Watt, who headed a secret project, the British developed the first active identify friend or foe (IFF) system. They put a transmitter on each British plane. When it received signals from radar stations on the ground, it began broadcasting a signal back that identified the aircraft as friendly [2].

Object identification is an important part of trade. It’s most important use is supply chain management. Due to the volume and variety of traded goods, logistics and inventory costs are extremely high.

This problem first exploded in middle of 20th century. Food chains and supermarkets were heavily affected by these costs. In 1948, Bernard Silver and Norman Joseph Woodland, graduate students at Drexel Institute of Technology in Philadelphia, were the first ones to work on this problem.

Their research was initiated by an inquiry of a local food chain store owner about research into a method of automatically reading product information during checkout.

In October 20, 1949, Woodland and Silver filed their patent application for the "Classifying Apparatus and Method", describing their invention as "article classification through the medium of identifying patterns". The Woodland and Silver bar code can be described as a "bull's eye" symbol, made up of a series of concentric circles. Fig2.0 (The woodland and silver bar code)

Fig 2.1(UPC Bar Code)

Fig 2.2 RFID system

Automatic identification was first used commercially in 1966, but it was soon realized that there would have to be a common standard. By 1970, the Universal Grocery Products Identification Code (UGPIC) was written by a company called Logicon Inc. The standard was further improved and led to the Universal Product Code (UPC) symbol set. To this very day, this standard is used in the United States and Canada

Fig 2.3 an Auto –ID System

History of RFID development

DECADES

EVENTS

1940 – 1950

Radar refined and used, major world war II development. RFID invention in 1948

1950-1960

Early explorations of RFID technology, laboratory experiments.

1960 -1970

Development of the theory of RFID. Start of application field trials.

1970-1980

Explosion of RFID development. Test of RFID accelerate. Very early adopter implementation of RFID

1980-1990

Commercial applications of RFID enter mainstream.

1990-2000

Emergence of standards. RFID widely deployed. RFID becomes a part of everyday life.

Table 2.0

Bar Code

Bar code is a binary code comprises of a fields of bar and graph arranged in a parallel configuration. Arranged according to a predetermine pattern that represent data element that refer to an associated symbol. The sequence is made up of wide and narrow bars and gap can be interpreted numerically and alphanumerically. It is read by optical laser scanning. Bar code being identical, in their physical design. There are differences in the code layout. The scanner device directs a light beam at the bar code. The device contains a small sensory reading element. This sensor detects the light being reflected back from the bar code, and converts light energy into electrical energy. The result is an electrical signal that can be converted into data.

In June 1974, the first UPC scanner was installed at a Marsh's supermarket in Troy, Ohio, and the first product to have a bar code was Wrigley's Gum.

In 1960’s that RFID was first considered as a solution for the commercial world. The first commercial applications involving RFID followed during the 70s and 80s. These commercial applications were concerned with identifying some asset inside a single location. They were based on proprietary infrastructures.

In 1998, some researchers at the Massachusetts Institute of Technology (MIT) Auto-ID Center began to research new ways to track and identify objects as they moved between physical locations. This research, which has a global outlook, centered on radio frequency technology and how information that is held on tags can be effectively scanned and shared with business partners in near real time.

Fig2.4 RFID tag. (Smart Card 13.56 MHz)

Fig2.5 GLASS TAGS (125 KHz)

BAR CODE VERSUS RFID

BAR CODES

•Low Cost

• Broad Utilization

• Human Readable

• Integrated in printed mat.

RFID /EPC

• Higher Costs

• Read Sensitive to Product

Attributes (metal, H2O)

• Limited Adoption

• Data Transfer Requires Line

of Sight

•Data Storage is Limited

•Environmentally Sensitive

• No Line of Sight

• Large Memory – Data Moves

with Product / Asset

•Dynamic Data Reads

Table 2.1

2.2 RFID System Components

Modern RFID system has three major components.

