Sunteți pe pagina 1din 21

RFID

ro ra . ja n h it@ g m a il. co
RADIO FREQUENCY IDENTIFICATION?

 RFID is a system that facilitates the tracking Of


objects, primarily for inventory tracking, via a three
part technology comprised of a reader, a decoder host
and a transponder (RF tag). RFID is a wireless system
that works in conjunction with an organization’s
information technology infrastructure to improve
business processes such as inventory management and
RFID System Components
 RFID Tag(Transponder)
o Also known as a transponder, the tag consists of a silicon chip


 RFID Reader(Transceiver)
o Consist of a RF module, a control unit, and a coupling element to
interrogate tags via RF communication
o Also have secondary interface to communicate with backend systems
o Reads tags located in hostile environment

 Data Processing Subsystem(Host)
o Connected via high-speed network
o Database storage


HOW RFID WORKS?. . . . .

Tag 8
SN 12 34 56 Host

Reader
TAGS

Clock Plastic
Key holder card

Small box Plastic pin Roll of smart


labels
TYPES OF TAGS

Tags can be passive or active. An active tag


contains some type of power source on the tag,
whereas the passive tags rely on the radio signal
sent by the reader for power. Most RFID
applications today utilize passive tags because
they are so much cheaper to manufacture.

Active tags Passive tags


Power Battery Supplied by the reader
Availability of power Continuous Only in field of reader
Range ~100m up to 3-5m, usually less

Price 10-100 euro less than 10 eurocents


Memory 1-2Mb 0.5-2Kb
Size > 2cm > 0.05mm
DIFFFERENCE BETWEEN tags AND Barcode

RFID tags and barcodes both carry information about products.


However, there are important differences between these two
technologies:
to the printed barcode; RFID readers do not require a direct line of sigh

RFID tags can be read at much greater distances; an RFID reader can

pull information from a tag at distances up to 300 feet. The range


to read a barcode is much less, typically no more than fifteen feet.

rinted barcode. RFID tags, however, can be read/write devices; the RFID rea

RFID tags are typically more expensive than barcodes, in some cases, much more s
APPLICATION OF RFID TECHNOLOGY IN A PORT

The primary advantage to RFID in a port/terminal application is that it is


an ‘automatic’ data collection technology. That is, no operator
intervention or action is required Whereas other forms of data collection,
whether bar code or manual methods, depend on employees to record
information.
The two direct benefits of this are:
Cont...

There are five major areas where RFID can be effectively used in a port carg
terminal:

q Access Control;
q
q Container Security;
q
q Container Identification and Location;
q
q Activity Tracking;
q
q Regulatory Compliance
Access Control

q EMPLOYEES ID
q
q

q VEHICLE CONTROL
CONTAINER IDENTIFICATION AND LOCATION

 CONTAINER TAGGING

 LOCATION TRACKING
 Container SecuritY



 Activity Tracking



 Regulatory Compliance.
 


USES OF RFID IN OTHER AREAS
oAnimal tracking tags, inserted
beneath the skin, can be rice-sized.
o
oCredit-card shaped for use in access
applications.
o
oThe anti-theft hard plastic tags
attached to merchandise in stores are New British passpo
also RFID tags.
o

Animal identification

Stock
identification Dutch library reader’s
Use of RFID for Human Identification

Miners or firefighters might be appropriately identified using RFID because


of identification is at a premium in dangerous situations .

Facilities managers use identification to control access to sensitive


infrastructures that may be damaged or used to harm . They use it to control
access to facilities where sensitive information about other infrastructure
may be kept, or where security planning or operations are carried out.

2004: The attorney general of Mexico and 18 of his staff had chips
implanted to allow them to gain access to certain high-security areas.
2006: President of Colombia : agree to require Colombian citizens to be
implanted with RFID chips before they could gain entry into the US for
seasonal work
2008: UK jails considering RFID implants for prisoners
Things that can go wrong

Skimming
The envelope contains a hermetically sealed RFID-enabled
credit card. Malicious reader can extract the information as
the envelope is not necessarily RF-hermetic. Can be a problem
if mailboxes can be easily accessed.

Tag cloning
Jamming

jamming attack, where an adversary blocks all RF channels between reader


Recent Developments in RFID

 Companies like Microsoft, IBM, and Philips Electronics, which recently


made product enhancement announcement in this area, are also
participants in the industry. “IBM, in Armonk, New York, and Philips, in
Amsterdam, will team on RFID for supply chain management, retail and
asset management, as well as smart card technology for finance, e-
government, transportation and event ticketing.”

Wal-Mart, the world’s second largest company, is deploying RFID


technology in its stores.
The US Defense Department recently announced it would require its suppliers
to use wirelesstagsbased on radio frequency identification (RFID)
technology
Positive trends…
qDegines of RFID are improving day –by-day.
q
qCost of RFID decreases as capablity and funtionality expand
q
qExpanding capablities of RFID.
q
Benefits ASSOCIATED WITH PORT USING RFID

q Consistently monitor container security and


integrity.
q Speed shipments through the supply chain.
q Verify that a container was loaded at a secure
loading point.
q Gather enough data to conduct a ‘virtual
inspection’ in advance of arrival.
q Guarantee that shipping containers meet
governmental security regulations.
q Receive fast track or ‘green lane’ handling through
customs at the point of dispatch and/or the point
of receipt.
q Avoid extensive delays in the shipment and receipt.
Conclusion

 Most of the Ports around the World is using this


Technology for betterment
 RFID Technology is coming faster than what we
thought
 RFID is a boom for Port and Shipping Industry
 If properly used it provides a Greater Landmark for
Port & Shipping Sector

Suggestions...
o Individuals should be able to turn off any RFID signal
associated with tracking their presence or activities. Where
possible, they also should have the option not to participate
a program involving the use of RFID technology to track
their movements.
o
Should be very cheap

o
o Ensure that only authorized readers can read the tags, and that
only authorized personnel have access to the readers;
o
o Avoid electronic collisions when multiple tags and/or readers
are present;
o
o Maintain the integrity of the data on the chip and stored in
the database;
o
o Private tag contents should be protected by access control and
encryption
Thank you

 Questions?

ro ra . ja n h it@ g m a ilco
. m

S-ar putea să vă placă și