You are on page 1of 5

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

Emerging Progressions in RFID Technology


S. Harish Chakravarthy#, R. Ravi Kumar*
#Final Year B. Tech, Dept. of ECE, KL University, Vaddeswaram, AP, India.
*Associate Professor, Dept. of ECE, KL University,
Vaddeswaram, AP, India.

ABSTRACT: provide a abundance of economic and productive


During the last decade, most organizations potential. A RFID is a "white" tag with an embedded
implemented enterprise-wide applications and microchip with a product that can be used receiver
integration platforms. These implementations using radio frequencies. The "white" tag is applied to
have benefits in terms of data synchronization and the product on the pallet level, while still in the
information flows within the organization and magazine prior to shipment. Companies such as
with trading partners those valuable inputs for GAP, CVS, Gillette, Proctor & Gamble and Wal-
planning and optimization of schedules and Mart have recognized the importance to make use of
reports. However, automated data capture and RFID technology to improve and to increase
tracking in real-time has a major bottleneck, so operational efficiency in the supply chain, which
the ability of organizations to optimize their benefits of recent developments in the electronic
investments in supply chain solutions. Radio cataloging. With RFID systems, companies would
Frequency Identification (RFID) technology is have increased product visibility, reduce out-of-stock
emerging as a technology that could provide the items, trim warehouse costs, eliminate stock errors,
answer to this problems. Using tags, readers and reduce theft and shrinkage and allows companies
radio waves to communicate between the two regularly to their logistics and inventory databases to
RFID combined with the EPC (Electronic Product update. Several pilot studies are global RFID to study
Code) is able to address these pain points and under way system used and the integration into
would be deliver a range of benefits in various existing ERP systems. Most companies take a
vertical markets such as manufacturing, cautious approach and initially focus on the study of
distribution, retail, logistics and security. The RFID pallet level before moving towards each unit
potential benefits arise from increasing the supply stored in a box. RFID is the latest bulletin magic in
chain, increase in efficiency and decrease in costs technological scope that has the potential to be a
due to better data syn \ tion, increasing the major shift in the way each brand has organizations
responsiveness to changes due real time approach their supply chain. Leading the way in
information visibility and some additional embracing these technology retailers, especially Wal-
industry / vertical specific advantages. RFID Mart and their suppliers. RFID is enabling companies
promises have major impact on the supply chains see further in the supply chain than ever before,
which trading to work more effectively together providing More accurate real-time information and
and achieve new levels of efficiency and improvements process efficiency. The increased
responsiveness. This document describes technical visibility can lead to faster inventory turns, less
research on the problems of privacy and security shrinkage, lower labor costs and higher material flow
for RFID and also explores the solution privacy through warehouse or distribution center center.
and security issues using Phase Five Life Cycle Greater efficiency means RFID-enabled processes
Model. Index Terms-RFID Technology, Supply take less time and effort, complete pallets of the
Chain Management, Privacy, Security, Electronic product may be recognized in seconds, without the
Product Code. need to break them, inventory and cycle counting can
be accomplished in hours or even minutes instead of
INTRODUCTION: days. RFID tags are small, wireless devices that aid
in the identification objects and people. With
Essential for an effective and efficient managed
dropping costs, they are likely to proliferate in the
supply chain includes accurate, real-time information
billions in the coming years and eventually in the
on the products within the chain. The integration
trillions. RFID tags track objects in supply chains,
RFID systems within a companys supply chain
and work their way into the pockets, possessions, and
even the bodies of consumers.

ISSN: 2231-5381 http://www.ijettjournal.org Page 1643


International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

with a peel-off layer (Karjoth and Moskowitz 2005).


