Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

CONTENTS

1. Introduction
2. What is RFID
3. Asset Tracking
4. Working of RFID
5. Block Diagram
6. Applications
7. Advantages and Disadvantages
8. Conclusion
INTRODUCTION
• In last few years RFID technology has become a major driver
for various business like logistics, supply chain management and
access control.

• Many of these applications have based on successful


implementations of RFID tags but on reader’s side we show how
semi-passive tags helps implementing and attacking security
enhanced RFID.

• It has various security and privacy concerns, which is due to the


inherent vulnerabilities in the architecture of the RFID system..

• Asset Tracking uses Radio Frequency Identification (RFID)


technology to locate assets.
WHAT IS RFID?

•Radio Frequency Identification


•Uses Radio Frequency waves to transfer data between a
reader and a tag to identify, categorize, track...
•One form of Automatic Identification
•RFID is fast reliable and does not require physical sight or
contact between reader/scanner and the tagged item.
•Provides unique identification or serial number of an
object (pallets, cases, items, animals, humans
•Some of the large companies like Microsoft and Walmart
are mandating their suppliers to use RFIDs to cut their
warehousing costs and other relating expenses
ASSET TRACKING

• Asset tracking refers


the method of tracking
physical assets, either
by scanning barcode
labels attached to the
assets or by using tags
Using , RFID which
broadcast their location. These technology can also be used
for indoor tracking of persons wearing a tag.
• An asset tracking system can record the location and
usage of the assets and generate various reports.
HOW DOES A TAG LOOKS LIKE?
Passive: gets energy from reader
Active: battery powered
Semi-passive: Battery and energy
from reader the Semi-passive tags
are mainly targeted for the security
and privacy attacks
WORKING
• The tag contains the specific serial number for one specific
object.

• To read the information encoded on a tag, a two-way radio


transmitter-receiver called an interrogator or reader emits a
signal to the tag using an antenna.

• The tag responds with the information written in its


memory bank.

• The interrogator will then transmit the read results to an


RFID computer program.
BLOCK DIAGRAM
Some of the Applications
People/ Animal Tracking Library management

Manufacturing or Supply Chain Management


Recent Innovation
• Small RFID chip, here compared to a grain of rice, is
incorporated in consumer products and implanted in pets
for identification purposes.
Advantages Disadvantages
Inventory efficiency Security concerns like
possibility of unauthorized
Vulnerability to
damage minimized reading of passports and
Easy to use credit cards.
High memory capacity More expensive than
barcode system
Cannot be easily replicated and
therefore, it increases the Unread tags
security of the product. Doesn’t work properly on
Simple to install/inject inside liquids and metal products.
the body of animals/human
beings.
CONCLUSION

• In this research, we identified the various challenges


facing RFID Card, with careful references.
• We also highlighted the diverse application areas of the
RFID technology.
Any Questions..???

REFERENCE

 D. Anthony, T. Henderson, and D. Kotz, Privacy


in location aware computing environments, IEEE
Pervasive Computing,2009.
 A. Beresford and F. Stajano, Location privacy in
pervasive computing, IEEE Pervasive Computing,
2011.
THANK YOU

You might also like