Documente Academic
Documente Profesional
Documente Cultură
ro ra . ja n h it@ g m a il. co
RADIO FREQUENCY IDENTIFICATION?
RFID Reader(Transceiver)
o Consist of a RF module, a control unit, and a coupling element to
interrogate tags via RF communication
o Also have secondary interface to communicate with backend systems
o Reads tags located in hostile environment
Data Processing Subsystem(Host)
o Connected via high-speed network
o Database storage
HOW RFID WORKS?. . . . .
Tag 8
SN 12 34 56 Host
Reader
TAGS
Clock Plastic
Key holder card
RFID tags can be read at much greater distances; an RFID reader can
rinted barcode. RFID tags, however, can be read/write devices; the RFID rea
RFID tags are typically more expensive than barcodes, in some cases, much more s
APPLICATION OF RFID TECHNOLOGY IN A PORT
There are five major areas where RFID can be effectively used in a port carg
terminal:
q Access Control;
q
q Container Security;
q
q Container Identification and Location;
q
q Activity Tracking;
q
q Regulatory Compliance
Access Control
q EMPLOYEES ID
q
q
q VEHICLE CONTROL
CONTAINER IDENTIFICATION AND LOCATION
CONTAINER TAGGING
LOCATION TRACKING
Container SecuritY
Activity Tracking
Regulatory Compliance.
USES OF RFID IN OTHER AREAS
oAnimal tracking tags, inserted
beneath the skin, can be rice-sized.
o
oCredit-card shaped for use in access
applications.
o
oThe anti-theft hard plastic tags
attached to merchandise in stores are New British passpo
also RFID tags.
o
Animal identification
Stock
identification Dutch library reader’s
Use of RFID for Human Identification
2004: The attorney general of Mexico and 18 of his staff had chips
implanted to allow them to gain access to certain high-security areas.
2006: President of Colombia : agree to require Colombian citizens to be
implanted with RFID chips before they could gain entry into the US for
seasonal work
2008: UK jails considering RFID implants for prisoners
Things that can go wrong
Skimming
The envelope contains a hermetically sealed RFID-enabled
credit card. Malicious reader can extract the information as
the envelope is not necessarily RF-hermetic. Can be a problem
if mailboxes can be easily accessed.
Tag cloning
Jamming
o
o Ensure that only authorized readers can read the tags, and that
only authorized personnel have access to the readers;
o
o Avoid electronic collisions when multiple tags and/or readers
are present;
o
o Maintain the integrity of the data on the chip and stored in
the database;
o
o Private tag contents should be protected by access control and
encryption
Thank you
Questions?
ro ra . ja n h it@ g m a ilco
. m