RFID is a technology that uses radio waves to automatically identify objects. It works by storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag can be attached to an object and used to track and manage inventory, assets, people, etc. Some key points about RFID technology include that tags can be either passive (powered by electromagnetic waves from a reader), active (powered by an internal battery) or battery-assisted passive. Readers then transmit signals to interrogate the tags and receive data back. While RFID provides advantages over barcodes, concerns over privacy and security have been raised as tags can potentially be read from a distance without consent.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
Radio Frequency Identification (RFID) Kandarp Vyas
Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking.
RFID - Radio frequency identification Devicefaisalkhan786
RFID is a tracking device mostly used in retail products and in some countries it is also used at toll gates. This presentation tells you some basics, history of emergence of RFID and its uses.
Radio Frequency Identification Chip (RFID)kartik shah
This is the small presentation of RFID which is useful in Tracking device when you loss your device there is so many devices which uses this technology to find devices
PROJETO LOGÍSTICO DE INSTALAÇÃO INTRALOGÍSTICA DA TECNOLOGIA RFID (RADIO FREQ...Alex Felix Nepomuceno
Projeto desenvolvido através de embasamento prático e teórico, para analisar de forma exploratória e imparcial a aplicação da tecnologia de rádio frequência em processos logísticos em um C.D. (Centro de Distribuição) e seu reflexos otimizadores, com intuito de atender a proposta de trabalho do componente de Gestão de Projetos Logísticos, do curso de Gestão da Tecnologia em Logística, da Universidade de Sorocaba (UNISO).
Demonstração de aplicação da tecnologia RFID (Rádio Frequency Identification), em C.D.’s (Centros de Distribuições), que operam com movimentações, armazenagens, transportes de produtos fracionados em pequenos e ou em grande escala de volumes, tecnologia esta que utiliza de rádio frequência em etiquetas para identificação, controle e rastreio de materiais, com base de conhecimento prático das utilidades da tecnologia através de experiência profissional por parte dos integrantes do projeto em vivência empresarial, utilizando então para modelo de benchmark e direcionamento holístico prático no uso dos instrumentos e suas funcionalidades da tecnologia RFID.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
Radio Frequency Identification (RFID) Kandarp Vyas
Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking.
RFID - Radio frequency identification Devicefaisalkhan786
RFID is a tracking device mostly used in retail products and in some countries it is also used at toll gates. This presentation tells you some basics, history of emergence of RFID and its uses.
Radio Frequency Identification Chip (RFID)kartik shah
This is the small presentation of RFID which is useful in Tracking device when you loss your device there is so many devices which uses this technology to find devices
PROJETO LOGÍSTICO DE INSTALAÇÃO INTRALOGÍSTICA DA TECNOLOGIA RFID (RADIO FREQ...Alex Felix Nepomuceno
Projeto desenvolvido através de embasamento prático e teórico, para analisar de forma exploratória e imparcial a aplicação da tecnologia de rádio frequência em processos logísticos em um C.D. (Centro de Distribuição) e seu reflexos otimizadores, com intuito de atender a proposta de trabalho do componente de Gestão de Projetos Logísticos, do curso de Gestão da Tecnologia em Logística, da Universidade de Sorocaba (UNISO).
Demonstração de aplicação da tecnologia RFID (Rádio Frequency Identification), em C.D.’s (Centros de Distribuições), que operam com movimentações, armazenagens, transportes de produtos fracionados em pequenos e ou em grande escala de volumes, tecnologia esta que utiliza de rádio frequência em etiquetas para identificação, controle e rastreio de materiais, com base de conhecimento prático das utilidades da tecnologia através de experiência profissional por parte dos integrantes do projeto em vivência empresarial, utilizando então para modelo de benchmark e direcionamento holístico prático no uso dos instrumentos e suas funcionalidades da tecnologia RFID.
My presentation explores how RFID system works and describes briefly about history of RFID, active & passive tags, modes of transmission of data and applications
we all topics which related to RFID Sensor and how the RFID sensor works ..
AND
This content be good then please share and press the like button .
