RFID: Promises and Problems

نویسنده

  • Arjun Agarwal
چکیده

With the advent of wireless technology, a rapidly advancing area is that of Radio Frequency Identification Devices or RFID. RFID technology was first developed as an espionage device during World War II. However, nearly 30 years of research was required before it became a part of our everyday lives. Informally, RFID can be considered a non-contact method of using radio frequency electromagnetic waves (with frequencies up to 2.5GHz) for communication between 2 remote entities. Data is stored in devices called RFID tags or transponders, and is retrieved by readers. Each tag stores a unique identification number. The main purpose of RFID is automated identification of people and products. The advantages of RFID over conventional identification systems are many. RFID also allows us to think of applications hitherto undreamed of. The biggest stumbling blocks in the use of RFID are the numerous and complex security threats that are involved with RFID, as well as privacy issues that have human rights organizations up in arms. Also, there are few standards that have been agreed on, and many protocols are still in nascent stages of development. This limits the practical usage of RFID today. In addition to the potential scope of RFID applications, the security threats that still have to be satisfactorily countered make RFID Security a field that is being widely researched. This paper starts with a hypothetical situation that we may be faced with in the future. It then goes on to give details about RFID systems. Some applications of RFID are enumerated, as well as the advantages RFID has over conventional systems. Finally, some of the security threats facing RFID are explained.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Radio Frequency Identification: Supply Chain Impact and Implementation Challenges

Radio Frequency Identification (RFID) technology has received considerable attention from practitioners, driven by mandates from major retailers and the United States Department of Defense. RFID technology promises numerous benefits in the supply chain, such as increased visibility, security and efficiency. Despite such attentions and the anticipated benefits, RFID is not well-understood and ma...

متن کامل

Rfid Security Threat Model

Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged goods, and promises cost reductions. The objective of this paper is to identify potential threats to commer...

متن کامل

Modeling in Early Stages of Technology Development: Is an Iterative Approach Needed?; Comment on “Problems and Promises of Health Technologies: The Role of Early Health Economic Modeling”

A recent paper by Grutters et al makes the case for early health economic modeling in the development of health technologies. A number of examples of the value of early modeling are given, with analyses being performed at different stages in the development of several non-drug health technologies. This commentary acknowledges the contribution of the paper by Grutters et...

متن کامل

Transforming Disciplinary Traditions; Comment on “Problems and Promises of Health Technologies: The Role of Early Health Economic Modeling”

Grutters et al show that economic assessments can inform the development of new health technologies at an early stage. This is an important contribution to health services and policy research, which implies a “shift away” from the more traditional forms of academic health economic modeling. Because transforming established disciplinary traditions is both valuable and de...

متن کامل

I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects

A novel method to infer interactions with passive RFID tagged objects is described. The method allows unobtrusive detection of human interactions with RFID tagged objects without requiring any modifications to existing communications protocols or RFID hardware. The object motion detection algorithm was integrated into a RFID monitoring system and tested in laboratory and home environments. The ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006