SlideShare a Scribd company logo
1 of 5
Download to read offline
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
79
A Sector Analysis for Rfid Human Implantation: Technical
Analyses for Privacy Enhancing Techniques
Muhammad Habib
yahabebi@ymail.com
Abstract
Radio Frequency Identification (RFID) has produced a lot of attention in replacing the barcode with microchip.
This interdisciplinary research aims to undertake a scoping study of emerged technology serving the security
purposes of devices, infrastructures and human utilization. The study aims to address the key areas of
widespread RFID implementation, its control over the applied widgets and the effective improvement in the
protection measures like owner tracking and cloning. As a part of research an attempt will be taken toward
discussion on security framework to improve the model of smart environment eliminating the privacy loopholes.
To enhance the real time security structure the Origins of RFID Microchips are essential to be discussed for the
application in several sectors like logistics and health care industries. The study will contribute to develop
methods and procedures to re-plane the RFID control system, as well as mark other privacy issues which arise in
operations.
INTRODUCTION
Radio Frequency Identification (RFID) technology had humble beginnings in WWII in flying industries, Allied
airplanes as well as to track nuclear material and in Australia its being in use by veterinary industry (NLIS) at
large scale [1]. Technology then took another jump and currently used in logistics and supply chain management
to track the items. Broadly the RFID tags are classified in three categories Active tag, Passive tag and Semi-
Passive tags.
The ultimate aim of this research is to contribute to the existing technology of RFID, a microchip
having the ability to transmit static identity at the short distance: short distance is due to low power of emitting
electromagnetic waves. Extensive research has been done to serve the humanity medically with RFID
technology. The prosthetic use of microchips can progress scientifically, assist people to hear better, help the
handicaps and possibly can facilitate the paralyzed people to move [2]. The human embedding microchip
technology is available which
implant the chips under the controlled application methods though some issues arises in its functional
security framework as well as in the control application concerns. The issues include, tracking the person’s
location at exact coordinates, habitual changes in action at security access point, the privacy concerns as well as
the hacking personnel information and access to the secured data illegally. The security problems in the RFID
are complex in nature. The undergone research will contribute to steadfast all the significant issue related to the
Microchip implementation methodology, its operational measures and all the intensive security issues.
LITERATURE REVIEW
Radio Frequency Identification (RFID) technology began in World War II with an "Early Identification Friend
(IFF) systems where it was possible for Allied fighters and anti-aircraft systems to distinguish their own
returning bombers from aircraft sent by the enemy’’ [3]. All along with the benefits of the Micro chipping there
are also some potential health problems as well. For example the major effects of radio waves can harm in a
dangerous way where Non-lionizing Radiation from microwave radio frequency and magnetic fields can also
cause of various health issues [4]. Within the medical field there are different ways that RFID can be
incorporated. For example RFID chips can be used to track equipment within a hospital. Wristbands with an
RFID chip embedded can help hospitals with patient safety requirements. Medical personnel can read the chip to
get instant access to the patients' medical history such has medication allergies, medications prescribed and
dosage, and specimen results [5].
One example of the Neuro electronic Interface being used is with a paraplegic named John Nagle.
"Nagle showed an ability to perform a number of tasks with his mind: control a TV, move a mouse cursor on a
screen, and command an artificial hand to open and close grip" [6]. There are limitations at this time for the
Neuro-electronic Interface for RFID chip usage in human. The first is the amount of neurons available for the
device. The fewer amounts of neurons there are will result the less likely the device work performance. There is
health risks associated with the human being implanted with a microchip. Some health issues include "adverse
tissue reaction, migration of implanted transponder, electromagnetic interference, electrical hazards, and
