International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Emerging Progressions in RFID Technology S. Harish Chakravarthy#, R. Ravi Kumar* #Final Year B. Tech, Dept. of ECE, KL University, Vaddeswaram, AP, India. *Associate Professor, Dept. of ECE, KL University, Vaddeswaram, AP, India. ABSTRACT: During the last decade, most organizations implemented enterprise-wide applications and integration platforms. These implementations have benefits in terms of data synchronization and information flows within the organization and with trading partners those valuable inputs for planning and optimization of schedules and reports. However, automated data capture and tracking in real-time has a major bottleneck, so the ability of organizations to optimize their investments in supply chain solutions. Radio Frequency Identification (RFID) technology is emerging as a technology that could provide the answer to this problems. Using tags, readers and radio waves to communicate between the two RFID combined with the EPC (Electronic Product Code) is able to address these pain points and would be deliver a range of benefits in various vertical markets such as manufacturing, distribution, retail, logistics and security. The potential benefits arise from increasing the supply chain, increase in efficiency and decrease in costs due to better data syn \ tion, increasing the responsiveness to changes due real time information visibility and some additional industry / vertical specific advantages. RFID promises have major impact on the supply chains which trading to work more effectively together and achieve new levels of efficiency and responsiveness. This document describes technical research on the problems of privacy and security for RFID and also explores the solution privacy and security issues using Phase Five Life Cycle Model. Index Terms-RFID Technology, Supply Chain Management, Privacy, Security, Electronic Product Code. INTRODUCTION: Essential for an effective and efficient managed supply chain includes accurate, real-time information on the products within the chain. The integration RFID systems within a company’s supply chain ISSN: 2231-5381 provide a abundance of economic and productive potential. A RFID is a "white" tag with an embedded microchip with a product that can be used receiver using radio frequencies. The "white" tag is applied to the product on the pallet level, while still in the magazine prior to shipment. Companies such as GAP, CVS, Gillette, Proctor & Gamble and WalMart have recognized the importance to make use of RFID technology to improve and to increase operational efficiency in the supply chain, which benefits of recent developments in the electronic cataloging. With RFID systems, companies would have increased product visibility, reduce out-of-stock items, trim warehouse costs, eliminate stock errors, reduce theft and shrinkage and allows companies regularly to their logistics and inventory databases to update. Several pilot studies are global RFID to study under way system used and the integration into existing ERP systems. Most companies take a cautious approach and initially focus on the study of RFID pallet level before moving towards each unit stored in a box. RFID is the latest bulletin magic in technological scope that has the potential to be a major shift in the way each brand has organizations approach their supply chain. Leading the way in embracing these technology retailers, especially WalMart and their suppliers. RFID is enabling companies see further in the supply chain than ever before, providing More accurate real-time information and improvements process efficiency. The increased visibility can lead to faster inventory turns, less shrinkage, lower labor costs and higher material flow through warehouse or distribution center center. Greater efficiency means RFID-enabled processes take less time and effort, complete pallets of the product may be recognized in seconds, without the need to break them, inventory and cycle counting can be accomplished in hours or even minutes instead of days. RFID tags are small, wireless devices that aid in the identification objects and people. With dropping costs, they are likely to proliferate in the billions in the coming years and eventually in the trillions. RFID tags track objects in supply chains, and work their way into the pockets, possessions, and even the bodies of consumers. http://www.ijettjournal.org Page 1643 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 II. REVIEW OF THE LITERATURE: Juels' survey gives a good introduction and overview some of the central issues in RFID security. Lehtonen et al. limiting the scope of their research to product authentication and a discussion of the trade-off between complexity and safety in various RFID authentication methods. Also there are publications on state-of-the-art in RFID privacy preservation, as well as numerous reviews on safety and privacy with respect to health, e-commerce and data mining. The latter two are particularly interesting, as essential privacy questions in these areas, such as "What information is collected?" and "How is data protected during transmission?" Apply for RFID as as well. The main factor behind these topics in E-commerce is trust, a subject that can be anticipated easily a RFID context. When RFID tagged objects hit the end user RFID - The best technology in Supply Chain Management of the market on a large scale, the willingness of consumers to provide data will likely depend on the individual's perception of reliability, as it does in e-commerce. Such perceptions will be based on the security and privacy directly receive. Due to the invasive nature of many RFID tags privacy issues and concerns exist. One issue that moves to the lead the way by tracing the use of RFID tags and tracking of RFID tags. Tracing and tracking of the data from tagged objects in the supply chain of competitors is the threat of industrial espionage (Garfinkel, Juels et al. 2005). Tracing and tracking of the data after the sale poses consumer privacy issues can also be hidden in packaging and tags (Ayoade 2007). In addition, RFID tags respond interrogation request all readers through which data is collected by others outside the organization (Juels 2006). There are many methods for disabling RFID tags and prevent the data from visible which are currently in use. Additional methods have been proposed for destruction RFID labels unusable. Implementation of devices and methods such as blocking labels, cutting labels, soft labels block, selective block labels and kill commands are used to block or impede the propagation of the RFID signals. Blocking tags special devices / tags that interfere with the protocol used for communication between normal identification labels and readers (Ayoade 2007) and (Jules and Weis 2006). Label clipping comprises switching off of the RFID device by removing or breaking the connection between the chip and the antenna.GĻnter Karjoth and Paul Moskowitz identify a variety of methods to effectively clip labels through the use of removable tags with electrical conductors, the use of tags with perforations, and the use of tags ISSN: 2231-5381 with a peel-off layer (Karjoth and Moskowitz 2005). Soft blocking is a variation on the concept of blocking which acts by means of the use of software or firmware. Soft block provides for the possibility of the use of the privacy protocols (Juels and Brainard 2004). Selective blocking of labels involve changing a blocker tag to prevent the transmission of a selected set of tags (Juels, Rivest et al. 2003). The dead command is a method for permanently disabling an RFID tag as the tag moves in the hands of a private owner (Juels, Rivest et al. 2003). Radio frequency identification security as defined by Ranasinghe, English, and Cole is composed of the following components, confidentiality or message content security, integrity of the contents of the message, authentication of the sender, and receiver nonrepudiation by the sender, and the availability (Ranasinghe, English et al. 2004). However, this study will discuss security on the basis of the following criteria - vulnerabilities, protocols, and cryptography. III. RESEARCH METHODOLOGY: The objectives of this study are twofold: 1) To analyze the problems of privacy and security RFID 2) In order to provide privacy and security problems solutions using Phase Five Life Cycle Model A descriptive research design is appropriate for this type of research. Case study method is used for analyzing the target. More than that, personal interview made with the managers and customers of the shopping malls like Central, Forum, Globus, and Big Bazaar in Bangalore. This interview gives a idea about the usability of RFID. Based on the idea, this paper analyzed the problems of privacy and security considerations for RFID and also to look for solutions privacy and security issues using Phase Five Life Cycle Model. IV. PRIVACY CONSIDERATIONS: http://www.ijettjournal.org & SECURITY Page 1644 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Privacy considerations are connected with security considerations. An important objective of any RFID security program is to risks and control measures for the preservation identify personally identifiable information (PII). An organization implement a security and privacy program for RFID system should consult its privacy officer and counsel the whole information life-cycle. A privacy program, various types of personal protection data. Some information is personally identifiable; this means that anyone can use to identify a particular individual. Other information may not be personally recognizable, but individuals may still believe that even private in settings where they are anonymous. For example, a anonymous individual travel on a public bus may not want other passengers know what items are in her handbag. Information that is not PII generally not subject to legal requirements, but many people can still consider this personal information secure and dignified. Therefore organizations can still choose to implement privacy controls voluntary corporate guarantee for information from its customers, partners, employees and other stakeholders consider personally. Federal law regulates federal government agencies' collection and processing of personal data. Relevant statutes the Privacy Act of 1974, the E-Government Act of 2002, FISMA, and the Consolidated Appropriations Act of 2005. OMB memoranda giving guidance and instructions for implementation of these laws agencies. The privacy of health information is covered by HIPAA, which applies to federal and nonfederal entities. The Federal CIO Council developed a list of privacy control families provide a framework for this integration privacy principles in RFID systems. In some cases, controls can serve to improve. Both security and privacy In other cases, privacy controls complement security. Because RFID implementations are usually highly customized, privacy control commands are not always appropriate or not effective for RFID systems. V. THE APPLICATION OF PRIVACY & SECURITY CONSIDERATIONS FOR RFID SYSTEMS: ISSN: 2231-5381 RFID systems support a wide range of business that does not involve all privacy. Examples of RFID systems that are unlikely to privacy considerations include those supporting industrial processes, animal tracking, and asset management systems in which the assets are never associated with individuals throughout their life cycle. Privacy considerations exist when using the system, collects, shops, or revealing personal information. RFID system personal information would be used or disclosed in any of the various ways: 1) Personal information such as a name or account number can be stored on the tag or in a database in the enterprise subsystem. 2) A tag can be associated with a personal item, such as a bottle of prescription drugs, or a folder of legal documents that are outside the individual would be able to possession. 3) A tag may be associated with an item that often travels with an individual, such as a labeled box or vehicle part in a car or truck drives the individual often. Do not store the personal RFID system information privacy implications. For example, the label on a bottle of prescription medication can identify the drug in the bottle, but not the identity of the person for whom the written prescription. Nevertheless, the individual account the drug can still hold the drug perceive as personal information as scanned and read by others as would information about a medical condition that the individual considers private. Nor does the person not to possess a tag have item for the RFID system privacy implications. For For example, if an employee contributes an employer-labeled computer or tools, then RFID technology could be used used to follow. the residence of the employee The employee may agree on call after hours, but could consider his or her place in that time as personal data. While the concepts of privacy and personal data are not new, RFID technique is an example of a technology that is newly introduced complexity to the landscape of the http://www.ijettjournal.org Page 1645 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 privacy considerations for several reasons. For example, RFID technology increases the likelihood that someone PII can create through indirect means. RFID technology creates opportunities to contact, store, and process specific information item with regard to business transactions easier than ever before. In Moreover, the width of the items in the daily life, which will be built-in RFID systems, is expected to increase in the coming years. The increase in the range of the information systems in our daily life, combined with the increase of the level of detail of the information in these systems is likely new opportunities for combining of data elements to generate PII. Advances in Internet search and data mining software will also have the ability to capture from PII facilitate large amounts of what might have been previously considered to be non-correlated data. All these trends may occur PII even if not listed on labels themselves. To maintain different inherent properties of RFID tags privacy controls more difficult than traditional information IT systems. Organizations can challenges guaranteed privacy policies when they can not be linked to effective safeguards. RFID uses wireless communication, which is more vulnerable to eavesdropping attacks and other than the wired systems which most traditional IT systems are. In many applications, RFID Tags will travel between organizations and often found in public areas, which means that they can not benefit from physical security often the most traditional IT systems. In general, RFID resources are limited and can not implement advanced technical controls. Since this document describes many techniques exist to mitigate these security and privacy risks, and these are expected to improve over time. However, the economy many RFID applications will require low-cost tags with limited functionality, which has important implications for privacy protection. Finally, in many applications, in particular those involving passive tags, may identifiers beyond life usefulness of the application for which they are intended, but still may store PII or used to generate PII when combined with other data. While traditional IT systems established policies and procedures for maintaining and destruction of data, can destroy or disable markers are achievable when they are outside the control of the manages the RFID system. RFID technology can introduce new privacy for reasons not fully understood today. Privacy regulations and principles evolve to meet the requirements of the new IT systems. As technical progress as Internet, electronic databases and analytical system have the collection and exchange of PII easier than it was made in a world of paper files. RFID technology extends the reach of IT systems and the collection and exchange of personal information ISSN: 2231-5381 that may be considered. While today RFID readers are usually located in designated locations support a particular business in the future readers ubiquitous and can use multiple are objectives. For example, today could be an RFID system implemented to access to a facility with RFID-enabled badges. Badge holders are likely to possess other tagged items. In the future, cardholders can routinely carry a number of tagged items, and the badge reader can be used to scan them and a profile and authenticate the badge. The collected data to third parties parties to legitimate business needs and the legitimate data sharing agreements. The systems can be carried out with disclosure and consent, but may not be effective because individuals and organizations can not reasonably understand all the potential uses of the data or predict what type transactions can create PII through indirect inference. For these reasons, new privacy tools and concepts to be developed to address the complexity in RFID technology. CONCLUSION: RFID technology is emerging as a technology that could provide the answer to the problems in automated data cpture and monitored in real time.Thus by using radio waves to communicate between the two RFID combined with the EPC (Electronic Product Code ) is able to address these pain points and would provide a range of benefits in various vertical markets such as manufacturing, distribution, retail, logistics and security. The potential benefits arise from the increase of the supply chain, increase efficiency and reduce costs through better synchronization of data, increasing the sensitivity to changes due to real time information visibility and some additional industry / vertical specific advantages. REFERENCES: 1.RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification by Klaus Finkenzeller. 2.The RF in RFID: Passive UHF RFID in Practice by Daniel M. Dobkin. 3.Development and Implementation Technology by Cristina Turcu. of RFID BIBLOGRAPHY: S. Harish Born in 1991 in Guntur dist. currently pursuing B.Tech final year in K.L.UNIVERSITY. His areas of interest are wireless communication and digital electronics. http://www.ijettjournal.org Page 1646 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Email: sadhuharish09@gmail.com Mr. Rayala Ravi Kumar pursued his masters, M.E. in Communication systems from P.S.G. College of technology, Coimbatore in the year 1998. For the past 15 years he is associated with Telecom industry and Academia at various capacities. For 5 years with telecom industry worked on development and feature enhancements of Networking, Storage and Security products based on TCP/IP Stack, Network Management, Storage management, Intruder Protection and Detection Systems by serving at companies like Integra Micro Systems, HCL-CISCO, Emulex Communications and IBM as Software Engineer ( R & D), Member Technical Staff, Engineer and Consultant. For 9 years in association with Academic Institutions worked as lecturer, Associate Professor, Professor and Head of the Department and Prof. In-charge for industry institute interaction cell. Currently he is working as associate professor in Dept. of E.C.E. at K. L. UNIVERSITY, GUNTUR ISSN: 2231-5381 http://www.ijettjournal.org Page 1647