• Tag –Transponder /carrier

• Reader –Transceiver /interrogator

• Backend Database

Fig 2.6 RFID System components

2.2.1 Tags

Tags comprises of a simple silicon microchip, typically less than half a millimeter in size attached to a small flat aerial and mounted on a single crystal of a semiconductor used as the basis for an IC or transistors(substrate). The chip are used for storage, computation, and a coupling element, such as an antenna coil for communication. It also contain a contact pad. Tag memory may be read-only, write-once read-many or fully rewritable. Tags are classified into categories.

• Active Tag: Is equipped with a power source for the tag's circuitry and antenna.

Advantages: Readability from a distances of one hundred feet or more as well as capability to have other sensors that can use electricity for power.

Disadvantages: Limitations on the lifetime of the tag (5 years). More expensive, physically larger and add to the maintenance cost if the batteries are replaced. Battery outages can result in expensive misreads.

• Passive Tag: Does not contain a power source, the power is supplied by the reader. It draws power from the magnetic induction coupling with reader antenna.

Advantages .Tags functions without a battery which increases the life time to more than 20 years. Tags are less expensive and much smaller. Have almost unlimited applications in consumer goods and other areas.

Disadvantages .Tags can be read only at very short distances, typically a few feet at most.

• Semi-Passive Tag: Reflect (rather than transmit) RF energy back to the tag reader to send identification information. The tags contain a battery that powers their ICs. This allows for some interesting applications, such as when a sensor is included in the tag so it can transmit real-time attributes, such as temperature, humidity, and timestamp. By using the battery only to power a simple IC and sensor—and not including a transmitter.

ATTRIBUTE

PASSIVE

ACTIVE

POWER

INDUCTIVE

BATTERY

FREQUENCY

LF (125 KHz), HF (13.56 MHz),

UHF (868-968 MHz),

Microwave (2.4 GHz)

HF (303, 433 MHz),

Microwave (2.4 GHz)

READ DISTANCE

10 – 100M

1000M

MEMORY

128 bits – 32 Kbits

64 Bites

LIFE

UNLIMITED

2-7 YEARS

COST

~$0.15 to$10

$10 to $20

Table 2.2 Active, and Passive Tags [4]

2.2.2 Readers

Is a device that interrogate an RFID tag? It has an antenna that emits radio waves, the tag responds by sending back its data. A number of factors can affect the distance at which a tag can be read (the read range). The frequency used for identification, the antenna gain, the orientation and polarization of the reader antenna and the transponder antenna, as well as the placement of the tag on the object to be identified will all have an impact on the RFID system’s read range. Reader provides the connectivity between individual tags and the tracking/ management system. It functions are Connection to the server that links the information into the enterprise, initial processing of received information and Bidirectional communication with the tags.

2.2.3 Backend Database

RFID reader contains a networking element such as wired Ethernet or wireless Ethernet that connects a single RFID-read event to a central server. The central server runs a database application, with functions that include matching, tracking, and storage. In many applications, an "alert" function is also present (for example the re-order trigger, for supply chain and inventory management systems, or an alert to a guard, for security applications).

2.3 Frequencies Regulations for RFID

Most RFID systems operate in the Industrial-Scientific-Medical (ISM) bands, which are freely available to low-power, short-range systems. These bands are defined by the International Telecommunications Union (ITU).

• Low Frequency (LF) 125-135 KHz Most commonly used for access control, animal tracking, and asset tracking.

• High Frequency (HF) 13.56 MHz Used where medium data rate and read ranges up to about 1.5 meters are acceptable. This frequency also has the advantage of not being susceptible to interference from the presence of water or metals.

• Ultra High Frequency (UHF) 850 MHz to 950 MHz)—offer the longest read ranges of up to approximately 3 meters and high reading speeds.

• Microwave 2.45 GHz: an electromagnetic wave whose wavelength ranges from 1 mm to 30 cm. Use: radar, radio transmissions

• Microwave 5.8 GHz: an electromagnetic wave whose wavelength ranges from 1 mm to 30 cm. Use: radar, radio transmissions

Devices operating in each band are subjected to different power and bandwidth regulations.

Advantages and disadvantages summary Table

Table 2.3

2.4 RFID STANDARD

2.4.1 EPCglobal

EPCG has contributed to the RFID-network standards with its EPC (Electronic Product Code) Network. It is a nonprofit joint venture between EAN International and the Uniform Code Council (UCC), the group that oversee the international standards for UPCs (universal product codes), or bar codes.