Thanks You,
Running Head RFID Transportation2RFID in Tr.docxtoltonkendal
Running Head: RFID Transportation 2
RFID in Transportation Executive Summary
Pravallika Dubbakula
Wilmington University
Executive Summary
A study has been done on the use of radio frequency Identification and its commercial use in commercial industries. The aim of the study was to understand how the technology can help in providing information to a centralized control unit when the commodity transport vehicle or the items are being transported from one place to another. The study also undertook a detailed examination of the process that is used in the technology and the benefits of the Radio frequency identification technology in commercial industries.
It was found that the use of the technology reduced the losses in transit and made it simpler to use and tag the items for purchase or sale. It also helped to lower mal – practices when vehicles with goods were in transit from region to another. The radio frequency identification technology is the latest available technology in tracking systems using sensors. It has an electromagnetic field which is activated and increases the strength of the sensors when it apses by a reader which has sensors that picks up the data that has been micro chipped into the items or vehicles. These signals are transmitted to a centralized unit where it is transformed into readable information providing the whereabouts of the vehicles and the items.
A tag is attached and this tag is then further attached to the items. It was also found that there are 2 types of RFID tags one is passive and the other is active. The passive tags collect their energy resources from the readers that are installed close by and the active tag have their own power resources built into the tags such as small batteries that are powerful enough to transit information to a reader.
The data about the vehicles or the reader is sent using radio wave transmissions. It has also been found from the study that the radio frequency identification is one of the forms of automatic- Identification and data capture from tags known in short as – A.I.D.C. The most common method of radio frequency identification is implanting it into livestock, individuals and items. The tags have worked per their mechanisms even when they have been embedded into:
The radio frequency identification standards have been laid out in the ISO-IEC – 18000 and the ISO-IEC-29167. The standards specify the details of the methods that can be used for cryptographic encryption and reader authentication. It also includes standards for in the air – privacy concerns of interception. The third standard for the technology is the ISO-IEC-20248 which provides the guidelines for the digital – signature and bar code requirements.
The tags are simply labels, and the readers are two way transmitters for radio wave signals which transmit the signal to the tag and read the response that is sent by the tag. The tags that are mainly used are the active tags since they have their own ...
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
The RFID has been still an evolution in many parts of the world.This presentation gives you an overview about the RFID technology and helps you to implement in your projects and other stuff..Take a look at it and gain knowledge yourself..If you want identification RFID is the best technology employable.
Here is a Whitepaper I wrote way back in 2011 for the the Steel Industry. The industry has only started capitalizing on the RFID Technology for Inventory Tracking and Realtime Location Tracking. I see a lot of potential in exploiting the usage of RFID Technology in our day to day operations.
Happy Reading..!
Similar to Radio Frequency identification (RFID) (20)
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
ML for identifying fraud using open blockchain data.pptx
Radio Frequency identification (RFID)
1. Title : Radio Frequency identification (RFID)
Abstract :
The identification mechanism has becoming widespread in many Practical applications to secure
sufficient information about people or cars or industrial products it is in the case of normal movement
without stopping. In This research the wireless chip technology will be explained
What is RFID??
Is a technology based on the technique recently begun to spread, what is the principle of its forms
and uses?
That is what we will try to discussed and clarified.
Introduction :
History :
In 1945 Léon Theremin invented an espionage tool for the Soviet Union which retransmitted incident
radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the
shape of the resonator, which modulated the reflected radio frequency.
Even though this device was a covert listening device, not an identification tag, it is considered to be a
predecessor of RFID, because it was likewise passive, being energized and activated by waves from an
outside source.
Similar technology, such as the IFF transponder, was routinely used by the allies and Germany in orld
War II to identify aircraft as friend or foe. Transponders are still used by most powered aircraft to this
day. Another early work exploring RFID is the landmark 1948 paper by Harry Stockman. Stockman
predicted that "... considerable research and development work has to be done before the remaining
basic problems in reflected-power communication are solved, and before the field of useful
applications is explored.”
Mario Cardullo’s device, patented on January 23, 1973, was the first true ancestor of modern RFID, as
it was a passive radio transponder with memory. The initial device was passive, powered by the
interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other
potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic
Cardullo patent covers the use of RF, sound and light as transmission media. The original business
plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification,
automatic toll sys-tem, electronic license plate, electronic manifest, vehicle routing, vehicle
performance monitoring), banking (electronic check book, electronic credit card), security (personnel
identification, automatic gates, surveillance) and medical (identification, patient history).