magnetic resonance imaging incompatibility" [7]. The majority of RFID applications have centered on firms
increasing efficiencies in the supplier management process, which ultimately results in lowered costs. However,
RFID is also currently being used by logistic service companies in order to enhance the service effectiveness to
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
80
the customer, thus enhancing the overall value perception. Instead of focusing on efficiencies of supplier
relationships for manufacturers, these service firms seek to employ the technology to generate additional value
for the customer [8].
RESEARCH OBJECT IVES
Using the undergone privacy problems in operations, applications and their analysis (Objective 1), previous
literature for concepts and ideas regarding RFID data secrecy measures, the set of design implications (Objective
2), the design of security frameworks covering existing threats to transmit information (Objective 3) and
identifying categorical RFID implementation areas (Objective 4), it will be explore the possibility of developing
a generalized framework in human implantation and its privacy matters that can be applied to the design of RFID
systems to support co-located collaborations. However, if we find that the said framework formulation will
require substantial extension of the research effort, we may decide to leave it open as a future research endeavor.
PROBLEM STATEMENT
The major challenges arises round the globe regarding RFID (Radio Frequency Identification) technology are its
data privacy which results location tracking and harmful for secret information to be snatched. In the same way
human embedded microchip is also traced during transmitting data from chip to application database which
results to locate the person. These issues provide a strong resistance to the technology and its performance
capabilities. In context of these issues the research theme designs the privacy framework and the operational
methodology which helps the technology to excel and be applicable within and across the domains diversely
with steadfast its performance.
RESEARCH GOALS
G1. Uncertainty control mechanism occurring in RFID data.
G2. How to effectively utilize the RFID for human intensive care purposes? Radical application to
respond and transmit data on demand (operational features of Active tags)
G3. Implementation of the proposed novel privacy framework for RFID
G4. What are the countermeasures to conceal the RFID Tag Existence?
G5. How to effectively utilize the time gap when the RFID reader is waiting for the RFID tag to respond to
an earlier transmitted command after pre-computation of one or more commands and what technique
to apply in such a realistic scenario?
RESEARCH GAPS
The RFID technology is an emerging area of research and still it is on its initial adoption phases yet facing
several research gaps which has to be addressed. The gaps are existed between the performance of RFID systems
and its associated issues. Due to various real time uncertainty limitations in such systems, the Faraday Cage (to
wrap up the Tag with foil) technique preventing to intercept electromagnetic waves, i.e, ID-Queries, in order to
prevent the tag from emitting response to reader. The soft computing practices like fuzzy logic (to map the real-
world uncertainty), Complex security schemes (Hash Locking/Kill Commands), Countermeasures to emit extra
data (Jamming) techniques are yet to be applied to such systems in order to effectively address the problems in
existing RFID systems leading to enhanced privacy and performance.
RESEARCH DESIGN & METHODOLOGY
The research process for this study will involve distinct phases. First, an extensive literature review will be
carried out within innovation-adoption by the target sector and RFID domain. Based on literature, particularly
dealing with organizational adoption, an initial research model will be developed. In the secondary research
phase, the tentative privacy framework will be designed based on synthesis of existing research. The indicators
of ‘uncertainty’ (data uncertainty, demand uncertainty, and technology uncertainty) are not necessarily correlated
among each other; rather they form the construct [9].
TIME FRAME AND RESOURCES
The approximate time required for the completion of research is about 3-4 years which includes the theoretical
studies and the experimental work to be prepared. Fifty percent of time will be spent on research and reading
relevant material and ten percent of time will be utilized in sorting and marking the research findings and
remaining forty percent of time will be spent for writing, formatting and documenting under the potential