EPC CLASS

DEFINITION

PROGRAMMING

CLASS 0

"Read Only" passive tags

Programmed as part of the

semiconductor manufacturing

process

CLASS 1

"Write-Once, Read-Many"

passive tags

Programmed once by the

customer then locked

CLASS 2

Rewritable passive tags

Can be reprogrammed many

times

CLASS 3

Semi-passive tags

CLASS 4

Active tags

CLASS 5

Readers

NA

Table 2.4

International Organization for Standardization (ISO)

Currently ISO defines various standards for RFID, example. The Gen 2 protocol is currently being reviewed at ISO as standard 18000-6C. Other standards are: ISO TC 23: Animal Identification, ISO TC 104: Freight Containers, ISO TC 204: Road Telematics, ISO TC 122: Packaging, JTC 1/SC 17: Integrated Circuit Cards (i.e.: credit cards with embedded tags), JTC 1/SC 31 Automatic Identification and Data Collection Techniques. [6]

2.6 Security Issues and threat related to RFID.

Tag Access,

Tag Collision

2.6.1 Tag Access

An RFID system is susceptible to various kinds of attacks. [4]

• Physical Access: Occurs when the attacker have physical access to the RFID tags. E.g. Material removal or water etching, energy attacks, radiation imprinting, circuit disruption or clock glitching. It can’t happen at a widespread level.

• Counterfeiting: Occurs when an attacker can be able to produce its own tags and can initiate queries to the tags.

• Eaves dropping: Occurs when attacker cannot initiate the query, but listen to "logical" messages transmitted in protocols, as opposed to the electromagnetic emissions monitored by physical access.

• Traffic analysis: Attacker cannot listen to the logical message, but still be able to find the number of queries generated thereby by being able to do traffic analysis.

2.6.2 Tag Collision

Readers may attempt to read a single tag from among a population of many. When multiple tags respond simultaneously to a reader query, conflicting communication signals may cause interference. This interference is called a collision and may result in a failed transmission.

Binary tree walking algorithm is a method used to avoid collision in Tags and Readers

2.6.2.1 Binary tree-walking

A reader will query all tags in the vicinity for the next bit of their ID. If two different bit values are transmitted from among the population of tags, reader will be able to detect the collision. It will broadcast a bit indicating whether tags who broadcast a (0) or (1) should continue. Reader chooses a "branch" from the binary tree of ID values. Incompatible Tags with the reader’s choice will cease participating in the protocol. As reader continues to move down the branches of the binary tree, fewer tags will continue operating. If all tags are unique, at the end of the protocol only a single tag will remain in operation. This process of addressing and isolating a single tag is referred to as singulation.

Fig 2.7 Binary tree walking

2.7 Security Methods which can be used to protect RFID system.

Active querying attacks may be addressed by limiting who is permitted to read tag data through access control.

Eavesdroppers may be dealt with by ensuring that tag contents are not broadcast in the clear over the forward channel.

2.8 Security for Tags with No Cryptographic Capabilities [7]

• Tag Killing: The most straightforward approach for the protection of consumer privacy is to "kill" RFID tags before they are placed in the hands of consumers. A killed tag is truly dead, and can’t be re-activated. The standard mode of operation proposed by the Auto ID Center is that a tag can be killed by sending it a special "kill" command (including a short 8-bit "password") [12, 13].

• Active Jamming: Active jamming of RF signals is another, related physical means of shielding tags from view. The consumer could carry a device that actively broadcasts radio signals so as to block and/or disrupt the operation of any nearby RFID readers.