An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-
passive, was performed by Steven Depp, Alfred Koelle, and Robert Frayman at the Los Alamos
National Laboratory in 1973. The portable system operated at 915 MHz and used 12-bit tags. This
technique is used by the majority of today’s UHFID and microwave RFID tags.
The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983.
RFID : Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The tags
contain electronically stored information. Some tags are powered by electromagnetic induction from
magnetic fields produced near the reader.
Some types collect energy from the interrogating radio waves and act as a passive transponder. Other
types have a local power source such as a battery and may operate at hundreds of meters from the
reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader,
and may be embedded in the tracked object. Radio frequency identification (RFID) is one method for
Automatic Identification and Data Capture (AIDC).
2. RFID tags are used in many industries. An RFID tag attached to an automobile during production can
be used to track its progress through the assembly line. Pharmaceuticals can be tracked through
warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal.
Since RFID tags can be attached to cash, clothing, possessions, or even implanted within people, the
possibility of reading personally-linked information without consent has raised serious privacy
concerns.
The RFID world market is estimated to surpass US$20
billion by 2014.
Design:
Tags
A radio-frequency identification system uses tags, or labels attached to the objects to be identified.
Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read
its response.
RFID tags can be either passive, active or battery-assisted passive. An active tag has an on-board
battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on
board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller
because it has no battery; instead, the tag uses the radio energy transmitted by the reader.
However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times
stronger than for signal transmission. That makes a difference in interference and in exposure to
radiation.
Tags may either be read-only, having a factory-assigned serial number that is used as a key into a
database, or may be read/write, where object-specific data can be written into the tag by the system
user. Field programmable tags may be write-once, read-multiple; “blank” tags may be written with an
electronic product code by the user.
RFID tags contain at least two parts: an integrated circuit for storing and processing information,
modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident
reader signal, and other specialized functions; and an antenna for receiving and transmitting the
signal. The tag information is stored in a non-volatile memory. The RFID tag includes either fixed
or programmable logic for processing the transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The RFID tag receives the
message and then responds with its identification and other information.
This may be only a unique tag serial number, or may be product-related information such as a stock
number, lot or batch number, production date, or other specific information. Since tags have
individual serial numbers, the RFID system design can discriminate among several tags that might be
within the range of the RFID reader and read them simultaneously.
Readers:
RFID systems can be classified by the type of tag and reader. A Passive Reader Active Tag (PRAT)
system has a passive reader which only receives radio signals from active tags (battery operated,
transmit only). The reception range of a PRAT system reader can be adjusted from 1–2,000 feet (0–
600 m), allowing flexibility in applications such as asset protection and supervision.
An Active Reader Passive Tag (ARPT) system has an active reader, which transmits interrogator
signals and also receives authentication replies from passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from
the active reader. A variation of this system could also use a Battery-Assisted Passive (BAP) tag which
acts like a passive tag but has a small battery to power the tag’s return reporting signal.
Fixed readers are set up to create a specific interrogation zone which can be tightly controlled. This
allows a highly defined reading area for when tags go in and out of the interrogation zone. Mobile
readers may be hand-held or mounted on carts or vehicles.
3. Frequencies
Signaling
Signaling between the reader and the tag is done in several different incompatible ways, depending
on the frequency band used by the tag. Tags operating on LF and HF bands are, in terms of radio
wavelength, very close to the reader antenna because they are only a small percentage of a
wavelength away. In this near field region, the tag is closely coupled electrically with the transmitter
in the reader. The tag can modulate the field produced by the reader by changing the electrical
loading the tag represents.
By switching between lower and higher relative loads, the tag produces a change that the reader can
detect.
At UHF and higher frequencies, the tag is more than one radio wavelength away from the reader,
requiring a different approach. The tag can backscatter a signal. Active tags may contain functionally
separated transmitters and receivers, and the tag need not respond on a frequency related to the
reader’s interrogation signal.
An Electronic Product Code (EPC) is one common type of data stored in a tag. When written into the
tag by an RFID printer, the tag contains a 96-bit string of data. The first eight bits are a header which
identifies the version of the protocol. The next 28 bits identify the organization that manages the data
for this tag; the organization number is assigned by the EPCGlobal consortium. The next 24 bits are an
object class, identifying the kind of product; the last 36 bits are a unique serial number for a particular
tag. These last two fields are set by the organization that issued the tag. Rather like a URL, the total
electronic product code number can be used as a key into a global database to uniquely identify a
particular product.