supervision. There are few experimental resources like RFID tags (Active and Passive), RFID readers and
software, which could be sorted out according to the supervision suggestions.
Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
81
REFERENCES
[1]. Tonsor, G.T., Schroeder, T.C., 2006. Livestock identification: Lessons for the U.S. Beef Industry
from the Australian System. Journal of International Food & Agribusiness Marketing 18(3/4), 1 03-
118.
[2]. Charles, Techonal J., Manag, 2008. Human Microchip Implantation. Journal of Technology
Management & Innovation 08(3/3)151-1 60.
[3]. GARFINKEL, S., Holtzman, H. (2005) Understanding RFID Technology. Pg. 15-16. Garfinkel
Book [Links]
[4]. COVACIO, S. (2003) Technological Problems Associated with Subcutaneous Microchips for Human
Identification (SMHId). Informing Science. [Links]
[5]. CASTRO, L, Wamba, S.F. (2007) An Inside LookAt RFID Technology. Journal of
Technology and lnnovation,Volume 2, Issue I. Pg.4. [Links]
[6]. CHAN, E. (2007) The FDA and the Future of the Brain-Computer Interface: Adapting FDA Device Law
to the Challenges of Human-Machine Enhancement. John Marshall Journal of Computer & Information
Law Volume 25 Issue I. Pg. 13, 16, 24. http://works.bepress.com/eric_chan/1/. Retrieved 11-02-07 [Links]
[7]. GAD, L. (2006) Human Microchip Implantation. Wisconsin Legislative Reference Bureau. Pg.
1.www.legis.state.wi.us/lrb. Retrieved 9-28-07. [Links]
[8]. Leea, L.S., Fiedlera, K.D. and Smithb, J.S. (2008), “Radio frequency identification (RFID)
implementation in the service sector: A customer-facing diffusion model”, Int. J. Production Economics,
112, 587–600.
[9]. Teo, H.H., Wei, K.K., Benbasat, I., 2003. Predicting intention to adopt interorganizational linkages:
An institutional perspective. MIS Quarterly 27(1), 19-49.
Business, Economics, Finance and Management Journals PAPER SUBMISSION EMAIL
European Journal of Business and Management EJBM@iiste.org
Research Journal of Finance and Accounting RJFA@iiste.org
Journal of Economics and Sustainable Development JESD@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Industrial Engineering Letters IEL@iiste.org
Physical Sciences, Mathematics and Chemistry Journals PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Journal of Mathematical Theory and Modeling MTM@iiste.org
Advances in Physics Theories and Applications APTA@iiste.org
Chemical and Process Engineering Research CPER@iiste.org
Engineering, Technology and Systems Journals PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems CEIS@iiste.org
Innovative Systems Design and Engineering ISDE@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Control Theory and Informatics CTI@iiste.org
Journal of Information Engineering and Applications JIEA@iiste.org
Industrial Engineering Letters IEL@iiste.org
Journal of Network and Complex Systems NCS@iiste.org
Environment, Civil, Materials Sciences Journals PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science JEES@iiste.org
Journal of Civil and Environmental Research CER@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL
Advances in Life Science and Technology ALST@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare JBAH@iiste.org
Journal of Food Science and Quality Management FSQM@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Education, and other Social Sciences PAPER SUBMISSION EMAIL
Journal of Education and Practice JEP@iiste.org
Journal of Law, Policy and Globalization JLPG@iiste.org
Journal of New Media and Mass Communication NMMC@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Historical Research Letter HRL@iiste.org
Public Policy and Administration Research PPAR@iiste.org
International Affairs and Global Strategy IAGS@iiste.org
Research on Humanities and Social Sciences RHSS@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Journal of Arts and Design Studies ADS@iiste.org
The IISTE is a pioneer in the Open-Access hosting service and academic event management.
The aim of the firm is Accelerating Global Knowledge Sharing.
More information about the firm can be found on the homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
There are more than 30 peer-reviewed academic journals hosted under the hosting platform.
Prospective authors of journals can find the submission instruction on the following
page: http://www.iiste.org/journals/ All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than those
inseparable from gaining access to the internet itself. Paper version of the journals is also
available upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek
EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar

More Related Content

What's hot

IOT Forensic Challenges
IOT Forensic ChallengesIOT Forensic Challenges
IOT Forensic ChallengesAnukaJinadasa
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorIJSRED
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 

What's hot (13)

IOT Forensic Challenges
IOT Forensic ChallengesIOT Forensic Challenges
IOT Forensic Challenges
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Josep Domingo Jordi Castella
Josep Domingo   Jordi CastellaJosep Domingo   Jordi Castella
Josep Domingo Jordi Castella
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
L010517180
L010517180L010517180
L010517180
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 

Similar to A sector analysis for rfid human implantation

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsA Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsKim Daniels
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
An Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future ChallengesAn Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future ChallengesSarah Adams
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxhartrobert670
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...Jeff Nelson
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overviewijtsrd
 

Similar to A sector analysis for rfid human implantation (20)

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting SystemsA Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study On RFID Based Anti-Counterfeiting Systems
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
An Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future ChallengesAn Insight On RFID Technology And Future Challenges
An Insight On RFID Technology And Future Challenges
 
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docxBuilding a Smart Hospital using RFID technologiesPatrik Fu.docx
Building a Smart Hospital using RFID technologiesPatrik Fu.docx
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...A UHF Radio Frequency Identification (RFID) System For Healthcare  Design And...
A UHF Radio Frequency Identification (RFID) System For Healthcare Design And...
 
RFID Technology An Overview
RFID Technology An OverviewRFID Technology An Overview
RFID Technology An Overview
 
Classroom locking-system (1)
Classroom locking-system (1)Classroom locking-system (1)
Classroom locking-system (1)
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