• Tag Shielding: A tag may be shielded from scrutiny using Faraday Cage —a container made of metal mesh or foil that is impenetrable by radio signals (of certain frequencies). If high-value currency notes come equipped with active RFID tags, then it is likely that those foil-lined wallets will become big sellers! At least one company already offers a Faraday-cage-based product for privacy purposes [17]

2.9. RFID Tags with Cryptographic Capabilities

• Hash Lock: Is based on the public-key cryptographic primitives or symmetric primitives requiring secure key distribution. Each hash-enabled tag has a portion of memory reserved for a temporary metal ID. The Tag owner "locks" tags by first selecting a key at random, then computing the hash value of the key. The hash output, designated as the metal IDs stored on the tag and the tag is toggled into a locked state. The key and the metal ID are stored in a back-end database. To "unlock" a tag, the owner first queries the metal ID from the tag and uses this value to look up the key in a back-end database. The owner transmits this key value to the tag, which hashes the received value and compares it to the stored metal ID. If the values match, then the tag unlocks itself and offers its full functionality to any nearby readers. [4]

• Authentication using AES algorithm: Using AES algorithm for authentication in a challenge response based protocol. As per the standards for 13.56MHZ frequency, the time for tag to respond is 32 clock cycles at a frequency of 100 KHz, which is not enough for AES algorithm for encryption. So a protocol of interleaved challenge and response protocol is this gives the tag enough time (18ms) to encrypt message using AES. The system proposes that 50 tags could be authenticated in 1 second. The authors proposed AES implementation as a 32 bit architecture which allows to quarter the power consumption as compared to 128 bit. This comes at a cost of increasing the time for encryption which can be derived from using interleaved challenge respond. [19]

• HB Protocol for RFID: Is been presented by S.Weis and A. Jules a particular human-to computer authentication protocol designed by Hopper and Blum (HB) [18, 19], is shown to be practical for low-cost pervasive devices like RFID Tags. HB protocol is essentially a challenge and response protocol. Suppose Alice and a computing device C share an k-bit secret x, and Alice would like to authenticate herself to C. C selects a random challenge a 2 {0, 1}k and sends it to Alice. Alice computes the binary inner-product a · x, then sends the result back to C. C computes a · x, and accepts if it matches its own calculation. [10]

In a single round, someone imitating Alice who does not know the secret x will guess the correct value a · x half the time. By repeating this challenge and response for r rounds, Alice can lower the probability of naively guessing the correct parity bits for all r rounds to 2−r. Alice can also inject noise into her response. The noise bit νcan be easily generated. Alice intentionally sends the wrong response with constant probability η. C then authenticates Alice’s identity if less than ηr of her responses are incorrect. [10]

3.0. CURRENT AND EMERGING RFID APPLICATIONS

3.1 Automotive

Auto-makers have added security and convenience into an automobile by using RFID technology for anti-theft immobilizers and passive-entry systems. Vendor-Texas Instruments offers several Passive tags and Readers in different frequency ranges. These includes: low frequency (134.2 kHz), high frequency (13.56 MHz), and ultra-high frequency (860 - 960 MHz). Below is the description of one of the company’s RFID tag called DST?

Digital Signature Transponder (DST): DST consists of a small microchip and antenna coil encapsulated in a plastic or glass capsule. It is a passive device. A DST contains a secret, 40-bit cryptographic key which is field-programmable via RF command. In its interaction with a reader, a DST authenticates itself by engaging in a challenge-response protocol. The reader initiates the protocol by transmitting a 40-bit challenge. The

DST encrypts this challenge under its key and returns a 24-bit response. It is thus the secrecy of the key that ultimately protects the DST against cloning and simulation. DSTs are deployed in several applications that are notable for wide-scale deployment and the high costs (financial and otherwise) of a large-scale security breach.

Fig 3.1

At left, an Exxon Mobile Speed Pass both inside and outside its casing. At right, an immobilizer equipped car key. The small chip is embedded into the plastic head of the key.

3.1.1 Deployment of Digital Signatory Transponder (DST)

• Vehicle Immobilizers: Immobilizers deter vehicle theft by interrogating an RFID transponder embedded in the ignition key as a condition of enabling the fuel-injection system of the vehicle. The devices have been credited with significant reductions in auto theft rates, as much as 90%.

• Electronic Payment: Used in Exxon Mobil Speed Pass system, with more than seven million cryptographically-enabled keychain tags accepted at 10,000 locations worldwide.

