Emerging Progressions in RFID Technology S. Harish Chakravarthy

advertisement
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Emerging Progressions in RFID Technology
S. Harish Chakravarthy#, R. Ravi Kumar*
#Final
Year B. Tech, Dept. of ECE, KL University, Vaddeswaram, AP, India.
*Associate Professor, Dept. of ECE, KL University,
Vaddeswaram, AP, India.
ABSTRACT:
During the last decade, most organizations
implemented enterprise-wide applications and
integration platforms. These implementations
have benefits in terms of data synchronization and
information flows within the organization and
with trading partners those valuable inputs for
planning and optimization of schedules and
reports. However, automated data capture and
tracking in real-time has a major bottleneck, so
the ability of organizations to optimize their
investments in supply chain solutions. Radio
Frequency Identification (RFID) technology is
emerging as a technology that could provide the
answer to this problems. Using tags, readers and
radio waves to communicate between the two
RFID combined with the EPC (Electronic Product
Code) is able to address these pain points and
would be deliver a range of benefits in various
vertical markets such as manufacturing,
distribution, retail, logistics and security. The
potential benefits arise from increasing the supply
chain, increase in efficiency and decrease in costs
due to better data syn \ tion, increasing the
responsiveness to changes due real time
information visibility and some additional
industry / vertical specific advantages. RFID
promises have major impact on the supply chains
which trading to work more effectively together
and achieve new levels of efficiency and
responsiveness. This document describes technical
research on the problems of privacy and security
for RFID and also explores the solution privacy
and security issues using Phase Five Life Cycle
Model. Index Terms-RFID Technology, Supply
Chain Management, Privacy, Security, Electronic
Product Code.
INTRODUCTION:
Essential for an effective and efficient managed
supply chain includes accurate, real-time information
on the products within the chain. The integration
RFID systems within a company’s supply chain
ISSN: 2231-5381
provide a abundance of economic and productive
potential. A RFID is a "white" tag with an embedded
microchip with a product that can be used receiver
using radio frequencies. The "white" tag is applied to
the product on the pallet level, while still in the
magazine prior to shipment. Companies such as
GAP, CVS, Gillette, Proctor & Gamble and WalMart have recognized the importance to make use of
RFID technology to improve and to increase
operational efficiency in the supply chain, which
benefits of recent developments in the electronic
cataloging. With RFID systems, companies would
have increased product visibility, reduce out-of-stock
items, trim warehouse costs, eliminate stock errors,
reduce theft and shrinkage and allows companies
regularly to their logistics and inventory databases to
update. Several pilot studies are global RFID to study
under way system used and the integration into
existing ERP systems. Most companies take a
cautious approach and initially focus on the study of
RFID pallet level before moving towards each unit
stored in a box. RFID is the latest bulletin magic in
technological scope that has the potential to be a
major shift in the way each brand has organizations
approach their supply chain. Leading the way in
embracing these technology retailers, especially WalMart and their suppliers. RFID is enabling companies
see further in the supply chain than ever before,
providing More accurate real-time information and
improvements process efficiency. The increased
visibility can lead to faster inventory turns, less
shrinkage, lower labor costs and higher material flow
through warehouse or distribution center center.
Greater efficiency means RFID-enabled processes
take less time and effort, complete pallets of the
product may be recognized in seconds, without the
need to break them, inventory and cycle counting can
be accomplished in hours or even minutes instead of
days. RFID tags are small, wireless devices that aid
in the identification objects and people. With
dropping costs, they are likely to proliferate in the
billions in the coming years and eventually in the
trillions. RFID tags track objects in supply chains,
and work their way into the pockets, possessions, and
even the bodies of consumers.
http://www.ijettjournal.org
Page 1643
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
II. REVIEW OF THE LITERATURE:
Juels' survey gives a good introduction and overview
some of the central issues in RFID security. Lehtonen
et al. limiting the scope of their research to product
authentication and a discussion of the trade-off
between complexity and safety in various RFID
authentication methods. Also there are publications
on state-of-the-art in RFID privacy preservation, as
well as numerous reviews on safety and privacy with
respect to health, e-commerce and data mining. The
latter two are particularly interesting, as essential
privacy questions in these areas, such as "What
information is collected?" and "How is data protected
during transmission?" Apply for RFID as as well.
The main factor behind these topics in E-commerce
is trust, a subject that can be anticipated easily a
RFID context. When RFID tagged objects hit the end
user RFID - The best technology in Supply Chain
Management of the market on a large scale, the
willingness of consumers to provide data will likely
depend on the individual's perception of reliability, as
it does in e-commerce. Such perceptions will be
based on the security and privacy directly receive.
Due to the invasive nature of many RFID tags
privacy issues and concerns exist. One issue that
moves to the lead the way by tracing the use of RFID
tags and tracking of RFID tags. Tracing and tracking
of the data from tagged objects in the supply chain of
competitors is the threat of industrial espionage
(Garfinkel, Juels et al. 2005). Tracing and tracking of
the data after the sale poses consumer privacy issues
can also be hidden in packaging and tags (Ayoade
2007). In addition, RFID tags respond interrogation
request all readers through which data is collected by
others outside the organization (Juels 2006). There
are many methods for disabling RFID tags and
prevent the data from visible which are currently in
use. Additional methods have been proposed for
destruction RFID labels unusable. Implementation of
devices and methods such as blocking labels, cutting
labels, soft labels block, selective block labels and
kill commands are used to block or impede the
propagation of the RFID signals. Blocking tags
special devices / tags that interfere with the protocol
used
for
communication
between
normal
identification labels and readers (Ayoade 2007) and
(Jules and Weis 2006). Label clipping comprises
switching off of the RFID device by removing or
breaking the connection between the chip and the
antenna.GĻ‹nter Karjoth and Paul Moskowitz identify
a variety of methods to effectively clip labels through
the use of removable tags with electrical conductors,
the use of tags with perforations, and the use of tags
ISSN: 2231-5381
with a peel-off layer (Karjoth and Moskowitz 2005).
Soft blocking is a variation on the concept of
blocking which acts by means of the use of software
or firmware. Soft block provides for the possibility of
the use of the privacy protocols (Juels and Brainard
2004). Selective blocking of labels involve changing
a blocker tag to prevent the transmission of a selected
set of tags (Juels, Rivest et al. 2003). The dead
command is a method for permanently disabling an
RFID tag as the tag moves in the hands of a private
owner (Juels, Rivest et al. 2003). Radio frequency
identification security as defined by Ranasinghe,
English, and Cole is composed of the following
components, confidentiality or message content
security, integrity of the contents of the message,
authentication of the sender, and receiver nonrepudiation by the sender, and the availability
(Ranasinghe, English et al. 2004). However, this
study will discuss security on the basis of the
following criteria - vulnerabilities, protocols, and
cryptography.
III. RESEARCH METHODOLOGY:
The objectives of this study are twofold: 1) To
analyze the problems of privacy and security RFID 2)
In order to provide privacy and security problems
solutions using Phase Five Life Cycle Model A
descriptive research design is appropriate for this
type of research. Case study method is used for
analyzing the target. More than that, personal
interview made with the managers and customers of
the shopping malls like Central, Forum, Globus, and
Big Bazaar in Bangalore. This interview gives a idea
about the usability of RFID. Based on the idea, this
paper analyzed the problems of privacy and security
considerations for RFID and also to look for
solutions privacy and security issues using Phase
Five Life Cycle Model.
IV.
PRIVACY
CONSIDERATIONS:
http://www.ijettjournal.org
&
SECURITY
Page 1644
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Privacy considerations are connected with security
considerations. An important objective of any RFID
security program is to risks and control measures for
the preservation identify personally identifiable
information (PII). An organization implement a
security and privacy program for RFID system
should consult its privacy officer and counsel the
whole information life-cycle. A privacy program,
various types of personal protection data. Some
information is personally identifiable; this means that
anyone can use to identify a particular individual.
Other information may not be personally
recognizable, but individuals may still believe that
even private in settings where they are anonymous.
For example, a anonymous individual travel on a
public bus may not want other passengers know what
items are in her handbag. Information that is not PII
generally not subject to legal requirements, but many
people can still consider this personal information
secure and dignified. Therefore organizations can still
choose to implement privacy controls voluntary
corporate guarantee for information from its
customers, partners, employees
and other
stakeholders consider personally. Federal law
regulates federal government agencies' collection and
processing of personal data. Relevant statutes the
Privacy Act of 1974, the E-Government Act of 2002,
FISMA, and the Consolidated Appropriations Act of
2005. OMB memoranda giving guidance and
instructions for implementation of these laws
agencies. The privacy of health information is
covered by HIPAA, which applies to federal and nonfederal entities. The Federal CIO Council developed
a list of privacy control families provide a framework
for this integration privacy principles in RFID
systems. In some cases, controls can serve to
improve. Both security and privacy In other cases,
privacy controls complement security. Because RFID
implementations are usually highly customized,
privacy control commands are not always appropriate
or not effective for RFID systems.
V. THE APPLICATION OF PRIVACY &
SECURITY CONSIDERATIONS FOR RFID
SYSTEMS:
ISSN: 2231-5381
RFID systems support a wide range of business that
does not involve all privacy. Examples of RFID
systems that are unlikely to privacy considerations
include those supporting industrial processes, animal
tracking, and asset management systems in which the
assets are never associated with individuals
throughout their life cycle. Privacy considerations
exist when using the system, collects, shops, or
revealing personal information. RFID system
personal information would be used or disclosed in
any of the various ways: 1) Personal information
such as a name or account number can be stored on
the tag or in a database in the enterprise subsystem.
2) A tag can be associated with a personal item, such
as a bottle of prescription drugs, or a folder of legal
documents that are outside the individual would be
able to possession. 3) A tag may be associated with
an item that often travels with an individual, such as a
labeled box or vehicle part in a car or truck drives the
individual often. Do not store the personal RFID
system information privacy implications. For
example, the label on a bottle of prescription
medication can identify the drug in the bottle, but not
the identity of the person for whom the written
prescription. Nevertheless, the individual account the
drug can still hold the drug perceive as personal
information as scanned and read by others as would
information about a medical condition that the
individual considers private. Nor does the person not
to possess a tag have item for the RFID system
privacy implications. For For example, if an
employee contributes an employer-labeled computer
or tools, then RFID technology could be used used to
follow. the residence of the employee The employee
may agree on call after hours, but could consider his
or her place in that time as personal data. While the
concepts of privacy and personal data are not new,
RFID technique is an example of a technology that is
newly introduced complexity to the landscape of the
http://www.ijettjournal.org
Page 1645
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
privacy considerations for several reasons. For
example, RFID technology increases the likelihood
that someone PII can create through indirect means.
RFID technology creates opportunities to contact,
store, and process specific information item with
regard to business transactions easier than ever
before. In Moreover, the width of the items in the
daily life, which will be built-in RFID systems, is
expected to increase in the coming years. The
increase in the range of the information systems in
our daily life, combined with the increase of the level
of detail of the information in these systems is likely
new opportunities for combining of data elements to
generate PII. Advances in Internet search and data
mining software will also have the ability to capture
from PII facilitate large amounts of what might have
been previously considered to be non-correlated data.
All these trends may occur PII even if not listed on
labels themselves. To maintain different inherent
properties of RFID tags privacy controls more
difficult than traditional information IT systems.
