SlideShare a Scribd company logo
1 of 19
RFID
RADIO FREQUENCY IDENTIFICATION
What is RFID?
• Radio-frequency identification (RFID) is an automatic
identification method using radio waves.
• RFID also began to see use in wildlife monitoring and
research. RFID tags can be used to monitor animal
movement without adversely affecting the animal.
There’s a chip
Implanted RFID tags in Humans
Applications
• Asset tracking
• Medical applications
• People tracking
• Retail
• Livestock
• Timing
Tag
• An RFID tag is a device that can store and transmit data
to a reader in a contact less manner using radio waves.
• RFID tags can be classified in three different ways.
Passive Tag
Active Tag
Semiactive Tag
Passive Tag
No on-board power source (for example, a battery)
Uses the power emitted from the reader to energize itself
and transmit its stored data to the reader
Reader always communicates first, followed by the tag.
Smaller than an active or semi-active tag. It has a variety
of read ranges starting with less than 1 inch to about 30
feet (9 meters approximately).
Cheaper compared to an active or semi-active tag.
Active Tag
Has on-board power source (for example, a battery; other
sources of power, such as solar, are also possible)
Own on-board power supply to transmit its data to a
reader.
No need for reader's emitted power for data transmission.
A tag always communicates first, followed by the reader.
Can broadcast its data to its surroundings even in the
absence of a reader
Semi-Active (Semi-Passive) Tags
Have an on-board power source (for example, a battery)
Uses the reader's emitted power for transmitting its data
Also called a battery-assisted tag.
Reader always communicates first, followed by the tag.
Reader????
An RFID reader can read from and write data to compatible RFID tags.
A reader thus doubles up as a writer. The act of writing the tag data by a
reader is called creating a tag.
The RFID System
1. Tag
2. Reader
3. Reader antenna
4. Controller
5. Host and software system
6. Communication infrastructure
Working
• A radio device called a tag is attached to the object that
needs to be identified.
• When this tagged object is presented in front of a suitable
RFID reader, the tag transmits this data to the reader (via
the reader antenna).
• The reader then reads the data and has the capability to
forward it over suitable communication channels.
• This application can then use this unique data to identify
the object presented to the reader.
• It can then perform a variety of actions.
Advantages
• Contactless. An RFID tag can be read without any
physical contact between the tag and the reader.
• Writable data. The data of a read-write (RW) RFID tag
can be rewritten a large number of times.
• Absence of line of sight. A line of sight is generally not
required for an RFID reader to read an RFID tag.
Advantages Contd.
• Variety of read ranges.
• Wide data-capacity range.
• Support for multiple tag reads.
• Perform smart tasks
Attacks on RFID System
• Reverse Engineering
• Eavesdropping & Replay
• Man-in-the-Middle Attack or Sniffing
• Denial of Service
• Cloning & Spoofing
Conclusion
RFID, is an emerging technology which can be used for a
variety of applications. However, the potential for abuse of
this technology is vast and requires careful consideration to
avoid.
• Questions???
Questions To Prepare
• What is RFID ?
• Explain the RFID tag and reader. what are the different types of tags ?
• Explain in brief working of RFID system with suitable diagram.
• What are the different types of attack on RFID system and also explain the Eavesdropping
and replay attack .
• Advantages of RFID system .

More Related Content

What's hot

Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library managementVenkatesa Prasad
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2Venkatesa Prasad
 
wireless technology
wireless technologywireless technology
wireless technologylaiwaiho
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working Niranjan
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss713213652
 
13213822 pss7
13213822 pss713213822 pss7
13213822 pss713213822
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in librariesShivashish Verma
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationharoonahmed0044
 
RFID based tracking System
RFID based tracking SystemRFID based tracking System
RFID based tracking SystemShahrikh Khan
 

What's hot (20)

13212907 pss7
13212907 pss713212907 pss7
13212907 pss7
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library management
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2
 
wireless technology
wireless technologywireless technology
wireless technology
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working
 