3.2 Animal Tracking

RFID technology are used in livestock product, also used to meet export regulations and optimize livestock value. Wild animals are tracked in ecological studies, and many pets that are tagged are returned to their owners. Vendor-Advanced ID Corporation: Provides Low frequency (LF) and UHF RFID chips and readers

• Pet Identification: Since 1994, they have marketed low frequency (LF) chips and readers to American Veterinary Identification Devices ("AVID") for the purpose of permanent identification in the pet industry

• Livestock Tracking: Their ultra-high frequency (UHF) chips are used in visual ear tags. Each UHF tag or LF microchip is uniquely numbered, providing positive global identification of an individual animal.

3.3 Supply Chain

Walmart, Target, BestBuy, and other retailers have discovered that RFID technology can keep inventories at the optimal level, reduce out-of-stock losses, limit shoplifting, and speed customers through check-out lines. Walmart is using the technology to reduce 'out-of-stocks' and control excess inventory.

Vendors - Alien Technologies: Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. Alien Technology offers a range of EPC compliant UHF solutions for pallet, case and item level tagging. Alien manufactures electronic product code (EPC) Class 1, Gen 2 tags.

ALL-9338-02 "Squiggleâ„¢"

- EPC Class 1, Gen 2

- General purpose for use on corrugate, plastic and paper.

Fig 3.2 a Gen- Tag by Alien Technologies

ALR-9800

Alien's new-generation, multi-protocol reader, designed for EPC Class 1 Gen 2 compliance.

Fig 3.3 A Gen-2 Reader by Alien Technologies

3.4 Emerging applications of RFID

• Tracking currency: The European Central Bank was moving forward with plans to embed RFID tags as thin as a human hair into the fibers of Euro bank notes by 2005, in spite of consumer protests.

The tags could allow currency to record information about each transaction in which it is passed. Governments and law enforcement agencies hail the technology as a means of preventing money-laundering, black-market transactions, and even bribery demands for unmarked bills. However, it has yet to be implemented.

• E- Passports: In order to increase the security of United States travel documents, the Government has developed a new ‘electronic passport’s system. This will contain RFID tags: chips that will wirelessly send passport and biometric information to an inquiring RFID reader. This new passport system has already been deployed in October 2006.Reading a passport’s RFID chip requires a password generated by scanning the machine readable data on the inside front cover.

Additionally, a small shield in the front cover is supposed to only allow wireless passport reading when the booklet is open. However a German computer security consultant has already shown in Aug 2006 that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.

• Immigration Tracking: Scott Silverman, Chairman of the Board of VeriChip Corporation, proposed VeriChip as a way to identify immigrants and guest workers. This however has attacked by privacy experts who warn that once people are numbered with a remotely readable RFID tag like the VeriChip, they can be tracked. Once they can be tracked, they can be monitored and controlled. [19]

4.0 RFID Future TREND

• "Smart" products

Clothing: 1.5 Billion tags will be applied to apparel by the end of 2012

Electrical Appliances: 50 Million Electronic devices will be RFID-enabled in 2012

CDs, etc. tagged for store returns

• "Smart" appliances

Refrigerators that automatically create shopping lists

Closets that tell you what clothes you have available, and search the Web for advice on current styles, etc.

One such application is Vista Crafts RFIQin, RFIQin is a patented [10] [11] [12] cooking device that consists of cooking pan, portable induction heater, and recipe cards. Which is designed by Vita Corporation, but is currently sold in japan through vita craft japan. Electronics are embedded in the cookware, which monitor the food and send wireless signals to adjust the temperature of the induction heater accordingly; this prevent the loss of nutrients and save thermal energy because the food is not overheated. [13]

Specialized recipe card send a wireless signal to the RFIQin system, when the card is waved under the handle of the pan, which begin the cooking process, each recipe card can incorporate 23 separate recipe steps[15]. The card has a cooking steps to follow that are indicated by a beeping sound from the induction heater .the system can cook almost all types of food, including baking cakes and fried food[16]. Each pan is embedded with a RFID tag and handle of cookware, which is covered by a special pan tag that protects the RFID tag from heat and moisture. A temperature sensor connected to the RFID tag is imbedded within a tunnel in the bottom center of the pan. The RFID tag is monitor the food 16times / seconds and transmit a proprietary signal to the induction heater regarding the heating characteristic of the content as well as the temperature of the content to adjust the heat accordingly; [17][18]. The special pan tag is not battery or rechargeable [19].