Organizations can challenges guaranteed privacy
policies when they can not be linked to effective
safeguards. RFID uses wireless communication,
which is more vulnerable to eavesdropping attacks
and other than the wired systems which most
traditional IT systems are. In many applications,
RFID Tags will travel between organizations and
often found in public areas, which means that they
can not benefit from physical security often the most
traditional IT systems. In general, RFID resources are
limited and can not implement advanced technical
controls. Since this document describes many
techniques exist to mitigate these security and
privacy risks, and these are expected to improve over
time. However, the economy many RFID
applications will require low-cost tags with limited
functionality, which has important implications for
privacy protection. Finally, in many applications, in
particular those involving passive tags, may
identifiers beyond life usefulness of the application
for which they are intended, but still may store PII or
used to generate PII when combined with other data.
While traditional IT systems established policies and
procedures for maintaining and destruction of data,
can destroy or disable markers are achievable when
they are outside the control of the manages the RFID
system. RFID technology can introduce new privacy
for reasons not fully understood today. Privacy
regulations and principles evolve to meet the
requirements of the new IT systems. As technical
progress as Internet, electronic databases and
analytical system have the collection and exchange of
PII easier than it was made in a world of paper files.
RFID technology extends the reach of IT systems and
the collection and exchange of personal information
ISSN: 2231-5381
that may be considered. While today RFID readers
are usually located in designated locations support a
particular business in the future readers ubiquitous
and can use multiple are objectives. For example,
today could be an RFID system implemented to
access to a facility with RFID-enabled badges. Badge
holders are likely to possess other tagged items. In
the future, cardholders can routinely carry a number
of tagged items, and the badge reader can be used to
scan them and a profile and authenticate the badge.
The collected data to third parties parties to
legitimate business needs and the legitimate data
sharing agreements. The systems can be carried out
with disclosure and consent, but may not be effective
because individuals and organizations can not
reasonably understand all the potential uses of the
data or predict what type transactions can create PII
through indirect inference. For these reasons, new
privacy tools and concepts to be developed to address
the complexity in RFID technology.
CONCLUSION: RFID technology is emerging as a
technology that could provide the answer to the
problems in automated data cpture and monitored in
real time.Thus by using radio waves to communicate
between the two RFID combined with the EPC
(Electronic Product Code ) is able to address these
pain points and would provide a range of benefits in
various vertical markets such as manufacturing,
distribution, retail, logistics and security. The
potential benefits arise from the increase of the
supply chain, increase efficiency and reduce costs
through better synchronization of data, increasing the
sensitivity to changes due to real time information
visibility and some additional industry / vertical
specific advantages.
REFERENCES: 1.RFID Handbook: Fundamentals
and Applications in Contactless Smart Cards and
Identification by Klaus Finkenzeller.
2.The RF in RFID: Passive UHF RFID in Practice by
Daniel M. Dobkin.
3.Development and Implementation
Technology by Cristina Turcu.
of
RFID
BIBLOGRAPHY:
S. Harish
Born in 1991 in Guntur dist. currently pursuing
B.Tech final year in K.L.UNIVERSITY. His areas of
interest are wireless communication and digital
electronics.
http://www.ijettjournal.org
Page 1646
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Email: sadhuharish09@gmail.com
Mr. Rayala Ravi Kumar
pursued his masters, M.E. in Communication
systems from P.S.G. College of technology,
Coimbatore in the year 1998. For the past 15 years
he is associated with Telecom industry and Academia
at various capacities. For 5 years with telecom
industry worked on development and feature
enhancements of Networking, Storage and Security
products based on TCP/IP Stack, Network
Management, Storage management, Intruder
Protection and Detection Systems by serving at
companies like Integra Micro Systems, HCL-CISCO,
Emulex Communications and IBM as Software
Engineer ( R & D), Member Technical Staff,
Engineer and Consultant. For 9 years in association
with Academic Institutions worked as lecturer,
Associate Professor, Professor and Head of the
Department and Prof. In-charge for industry institute
interaction cell. Currently he is working as associate
professor in Dept. of E.C.E. at K. L. UNIVERSITY,
GUNTUR
ISSN: 2231-5381
http://www.ijettjournal.org
Page 1647
Download