Often more than one tag will respond to a tag reader, for example, many individual products with
tags may be shipped in a common box or on a common pallet. Collision detection is important to
allow reading of data. Two different types of protocols are used to “singulate” a particular tag,
allowing its data to be read in the midst of many similar tags. In a slotted Aloha system, the reader
broadcasts an initialization command and a parameter that the tags individually use to pseudo-
randomly delay their responses. When using an “adaptive binary tree” protocol, the reader sends an
initialization symbol and then transmits one bit of ID data at a time; only tags with matching bits
respond, and eventually only one tag matches the complete ID string.
Both methods have drawbacks when used with many tags or with multiple overlapping readers. Bulk
reading is a strategy for interrogating multiple tags at the same time, but lacks sufficient precision for
inventory control.
Miniaturization
RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol
University successfully glued RFID micro-transponders to live ants in order to study their behavior.
This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances.
Hitachi holds the record for the smallest RFID chip, at 0.05mm × 0.05mm. This is 1/64th the size of the
previous record holder, the mu-chip. Manufacture is enabled by using the silicon-on-insulator (SOI)
process.
4. These dust-sized chips can store 38-digit numbers using 128-bit Read Only Memory (ROM).A major
challenge is the attachment of antennas, thus limiting read range to only millimeters.
Uses
The RFID tag can be affixed to an object and used to track and manage inventory, assets, people, etc.
For example, it can be affixed to cars, computer equipment, books, mobile phones, etc.
RFID offers advantages over manual systems or use of bar codes. The tag can be read if passed near a
reader, even if it is covered by the object or not visible. The tag can be read inside a case, carton, box
or other container, and unlike barcodes, RFID tags can be read hundreds at a time. Bar codes can only
be read one at a time using current devices.
In 2011, the cost of passive tags started at US$0.09 each; special tags, meant to be mounted on metal
or withstand gamma sterilization, can go up to US$5. Active tags for tracking containers, medical
assets, or monitoring environmental conditions in data centers start at US$50 and can go up over
US$100 each. Battery-Assisted Passive (BAP) tags are in the US$3–10 range and also have sensor
capability like temperature and humidity.
RFID can be used in a variety of applications, such
Access management
Tracking of goods
Tracking of persons and animals
Toll collection and contactless payment
Machine readable travel documents
Smartdust (for massively distributed sensor networks)
Tracking sports memorabilia to verify authenticity
Airport baggage tracking logistics
Timing sporting events
In 2010 three factors drove a significant increase in RFID usage: decreased cost of equipment and
tags, increased performance to a reliability of 99.9% and a stable international standard around UHF
passive RFID. The adoption of these standards were driven by EPCglobal, a joint venture between GS1
and GS1 US, which were responsible for driving global adoption of the barcode in the 1970s and
1980s. The EPCglobal Network was developed by the Auto-ID Center.
Problems and concerns
Data flooding
Not every successful reading of a tag (an observation) is useful for business purposes. A large amount
of data may be generated that is not useful for managing inventory or other applications. For
example, a customer moving a product from one shelf to another, or a pallet load of articles
that passes several readers while being moved in a warehouse, are events that do not produce data
that is meaningful to an inventory control system.
Event filtering is required to reduce this data inflow to a meaningful depiction of moving goods
passing a threshold. Various concepts have been designed, mainly offered as middleware performing
the filtering from noisy and redundant raw data to significant processed data.
Global standardization
The frequencies used for UHF RFID in the USA are currently incompatible with those of Europe or
Japan. Furthermore, no emerging standard has yet become as universal as the barcode. To address
international trade concerns, it is necessary to use a tag that is operational within all of the
international frequency domains.
5. Security concerns
Retailers such as Walmart, which already heavily use RFID for inventory purposes, also use RFID as an
antiemployee- theft and anti-shoplifting technology. If a product with an active RFID tag passes the
exit-scanners at a Walmart outlet, not only does it set off an alarm, but it also tells security personnel
exactly what product to look for in the shopper’s cart.
A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable,
pose a risk to both personal location privacy and corporate/military security.
Such concerns have been raised with respect to the United States Department of Defense's recent
adoption of RFID tags for supply chain management.