Soft blocking is a variation on the concept of
II. REVIEW OF THE LITERATURE: blocking which acts by means of the use of software
or firmware. Soft block provides for the possibility of
Juels' survey gives a good introduction and overview the use of the privacy protocols (Juels and Brainard
some of the central issues in RFID security. Lehtonen 2004). Selective blocking of labels involve changing
et al. limiting the scope of their research to product a blocker tag to prevent the transmission of a selected
authentication and a discussion of the trade-off set of tags (Juels, Rivest et al. 2003). The dead
between complexity and safety in various RFID command is a method for permanently disabling an
authentication methods. Also there are publications RFID tag as the tag moves in the hands of a private
on state-of-the-art in RFID privacy preservation, as owner (Juels, Rivest et al. 2003). Radio frequency
well as numerous reviews on safety and privacy with identification security as defined by Ranasinghe,
respect to health, e-commerce and data mining. The English, and Cole is composed of the following
latter two are particularly interesting, as essential components, confidentiality or message content
privacy questions in these areas, such as "What security, integrity of the contents of the message,
information is collected?" and "How is data protected authentication of the sender, and receiver non-
during transmission?" Apply for RFID as as well. repudiation by the sender, and the availability
The main factor behind these topics in E-commerce (Ranasinghe, English et al. 2004). However, this
is trust, a subject that can be anticipated easily a study will discuss security on the basis of the
RFID context. When RFID tagged objects hit the end following criteria - vulnerabilities, protocols, and
user RFID - The best technology in Supply Chain cryptography.
Management of the market on a large scale, the
willingness of consumers to provide data will likely III. RESEARCH METHODOLOGY:
depend on the individual's perception of reliability, as
it does in e-commerce. Such perceptions will be The objectives of this study are twofold: 1) To
based on the security and privacy directly receive. analyze the problems of privacy and security RFID 2)
Due to the invasive nature of many RFID tags In order to provide privacy and security problems
privacy issues and concerns exist. One issue that solutions using Phase Five Life Cycle Model A
moves to the lead the way by tracing the use of RFID descriptive research design is appropriate for this
tags and tracking of RFID tags. Tracing and tracking type of research. Case study method is used for
of the data from tagged objects in the supply chain of analyzing the target. More than that, personal
competitors is the threat of industrial espionage interview made with the managers and customers of
(Garfinkel, Juels et al. 2005). Tracing and tracking of the shopping malls like Central, Forum, Globus, and
the data after the sale poses consumer privacy issues Big Bazaar in Bangalore. This interview gives a idea
can also be hidden in packaging and tags (Ayoade about the usability of RFID. Based on the idea, this
2007). In addition, RFID tags respond interrogation paper analyzed the problems of privacy and security
request all readers through which data is collected by considerations for RFID and also to look for
others outside the organization (Juels 2006). There solutions privacy and security issues using Phase
are many methods for disabling RFID tags and Five Life Cycle Model.
prevent the data from visible which are currently in
use. Additional methods have been proposed for
destruction RFID labels unusable. Implementation of
devices and methods such as blocking labels, cutting
labels, soft labels block, selective block labels and
kill commands are used to block or impede the
propagation of the RFID signals. Blocking tags
special devices / tags that interfere with the protocol
used for communication between normal
identification labels and readers (Ayoade 2007) and
(Jules and Weis 2006). Label clipping comprises
switching off of the RFID device by removing or
breaking the connection between the chip and the IV. PRIVACY & SECURITY
antenna.Gnter Karjoth and Paul Moskowitz identify CONSIDERATIONS:
a variety of methods to effectively clip labels through
the use of removable tags with electrical conductors,
the use of tags with perforations, and the use of tags

ISSN: 2231-5381 http://www.ijettjournal.org Page 1644


International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

Privacy considerations are connected with security


considerations. An important objective of any RFID
security program is to risks and control measures for
the preservation identify personally identifiable
information (PII). An organization implement a
security and privacy program for RFID system
RFID systems support a wide range of business that
should consult its privacy officer and counsel the
does not involve all privacy. Examples of RFID
whole information life-cycle. A privacy program,
systems that are unlikely to privacy considerations
various types of personal protection data. Some
include those supporting industrial processes, animal
information is personally identifiable; this means that
tracking, and asset management systems in which the
anyone can use to identify a particular individual.
assets are never associated with individuals
Other information may not be personally
throughout their life cycle. Privacy considerations
recognizable, but individuals may still believe that
exist when using the system, collects, shops, or
even private in settings where they are anonymous.
revealing personal information. RFID system
For example, a anonymous individual travel on a
personal information would be used or disclosed in
public bus may not want other passengers know what
any of the various ways: 1) Personal information
items are in her handbag. Information that is not PII
such as a name or account number can be stored on
generally not subject to legal requirements, but many
the tag or in a database in the enterprise subsystem.
people can still consider this personal information
2) A tag can be associated with a personal item, such
secure and dignified. Therefore organizations can still
as a bottle of prescription drugs, or a folder of legal
choose to implement privacy controls voluntary
documents that are outside the individual would be
corporate guarantee for information from its
able to possession. 3) A tag may be associated with
customers, partners, employees and other
an item that often travels with an individual, such as a
stakeholders consider personally. Federal law
labeled box or vehicle part in a car or truck drives the
regulates federal government agencies' collection and
individual often. Do not store the personal RFID
processing of personal data. Relevant statutes the
system information privacy implications. For
Privacy Act of 1974, the E-Government Act of 2002,
example, the label on a bottle of prescription
FISMA, and the Consolidated Appropriations Act of
medication can identify the drug in the bottle, but not
2005. OMB memoranda giving guidance and
the identity of the person for whom the written
instructions for implementation of these laws
prescription. Nevertheless, the individual account the
agencies. The privacy of health information is
drug can still hold the drug perceive as personal
covered by HIPAA, which applies to federal and non-
information as scanned and read by others as would
federal entities. The Federal CIO Council developed
information about a medical condition that the
a list of privacy control families provide a framework
individual considers private. Nor does the person not
for this integration privacy principles in RFID
to possess a tag have item for the RFID system
systems. In some cases, controls can serve to
privacy implications. For For example, if an
improve. Both security and privacy In other cases,
employee contributes an employer-labeled computer
privacy controls complement security. Because RFID
or tools, then RFID technology could be used used to
implementations are usually highly customized,
follow. the residence of the employee The employee
privacy control commands are not always appropriate
may agree on call after hours, but could consider his
or not effective for RFID systems.
or her place in that time as personal data. While the
V. THE APPLICATION OF PRIVACY & concepts of privacy and personal data are not new,
SECURITY CONSIDERATIONS FOR RFID RFID technique is an example of a technology that is
SYSTEMS: newly introduced complexity to the landscape of the

