Building Radio frequency IDentification for the Global Environment
نویسنده
چکیده
The WP4 “Security” work package of BRIDGE is examining ways to ensure that RFID tags, readers, network infrastructure, and RFID services are developed in harmony with security features to enable effective and safe deployment of applications in various business sectors. However, some organizations tend to see security as nothing more than an extra feature or a “nice to have” for RFID deployments. To these stakeholders, the real economic value of security is often obscure. We provide a sound discussion, based on case studies, to outline that secure RFID solutions are more than just an add-on and are in fact an essential prerequisite to many, especially open-loop deployments. As the most radical RFID applications are only successfully if supply chain partners are willing to participate and share information that was previously considered proprietary, security features are needed as a necessary insurance mechanism. But security technologies offer even more: we provide case studies that show that secure RFID solutions allow for the deployment of completely new business applications. Without proper security features in place, these applications would be impossible to launch. The case studies show that there are potentially huge business benefits that cannot be leveraged today because of a lack of adequate security. Secure RFID solutions do not just fix problems induced by RFID technology itself, but also enable new applications and the deployment of RFID in open-loop environments. They lower entry adoption barriers, mitigate risks and enable new innovative processes. Work Package 4 positions itself to pursue developments that push these kind of secure RFID solutions forward. BRIDGE – Building Radio frequency IDentification solutions for the Global Environment Relation to other deliverables This deliverable is the third and final deliverable of task 4.1 of Work Package 4 (WP4) “Security”. The already completed deliverables D-4.1.1 and D-4.1.2 have discussed security threats and requirements for retailers, suppliers, consumers and other stakeholders. We have analyzed the current state of the art technology and discussed the security challenges that we need to overcome in order to enable the deployment of value-adding interorganizational RFID applications. In particular, we have studied the risks and threats for RFID enabled supply chains, including the analysis of risks and threats for SMEs. The role of task 4.1 is to provide an information basis and joint perspective for the other tasks in WP-4 that focus on the research and development of the technical solutions. In this manner, the associated deliverables D-4.2.1, D-4.3.1, D-4.4.1, D-4.5.1 and D-4.6.1 are concerned with researching and developing tag, reader and network infrastructure security (cf. Figure 1). Therefore, this report will focus on discussing the benefit side of a complete secure RFID solution. We provide a joint perspective of work package WP4 to outline the economic relevance of security and will refer to the other deliverables for further technical details. Figure 1. WP4 deliverables till M18 and their relationship to each other BRIDGE – Building Radio frequency IDentification solutions for the Global Environment
منابع مشابه
Real-Time Building Information Modeling (BIM) Synchronization Using Radio Frequency Identification Technology and Cloud Computing System
The online observation of a construction site and processes bears significant advantage to all business sector. BIM is the combination of a 3D model of the project and a project-planning program which improves the project planning model by up to 6D (Adding Time, Cost and Material Information dimensions to the model). RFID technology is an appropriate information synchronization tool between the...
متن کاملBuilding Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags – Prototype and Analysis
This report documents the results of task 4.2.2 “Secure Semi-Passive RFID Tags”. After a brief motivation for development of semi-passive tags in WP4 as prototype platform, the report shortly describes the three different platforms. A more detailed report about the development of the tags is available in D4.2.1. The following analysis section presents the results of the tests that were performe...
متن کاملThe RFID Radio Channel Applied to Vehicular Identification as a Tunnel Environment
The Radio Frequency Identification System, a wireless communication system, recently is applied to vehicular identification; this motivates the analysis of the propagation environment for outdoor RFID systems. The RFID System applied to the vehicular identification consists of the reader, the tag and the radio channel, which is made up by the ground (asphalt), the free space and surrounded by w...
متن کاملTechno-Economic Appraisal of Using Radio Frequency For Energy Consevation in the Heating System of Residential Buildings
Residential and commercial sectors are the main consumers of energy. According to available data, these two sectors account for more than one-third of total energy use. Moreover, heating and cooling systems contribute to the major share of energy use in a building. The current research economically evaluates the radio-frequency heating systems for use in residential buildings. A building in Dis...
متن کاملEvaluating the Performance of Absolute RSSI Positioning Algorithm-Based Microzoning and RFID in Construction Materials Tracking
1 Woodside Energy Ltd., School of Built Environment, Curtin University, Perth, WA 6845, Australia 2 Curtin-Woodside Oil, Gas & LNG Construction and Project Management, Australasian Joint Research Centre for Building Information Modelling (BIM), Curtin University, Perth, WA 6845, Australia 3 Department of Housing and Interior Design, Kyung Hee University, Seoul 130-701, Republic of Korea 4 Indus...
متن کاملRadio Frequency Identification (RFID): A Technology for Enhancing Computerized Maintenance System (CMMS)
Abstract While Computerized Maintenance Management System (CMMS) enables maintenance managers and supervisors to access information about equipment, manpower and maintenance policies, there is still a need to facilitate getting data/information into the backend database where it can be utilized by the organization as information to make decisions regarding the operation of the organization. Si...
متن کامل