During cooking the food doesn’t need to be monitored or stirred because the pan use waterless cooking methods and the induction heater uses alternating pulse to control the heat, so the liquid in the pan continuing revolving in a circular motion. The RFIQin pan are built with vapor seal that enables the pan to use techniques of pressure cooking [10]

The portable induction heater and cookware can be used manually mode as a regular induction heater cost $2100, (241,500 yen in japan)

Fig 4.0 Vista Crafts RFIQin

Fig 4.1 RFID recipe cards

• RFID-enabled mobile phones (e.g., Nokia):

Scan movie poster to learn show times Scan consumer product to get price quotes

• Recycling Plastics that sort themselves

We live in a multi-scale wireless world. Technologies like 4G, Wi-Fi, GPS, RFID, and sensors are coming together in hundreds of ways to create meaningful change in our lives. See how this change has come about and what the future holds.

The RFID Market will generate $70.5 Billion from 2012 to the end of 2017

1.5 Billion Tags will be applied to apparel by the end of 2012

50 Million Electronic devices will be RFID-enabled in 2012

Today, users and consumers are interacting with RFID every day. Businesses are reaping enormous financial benefits by using real-time data, generated by RFID systems, to become more intelligent and efficient.

4.1 RFID ADOPTION

Airbus reports $3-4M in savings related to warehouse logistics, tool management, and work-in-process tracking

Mayo Clinic reports $2M annual savings related to tissue sample management

Greenville Hospital reports 225 assets recovered and an estimated $30K in labor savings per year

POSCO reports annual savings of $16.8M ($1.4Mper month) tracking more than 2Msteel components

Disney tracks 3Million garments (worth $100M) and reports achieving cost savings of more than $1M in less than 1 year

Ford Motor Company and Dewalt provide first RFID-enabled trucks, leading to the development of next-generation, in-vehicle visibility solutions

GPS and RFID expands supply chain and fleet visibility. The convergence of wireless technologies like RFID, GPS, NFC and Wi-Fi will drive the potential to measure, report and monetize a growing number of transactions in the physical world like .Home, Distribution Center, Warehouse and Shopping Center.C:\Users\AKINSOWON\Desktop\RFID An Introduction2_files\IC110950.gif

4.2 RFID AND INTERNET AS A THING

The ease of sharing and acting on real-time information from connected devices lends itself well to many new personal and business applications.

RFID will be the catalyst for the next phase of the Internet of Things, where the resulting data and new applications will be limitless (great in amount).

In 2008, the number of devices connected to the Internet exceeded the number of people on Earth

NFC Smart Posters and mobile marketing could push the non-payment NFC tags market to a $300M per year business by 2016

By 2020, there will be 50Billion devices connected to the Internet

RFID and Social Media is driving brand loyalty and increasing retailer revenue .NFC is automating payments and other consumer actions

5B subscribers of telecommunications

Services are demanding unique and personalized offerings that match their individual lifestyles

The average amount of data per hospital will increase from 167TB to 665TB in 2015, driven by enormous growth of medical images, electronic medical records, and connected devices

The Internet of Things feeds into the huge amounts of data generated every day. The data can pile up and be useless, or it can be turned into valuable, actionable information for enormous societal impact.

Every 60 seconds: we send 174M emails, Tweet nearly 35,000times, and upload 20 Hours of video to YouTube

IP traffic will reach 68Tbpsin 2015, the equivalent of 56,500,000 people streaming internet HD video simultaneously, all day, every day $165B in total sales are missed each year because retailers don’t have the right products

In stock. Retailers will have to confront waves of new data as RFID becomes widely adopted for inventory management

RFID is being used to automate data collection, identification, and location systems worldwide at in future ref [14]

RFID will become a platform for driving efficiency across markets According to Saugatuck Technology, every business computing category will move to the cloud by 2015

4.3 RFID CRITICS

Consumers have many fears. Some of which may be justified. This debate may be one of the few in which you will find the American civil liberties and Christian union coalition on the same side. Human chipping has seemingly higher stakes than merchandise tagging, and RFID critics are concerned that human chipping may one day become mandatory. When the company CityWatcher.com chipped 2 of its employees 1n 2006, these fears spun out of control. CityWatcher insisted that the employees were not forced to be chipped. They volunteered for the microchip implants for easier access to secured vaults where confidential documents are stored. Other employees declined the implants, and their position with the company were Unaffected

Aside from the limitation of Verichip scanning. Human chipping has profound religious and civil liberty implication for some people. Believing that human chipping is forfeiting a biblical prophecy from the book of revelation, interpreting the chip as the "Mark of the Beast" (666). To others concerned with the civil liberties. The chip is bringing us one step closer to an Orwellian society. In which our every action and thought will be controlled by Big Brother.

While we can choose whether or not to put RFID chips in ourselves or our pets. We have little control over tags being placed on commercial products that we buy. In the book "spychips": how major corporation and Government plan to track your every move with RFID

"Katherine Albrecht and Mclntyre describe the most extreme implication of RFID tags. How RFID can be used to gauge spending habits and bank account to determine how much you should be charged for the products you buy. This sound paranoid, but hackers have proven it that RFID tags can be tampered with, by disabling their anti-theft features and changing the price that correspond to their product. Better encryption is needed to ensure that hackers can’t pick up RFID frequency with super-lative antennas.

Some critics say that that relying on RFID as the primary means of security, could make human security checkpoints lazy and ineffective. If security guards rely solely on the RFID anti-theft devices in merchandise and RFID technology of government –issued identification to screen for criminals or terrorists. They might miss the criminal activity happening right in front of their eyes

CONCLUSION

This survey covered the clear information about RFID critics, security implication, present and future technologies in general. We rest focused on present RFID, the emerging development and application of RFID in different section, future RFID and the critics and fear of adopting the RFID technology in future. Because of Christians believe is a sign of anti-Christ

REFRENCES

[1] About Inventors web site

http://inventors.about.com/library/inventors/blbar_code.htm

[2] Royal Air Force. History: 1940.

http://www.raf.mod.uk/history/line1940.html.

[3] Electronic privacy information center.

http://www.epic.org/privacy/rfid/

[4] Security and Privacy in Radio-Frequency Identification Devices

By Stephen August Weis Massachusetts Institute of Technology

May 2003

[5] Wikipedia Electronic encyclopedia

http://en.wikipedia.org/wiki

[6] International Organization for standardization.

http://www.iso.org/

[7] The Blocker Tag: Selective Blocking of RFID Tags for Consumer

Privacy. A. Juels, R. L. Rivest, and M. Szydlo. ACM CCS '03.

[8] Texas Instruments. http://www.ti.com/rfid/

[9] RFID Journal. www.rfidjournal.com

[10] "Radio frequency identification controlled heat able objects"

Directed Patent. Com . Retrieved 2011 – 03 -23

[11] "Mamoru Imura Patent Invector overland park, KS"

FreshPatent.com retrieved 2006-12-24

[13] "United States Patent 7157675"

United States Patent and trademark office Retrieved. 2007-01-03

[14] "---------------RFIQ ----------------------- (in Japanese).

Robocasa .Com. 2006 -03-11 Retrieved. 2007 -03-07

[15] "lost packets: networking news and trivia"

Network world Canada. 2006 -05 -26 retrieved 2007-03-06

[16]"variation" (in Japanese). Vitacraft japan.

Archived from the original on 2007-05-09

Retrieved 2007-01-02.

[17] "--------------- (in Japanese).

Nippon Television. 2006 -03-11 Retrieved 2007 -03-05

[18]"what is RFIQin" vitacraft. 2005 archived from original on 2006-12-30

Retrieved 2007-01-02

[19]"system" (in Japanese) vitacraft japan. Archived from original on 2007-05-09

Retrieved 2006-12-24

[20]" pressure cooker patent invention" ….

Freshpatents.com Retrieved 2007-01-03.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now