More generally, privacy organizations have expressed concerns in the context of ongoing efforts to
embed electronic product code (EPC) RFID tags in consumer products. This is mostly as result of the
fact that RFID tags can be read, and legitimate transactions with readers can be eavesdropped, from
non-trivial distances. RFID used in access control, payment and eID (e-passport) systems operate at
a shorter range than EPC RFID systems but are also vulnerable to skimming and eavesdropping, albeit
at shorter distance.
A second method of prevention is by using cryptography. Rolling codes and challenge-response
authentication (CRA) are commonly used to foil monitor-repetition of the messages between the tag
and reader; as any messages that have been recorded would prove to be unsuccessful on repeat
transmission. Rolling codes rely upon the tag’s id being changed after each interrogation, while CRA
uses software to ask for a cryptographically coded response from the tag. The protocols used during
CRA can be symmetric, or may use public key cryptography.
Security concerns exist in regard to privacy over the unauthorized reading of RFID tags, as well as
security concerns over server security. Unauthorized readers can use the RFID information to track
the package, and so the consumer or carrier, as well as identify the contents of a package. Several
prototype systems are being developed to combat unauthorized reading, including RFID signal
interruption, as well as the possibility of legislation, and 700 scientific papers have been published on
this matter since 2002.There are also concerns that the database structure of servers for the readers
may be susceptible to infiltration, similar to denial-of-service attacks, after the EPCglobal Network
ONS root servers were shown to be vulnerable.
Exploitation
Ars Technica reported in March 2006 an RFID buffer overflow bug that could infect airport terminal
RFID databases for baggage, and also passport databases to obtain confidential information on the
passport holder.
Passports
In an effort to make passports more secure, several countries have implemented RFID in passports.
However, the encryption on UK chips was broken in under 48 hours. Since that incident, further
efforts have allowed researchers to clone passport data while the passport is
being mailed to its owner. Where a criminal used to need to secretly open and then reseal the
envelope, now it can be done without detection, adding some degree of insecurity to the passport
system.
Shielding
In an effort to prevent the passive “skimming” of RFIDenabled cards or passports, the U.S. General
Services Administration (GSA) issued a set of test procedures for evaluating electromagnetically
opaque sleeves. For shielding products to be in compliance with FIPS-201 guidelines, they must meet
or exceed this published standard.
Shielding products currently evaluated as FIPS- 201 compliant are listed on the website of the U.S.
CIO’s FIPS-201 Evaluation Program. The United States government requires that when new ID cards
are issued, they must be delivered with an approved shielding sleeve or holder.
6. Further information: Aluminium foil § Electromagnetic shielding
There are contradicting opinions as to whether aluminum can prevent reading of RFID chips. Some
people claim that aluminum shielding, essentially creating a Faraday cage, does work. Others claim
that simply wrapping an RFID card in aluminum foil only makes transmission more difficult and is not
completely effective at preventing it.
Shielding effectiveness depends on the frequency being used. Low-frequency LowFID tags, like those
used in implantable devices for humans and pets, are relatively resistant to shielding though thick
metal foil will prevent most reads. High frequency HighFID tags (13.56 MHz— smart cards and access
badges) are sensitive to shielding and are difficult to read when within a few centimetres of a metal
surface. UHF Ultra-HighFID tags (pallets and cartons) are difficult to read when placed within a few
millimetres of a metal surface, although their read range is actually increased when they are spaced
2–4 cm from a metal surface due to positive reinforcement of the reflected wave and the incident
wave at the tag.
Conclusion
The moral benefit of RFID cards, can be read the cards in difficult environments such as ice, fog, snow
and other conditions more challenging on visual or environmental level where the barcode could not
be use or other optical reading techniques. It can also read RFID cards at high speed may reach to less
than 100 milliseconds. The RFID technology is expensive compared with barcode, but the technology
has become important for a wide range of applications. The last developments for RFID technology
are produce a larger storage capacities, wider range of reading and run faster. The technology has
helped in a lot of Fields such as support the decision-makers in their decisions to be in the positive
direction for their organizations. The RFID technology provides information in the fields of trade,
including freight and also in the Fields of education, libraries, scientific, medical and other
miscellaneous Fields. With all the disadvantages that has mentioned, the laws of privacy experts and
market analysts say “there is a need to further debate and awareness”.