A sector analysis for rfid human implantation

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.5, No.10, 2014 79 A Sector Analysis for Rfid Human Implantation: Technical Analyses for Privacy Enhancing Techniques Muhammad Habib yahabebi@ymail.com Abstract Radio Frequency Identification (RFID) has produced a lot of attention in replacing the barcode with microchip. This interdisciplinary research aims to undertake a scoping study of emerged technology serving the security purposes of devices, infrastructures and human utilization. The study aims to address the key areas of widespread RFID implementation, its control over the applied widgets and the effective improvement in the protection measures like owner tracking and cloning. As a part of research an attempt will be taken toward discussion on security framework to improve the model of smart environment eliminating the privacy loopholes. To enhance the real time security structure the Origins of RFID Microchips are essential to be discussed for the application in several sectors like logistics and health care industries. The study will contribute to develop methods and procedures to re-plane the RFID control system, as well as mark other privacy issues which arise in operations. INTRODUCTION Radio Frequency Identification (RFID) technology had humble beginnings in WWII in flying industries, Allied airplanes as well as to track nuclear material and in Australia its being in use by veterinary industry (NLIS) at large scale [1]. Technology then took another jump and currently used in logistics and supply chain management to track the items. Broadly the RFID tags are classified in three categories Active tag, Passive tag and Semi- Passive tags. The ultimate aim of this research is to contribute to the existing technology of RFID, a microchip having the ability to transmit static identity at the short distance: short distance is due to low power of emitting electromagnetic waves. Extensive research has been done to serve the humanity medically with RFID technology. The prosthetic use of microchips can progress scientifically, assist people to hear better, help the handicaps and possibly can facilitate the paralyzed people to move [2]. The human embedding microchip technology is available which implant the chips under the controlled application methods though some issues arises in its functional security framework as well as in the control application concerns. The issues include, tracking the person’s location at exact coordinates, habitual changes in action at security access point, the privacy concerns as well as the hacking personnel information and access to the secured data illegally. The security problems in the RFID are complex in nature. The undergone research will contribute to steadfast all the significant issue related to the Microchip implementation methodology, its operational measures and all the intensive security issues. LITERATURE REVIEW Radio Frequency Identification (RFID) technology began in World War II with an "Early Identification Friend (IFF) systems where it was possible for Allied fighters and anti-aircraft systems to distinguish their own returning bombers from aircraft sent by the enemy’’ [3]. All along with the benefits of the Micro chipping there are also some potential health problems as well. For example the major effects of radio waves can harm in a dangerous way where Non-lionizing Radiation from microwave radio frequency and magnetic fields can also cause of various health issues [4]. Within the medical field there are different ways that RFID can be incorporated. For example RFID chips can be used to track equipment within a hospital. Wristbands with an RFID chip embedded can help hospitals with patient safety requirements. Medical personnel can read the chip to get instant access to the patients' medical history such has medication allergies, medications prescribed and dosage, and specimen results [5]. One example of the Neuro electronic Interface being used is with a paraplegic named John Nagle. "Nagle showed an ability to perform a number of tasks with his mind: control a TV, move a mouse cursor on a screen, and command an artificial hand to open and close grip" [6]. There are limitations at this time for the Neuro-electronic Interface for RFID chip usage in human. The first is the amount of neurons available for the device. The fewer amounts of neurons there are will result the less likely the device work performance. There is health risks associated with the human being implanted with a microchip. Some health issues include "adverse tissue reaction, migration of implanted transponder, electromagnetic interference, electrical hazards, and magnetic resonance imaging incompatibility" [7]. The majority of RFID applications have centered on firms increasing efficiencies in the supplier management process, which ultimately results in lowered costs. However, RFID is also currently being used by logistic service companies in order to enhance the service effectiveness to
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.5, No.10, 2014 80 the customer, thus enhancing the overall value perception. Instead of focusing on efficiencies of supplier relationships for manufacturers, these service firms seek to employ the technology to generate additional value for the customer [8]. RESEARCH OBJECT IVES Using the undergone privacy problems in operations, applications and their analysis (Objective 1), previous literature for concepts and ideas regarding RFID data secrecy measures, the set of design implications (Objective 2), the design of security frameworks covering existing threats to transmit information (Objective 3) and identifying categorical RFID implementation areas (Objective 4), it will be explore the possibility of developing a generalized framework in human implantation and its privacy matters that can be applied to the design of RFID systems to support co-located collaborations. However, if we find that the said framework formulation will require substantial extension of the research effort, we may decide to leave it open as a future research endeavor. PROBLEM STATEMENT The major challenges arises round the globe regarding RFID (Radio Frequency Identification) technology are its data privacy which results location tracking and harmful for secret information to be snatched. In the same way human embedded microchip is also traced during transmitting data from chip to application database which results to locate the person. These issues provide a strong resistance to the technology and