ISSN: 2231-5381 http://www.ijettjournal.org Page 1645


International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

privacy considerations for several reasons. For that may be considered. While today RFID readers
example, RFID technology increases the likelihood are usually located in designated locations support a
that someone PII can create through indirect means. particular business in the future readers ubiquitous
RFID technology creates opportunities to contact, and can use multiple are objectives. For example,
store, and process specific information item with today could be an RFID system implemented to
regard to business transactions easier than ever access to a facility with RFID-enabled badges. Badge
before. In Moreover, the width of the items in the holders are likely to possess other tagged items. In
daily life, which will be built-in RFID systems, is the future, cardholders can routinely carry a number
expected to increase in the coming years. The of tagged items, and the badge reader can be used to
increase in the range of the information systems in scan them and a profile and authenticate the badge.
our daily life, combined with the increase of the level The collected data to third parties parties to
of detail of the information in these systems is likely legitimate business needs and the legitimate data
new opportunities for combining of data elements to sharing agreements. The systems can be carried out
generate PII. Advances in Internet search and data with disclosure and consent, but may not be effective
mining software will also have the ability to capture because individuals and organizations can not
from PII facilitate large amounts of what might have reasonably understand all the potential uses of the
been previously considered to be non-correlated data. data or predict what type transactions can create PII
All these trends may occur PII even if not listed on through indirect inference. For these reasons, new
labels themselves. To maintain different inherent privacy tools and concepts to be developed to address
properties of RFID tags privacy controls more the complexity in RFID technology.
difficult than traditional information IT systems.
Organizations can challenges guaranteed privacy CONCLUSION: RFID technology is emerging as a
policies when they can not be linked to effective technology that could provide the answer to the
safeguards. RFID uses wireless communication, problems in automated data cpture and monitored in
which is more vulnerable to eavesdropping attacks real time.Thus by using radio waves to communicate
and other than the wired systems which most between the two RFID combined with the EPC
traditional IT systems are. In many applications, (Electronic Product Code ) is able to address these
RFID Tags will travel between organizations and pain points and would provide a range of benefits in
often found in public areas, which means that they various vertical markets such as manufacturing,
can not benefit from physical security often the most distribution, retail, logistics and security. The
traditional IT systems. In general, RFID resources are potential benefits arise from the increase of the
limited and can not implement advanced technical supply chain, increase efficiency and reduce costs
controls. Since this document describes many through better synchronization of data, increasing the
techniques exist to mitigate these security and sensitivity to changes due to real time information
privacy risks, and these are expected to improve over visibility and some additional industry / vertical
time. However, the economy many RFID specific advantages.
applications will require low-cost tags with limited
functionality, which has important implications for REFERENCES: 1.RFID Handbook: Fundamentals
privacy protection. Finally, in many applications, in and Applications in Contactless Smart Cards and
particular those involving passive tags, may Identification by Klaus Finkenzeller.
identifiers beyond life usefulness of the application
for which they are intended, but still may store PII or 2.The RF in RFID: Passive UHF RFID in Practice by
used to generate PII when combined with other data. Daniel M. Dobkin.
While traditional IT systems established policies and
3.Development and Implementation of RFID
procedures for maintaining and destruction of data,
Technology by Cristina Turcu.
can destroy or disable markers are achievable when
they are outside the control of the manages the RFID BIBLOGRAPHY:
system. RFID technology can introduce new privacy
for reasons not fully understood today. Privacy S. Harish
regulations and principles evolve to meet the
requirements of the new IT systems. As technical Born in 1991 in Guntur dist. currently pursuing
progress as Internet, electronic databases and
B.Tech final year in K.L.UNIVERSITY. His areas of
analytical system have the collection and exchange of
PII easier than it was made in a world of paper files. interest are wireless communication and digital
RFID technology extends the reach of IT systems and electronics.
the collection and exchange of personal information

ISSN: 2231-5381 http://www.ijettjournal.org Page 1646


International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

Email: sadhuharish09@gmail.com

Mr. Rayala Ravi Kumar


pursued his masters, M.E. in Communication
systems from P.S.G. College of technology,
Coimbatore in the year 1998. For the past 15 years
he is associated with Telecom industry and Academia
at various capacities. For 5 years with telecom
industry worked on development and feature
enhancements of Networking, Storage and Security
products based on TCP/IP Stack, Network
Management, Storage management, Intruder
Protection and Detection Systems by serving at
companies like Integra Micro Systems, HCL-CISCO,
Emulex Communications and IBM as Software
Engineer ( R & D), Member Technical Staff,
Engineer and Consultant. For 9 years in association
with Academic Institutions worked as lecturer,
Associate Professor, Professor and Head of the
Department and Prof. In-charge for industry institute
interaction cell. Currently he is working as associate
professor in Dept. of E.C.E. at K. L. UNIVERSITY,
GUNTUR

ISSN: 2231-5381 http://www.ijettjournal.org Page 1647

You might also like