Rifd
RifdRifd
Rifd
 
14216213 pss7
14216213 pss714216213 pss7
14216213 pss7
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
 
13213822 pss7
13213822 pss713213822 pss7
13213822 pss7
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
RFID based tracking System
RFID based tracking SystemRFID based tracking System
RFID based tracking System
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 

Similar to RFID (RADIO FREQUENCY IDENTIFICATION)

RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking systemSherwin Rodrigues
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002 Akash Maurya
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTrajeshplacherikunnel
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification Suman Dey
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 

Similar to RFID (RADIO FREQUENCY IDENTIFICATION) (20)

Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking system
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
RFID
RFIDRFID
RFID
 
Rfid
RfidRfid
Rfid
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Rfid3
Rfid3Rfid3
Rfid3
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

RFID (RADIO FREQUENCY IDENTIFICATION)

  • 2. What is RFID? • Radio-frequency identification (RFID) is an automatic identification method using radio waves. • RFID also began to see use in wildlife monitoring and research. RFID tags can be used to monitor animal movement without adversely affecting the animal.
  • 5. Applications • Asset tracking • Medical applications • People tracking • Retail • Livestock • Timing
  • 6. Tag • An RFID tag is a device that can store and transmit data to a reader in a contact less manner using radio waves. • RFID tags can be classified in three different ways. Passive Tag Active Tag Semiactive Tag
  • 7. Passive Tag No on-board power source (for example, a battery) Uses the power emitted from the reader to energize itself and transmit its stored data to the reader Reader always communicates first, followed by the tag. Smaller than an active or semi-active tag. It has a variety of read ranges starting with less than 1 inch to about 30 feet (9 meters approximately). Cheaper compared to an active or semi-active tag.
  • 8. Active Tag Has on-board power source (for example, a battery; other sources of power, such as solar, are also possible) Own on-board power supply to transmit its data to a reader. No need for reader's emitted power for data transmission. A tag always communicates first, followed by the reader. Can broadcast its data to its surroundings even in the absence of a reader
  • 9. Semi-Active (Semi-Passive) Tags Have an on-board power source (for example, a battery) Uses the reader's emitted power for transmitting its data Also called a battery-assisted tag. Reader always communicates first, followed by the tag.
  • 10. Reader???? An RFID reader can read from and write data to compatible RFID tags. A reader thus doubles up as a writer. The act of writing the tag data by a reader is called creating a tag.
  • 11. The RFID System 1. Tag 2. Reader 3. Reader antenna 4. Controller 5. Host and software system 6. Communication infrastructure
  • 12.
  • 13. Working • A radio device called a tag is attached to the object that needs to be identified. • When this tagged object is presented in front of a suitable RFID reader, the tag transmits this data to the reader (via the reader antenna). • The reader then reads the data and has the capability to forward it over suitable communication channels. • This application can then use this unique data to identify the object presented to the reader. • It can then perform a variety of actions.
  • 14. Advantages • Contactless. An RFID tag can be read without any physical contact between the tag and the reader. • Writable data. The data of a read-write (RW) RFID tag can be rewritten a large number of times. • Absence of line of sight. A line of sight is generally not required for an RFID reader to read an RFID tag.
  • 15. Advantages Contd. • Variety of read ranges. • Wide data-capacity range. • Support for multiple tag reads. • Perform smart tasks
  • 16. Attacks on RFID System • Reverse Engineering • Eavesdropping & Replay • Man-in-the-Middle Attack or Sniffing • Denial of Service • Cloning & Spoofing
  • 17. Conclusion RFID, is an emerging technology which can be used for a variety of applications. However, the potential for abuse of this technology is vast and requires careful consideration to avoid.
  • 19. Questions To Prepare • What is RFID ? • Explain the RFID tag and reader. what are the different types of tags ? • Explain in brief working of RFID system with suitable diagram. • What are the different types of attack on RFID system and also explain the Eavesdropping and replay attack . • Advantages of RFID system .