its performance capabilities. In context of these issues the research theme designs the privacy framework and the operational methodology which helps the technology to excel and be applicable within and across the domains diversely with steadfast its performance. RESEARCH GOALS G1. Uncertainty control mechanism occurring in RFID data. G2. How to effectively utilize the RFID for human intensive care purposes? Radical application to respond and transmit data on demand (operational features of Active tags) G3. Implementation of the proposed novel privacy framework for RFID G4. What are the countermeasures to conceal the RFID Tag Existence? G5. How to effectively utilize the time gap when the RFID reader is waiting for the RFID tag to respond to an earlier transmitted command after pre-computation of one or more commands and what technique to apply in such a realistic scenario? RESEARCH GAPS The RFID technology is an emerging area of research and still it is on its initial adoption phases yet facing several research gaps which has to be addressed. The gaps are existed between the performance of RFID systems and its associated issues. Due to various real time uncertainty limitations in such systems, the Faraday Cage (to wrap up the Tag with foil) technique preventing to intercept electromagnetic waves, i.e, ID-Queries, in order to prevent the tag from emitting response to reader. The soft computing practices like fuzzy logic (to map the real- world uncertainty), Complex security schemes (Hash Locking/Kill Commands), Countermeasures to emit extra data (Jamming) techniques are yet to be applied to such systems in order to effectively address the problems in existing RFID systems leading to enhanced privacy and performance. RESEARCH DESIGN & METHODOLOGY The research process for this study will involve distinct phases. First, an extensive literature review will be carried out within innovation-adoption by the target sector and RFID domain. Based on literature, particularly dealing with organizational adoption, an initial research model will be developed. In the secondary research phase, the tentative privacy framework will be designed based on synthesis of existing research. The indicators of ‘uncertainty’ (data uncertainty, demand uncertainty, and technology uncertainty) are not necessarily correlated among each other; rather they form the construct [9]. TIME FRAME AND RESOURCES The approximate time required for the completion of research is about 3-4 years which includes the theoretical studies and the experimental work to be prepared. Fifty percent of time will be spent on research and reading relevant material and ten percent of time will be utilized in sorting and marking the research findings and remaining forty percent of time will be spent for writing, formatting and documenting under the potential supervision. There are few experimental resources like RFID tags (Active and Passive), RFID readers and software, which could be sorted out according to the supervision suggestions.
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.5, No.10, 2014 81 REFERENCES [1]. Tonsor, G.T., Schroeder, T.C., 2006. Livestock identification: Lessons for the U.S. Beef Industry from the Australian System. Journal of International Food & Agribusiness Marketing 18(3/4), 1 03- 118. [2]. Charles, Techonal J., Manag, 2008. Human Microchip Implantation. Journal of Technology Management & Innovation 08(3/3)151-1 60. [3]. GARFINKEL, S., Holtzman, H. (2005) Understanding RFID Technology. Pg. 15-16. Garfinkel Book [Links] [4]. COVACIO, S. (2003) Technological Problems Associated with Subcutaneous Microchips for Human Identification (SMHId). Informing Science. [Links] [5]. CASTRO, L, Wamba, S.F. (2007) An Inside LookAt RFID Technology. Journal of Technology and lnnovation,Volume 2, Issue I. Pg.4. [Links] [6]. CHAN, E. (2007) The FDA and the Future of the Brain-Computer Interface: Adapting FDA Device Law to the Challenges of Human-Machine Enhancement. John Marshall Journal of Computer & Information Law Volume 25 Issue I. Pg. 13, 16, 24. http://works.bepress.com/eric_chan/1/. Retrieved 11-02-07 [Links] [7]. GAD, L. (2006) Human Microchip Implantation. Wisconsin Legislative Reference Bureau. Pg. 1.www.legis.state.wi.us/lrb. Retrieved 9-28-07. [Links] [8]. Leea, L.S., Fiedlera, K.D. and Smithb, J.S. (2008), “Radio frequency identification (RFID) implementation in the service sector: A customer-facing diffusion model”, Int. J. Production Economics, 112, 587–600. [9]. Teo, H.H., Wei, K.K., Benbasat, I., 2003. Predicting intention to adopt interorganizational linkages: An institutional perspective. MIS Quarterly 27(1), 19-49.
  • 4. Business, Economics, Finance and Management Journals PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Journal of Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry Journals PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Chemistry and Materials Research CMR@iiste.org Journal of Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems Journals PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Journal of Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Journal of Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences Journals PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Journal of Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Advances in Life Science and Technology ALST@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Journal of Food Science and Quality Management FSQM@iiste.org Journal of Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Journal of New Media and Mass Communication NMMC@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Historical Research Letter HRL@iiste.org Public Policy and Administration Research PPAR@iiste.org International Affairs and Global Strategy IAGS@iiste.org Research on Humanities and Social Sciences RHSS@iiste.org Journal of Developing Country Studies DCS@iiste.org Journal of Arts and Design Studies ADS@iiste.org
  • 5. The IISTE is a pioneer in the Open-Access hosting service and academic event management. The aim of the firm is Accelerating Global Knowledge Sharing. More information about the firm can be found on the homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS There are more than 30 peer-reviewed academic journals hosted under the hosting platform. Prospective authors of journals can find the submission instruction on the following page: http://www.iiste.org/journals/ All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Paper version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar