SlideShare a Scribd company logo
1 of 35
PRESENTATION FOR
RADIO FREQUENCY IDENTIFICATION
& IT’S IMPLEMENTATION
INTRODUCTION TO RFID
 RFID (radio frequency identification) is a form of wireless
communication that incorporates the use of electromagnetic or
electrostatic coupling in the radio frequency portion of the
electromagnetic spectrum to uniquely identify an object.
 Radio frequency identification (RFID) is a technology that uses
communication via radio waves to exchange data between a reader
and an electronic tag attached to an object, for the purpose of
identification and tracking.
WHAT IS RFID?
 A tag can be from up to several
feet away and does not need to
be within direct line-of-sight of
the reader to be tracked.
INTRODUCTION TO RFID
WHAT IS RFID?
RFID
READER
OBJECT
RFID Waves RFID Tags or
labels attached
to the objects to
be identified
Two-way radio
transmitter-receivers
called interrogators
/readers send a signal to
the tag and read its
response.
Category Low Frequency High Frequency Ultra High Frequency
General
Frequency
Range
30 - 300 kHz NA 300 - 3000 MHz
Primary
Frequency
Range
125 - 134 kHz 13.56 MHz 433 MHz, 860 - 960
MHz
Read Range 10 Centimetres 30 Centimetres Active 30 - 100+ M
Passive 25M
Average Cost
Per Tag
$0.75 - $5.00 $0.20 - $10.00 Active $25.00 - $50.00
Passive $0.09 - $20.00
Applications Animal Tracking,
Access Control, Car
Key-Fob,
Applications with
High Volumes of
Liquids and Metals
DVD Kiosks, Library
Books, Personal ID
Cards, Poker/Gaming
Chips, NFC
Applications
A: Vehicle Tracking,
Auto Manufacturing
P: Supply Chain
Tracking,
Manufacturing,
Pharmaceuticals,
Pros Works well near
Liquids & Metals
NFC Global Protocols,
Larger Memory Option
Large Memory Capacity
Cons Very Short Read
Range, Limited
Quantity of Memory,
Short Read Range,
Low Data Transmission
Rate
High Per Tag Cost
COMPONENTS OF RFID SYSTEM
RFID System
RFID Reader RFID Tags
Active Tag
Passive Tag
Fixed Reader
Mobile Reader
COMPONENTS OF RFID SYSTEM
COMPONENTS OF RFID READER
Microcontroller/
Computer
RF Signal
Generator
Receiver Signal
Detector
Antenna
From RFID Tag
COMPONENTS OF RFID SYSTEM
 Fixed readers stay in one location and are typically mounted on
walls, on desks, into portals, or other stationary locations.
 Fixed RFID Readers typically have external antenna ports that can
connect anywhere from one additional antenna to up to eight
different antennas. With the addition of a multiplexer, some
readers can connect to up to 32 RFID antennas.
 The number of antennas connected to one reader depends on the
area of coverage required for the RFID application. Some desktop
applications, like checking files in and out, only need a small area
of coverage, so one antenna works well. Other applications with a
larger area of coverage, such as a finish line in a race timing
application typically require multiple antennas to create the
necessary coverage zone.
FIXED RFID READER
COMPONENTS OF RFID SYSTEM
 Application: Typically used at a doorway/walkthrough like docks
warehouse
FIXED RFID READER
COMPONENTS OF RFID SYSTEM
 Mobile readers are handheld devices that allow for flexibility when
reading RFID tags while still being able to communicate with a host
computer or smart device.
 There are two primary categories of Mobile RFID readers – readers
with an on-board computer, called Mobile Computing Devices, and
readers that use a Bluetooth or Auxiliary connection to a smart
device or tablet, called Sleds.
 These can be used for low budget projects, flexible with low
infrastructure cost.
MOBILE RFID READER
COMPONENTS OF RFID SYSTEM
 Application: These can be used for projects related to warehouse
and storage areas, ticket scanning for a park or event.
MOBILE RFID READER
COMPONENTS OF RFID SYSTEM
RFID TAG
Controller Memory
Rectifier
Circuit
Transponder
Power Source
COMPONENTS OF RFID SYSTEM
 Active RFID tags possess their own power source – an internal
battery that enables them to have extremely long read ranges as
well as large memory banks.
 RFID that use active tags are called Active RFID systems these tags
continuously broadcast their own signal.
 There are two main frequencies used by active systems – 433 MHz
and 915 MHz. Generally RFID systems that operate on the 433 MHz
is used, because it has a longer wavelength enabling it to work a
little better with non-RF friendly materials like metal and water.
 Pros
 Extremely Long Read Range
 Increased tag abilities with partnered technologies (GPS, sensors,etc.)
 Extremely Rugged tag options
ACTIVE TAG
COMPONENTS OF RFID SYSTEM
 In a system that uses an active transponder tag, the reader (like
passive systems) will send a signal first, and then the active
transponder will send a signal back with the relevant information.
 Transponder tags are very efficient because they conserve battery
life when the tag is out of range of the reader.
TYPES OF ACTIVE TAG: TRANSPONDER
 Application: Active
RFID transponders
are commonly used
in secure access
control and in toll
booth payment
systems.
COMPONENTS OF RFID SYSTEM
 In a system that uses an active beacon tag, the tag will not wait to
hear the reader’s signal. Instead, true to its name, the tag will
‘beacon’, or send out its specific information every 3 - 5 seconds.
 Active tag’s beacons can be read hundreds of meters away, but, in
order to conserve battery life, they may be set to a lower transmit
power in order to reach around 100 meters read range.
TYPES OF ACTIVE TAG: BEACONS
 Application:
Beacon tags are
very common in
the oil and gas
industry, as well
as mining and
cargo tracking
applications.
COMPONENTS OF RFID SYSTEM
 Passive tags operate with no internal power source and instead are
powered by the electromagnetic energy transmitted from an RFID reader.
PASSIVE TAG
Reader Antenna
Energy
RF Wave
Read Zone
(Tag is read)
Internal
Antenna
Energy
from RF
Wave
Integrated
Circuit
Tag
RF Wave Signal
Information
Interpretation
COMPONENTS OF RFID SYSTEM
 Pros
 Cheaper , Smaller, thinner/more flexible tags
 Higher range of tag options
 Tags can last a lifetime without a battery
 Application
 Access control
 File tracking
 Race timing
 Supply chain management
 Smart labels, and more.
PASSIVE TAG
COMPONENTS OF RFID SYSTEM
 Passive RFID tags have no internal power
source, and a standard passive RFID tag
consists only of an IC and internal
antenna; this basic structure is referred
to as an RFID inlay.
TYPES OF PASSIVE TAG: INLAY TAGS
 Hard RFID tags are durable and made of plastic, metal, ceramic
and even rubber. They come in all shapes and sizes and are
typically designed for a unique function, material, or application.
TYPES OF PASSIVE TAG: HARD TAGS
ACTIVE TAG VS PASSIVE
TAG
COMPONENTS OF RFID SYSTEM
 RFID Antennas convert the RFID reader’s signal into RF waves that
can be picked up by RFID tags.
 RFID antennas receive their power directly from the reader. When
the reader’s energy is transmitted to the antenna, the antenna
generates an RF field and, subsequently, an RF signal is
transmitted to the tags in the vicinity.
 Antenna Gain: The antenna’s efficiency of generating waves in a
specific direction is known as the antenna’s gain. The higher the
gain, the more powerful, and further-reaching RF field an antenna
will have.
 Antenna Polarity: The RFID antenna gives off RFID waves along a
horizontal or vertical plane, which is described as the antenna’s
polarity.
RFID ANTENNA
COMPONENTS OF RFID SYSTEM
 If the RF field is a horizontal
plane, is it called horizontally
linear, and if in vertical plane it
is vertically linear.
 An antenna’s polarity impacts
upon a system’s read range to
maximize read range antenna’s
polarity should align with the
polarity of the RFID tag.
TYPES OF RFID ANTENNA
 A circularly-polarized antenna transmits waves that continually
rotate between horizontal and vertical planes in order to give an
application enhanced flexibility by allowing for RFID tags to be read
in multiple orientations
 The energy is divided between two planes, a circularly-polarized
antenna’s read range is shorter versus a similar gain linear antenna.
APPLICATIONS OF RFID SYSTEM
 Asset Tracking: Companies can keep a record of their assets; also can
track their movement in and out of a gateway through RFID.
INDUSTRY & LOGISTICS
 The RFID systems can be used at Baggage Handling at airports and
Container Tracking at shipment docks.
 Beer Keg Tracking : RFID is used to track draught beer to reach retail
outlets , the kegs are tracked from the breweries through the
distributors and wholesalers all the way to where it is consumed.
APPLICATIONS OF RFID SYSTEM
 Electronic Toll Collection: These system
allows electronically charging a toll to an
established customer account. ETC allows
vehicles to pass through a toll without
stopping or requiring any action by the
driver. The automatic toll collection
requires an account with the concerned
government authority. RFID Tag with a
chip in it is fixed on the windshield of the
vehicle and enables a customer to make
the toll payment directly from the
account linked to the tag.
INDUSTRY & LOGISTICS
 Gas Cylinder Identification : RFID tags
can be used effectively to monitor, track
and bill for gas cylinders quickly and
accurately.
APPLICATIONS OF RFID SYSTEM
 Inventory Management: RFID technology helps in the identification
and recording of individual products and components, and to track
them throughout the verticals from production to point-of-sale. This
process does not require direct line-of-sight and it creates visibility
of stock in hand, thus helps proper utilization to it. Every movement
of the inventory/stock can be automatically stored on the system
with the help of this technology.
INDUSTRY & LOGISTICS
 Pallet Tracking: Pallet movement
contributes significantly towards the
handling, transport and storage costs. As
goods move on pallets through a
warehouse or a supply chain, it becomes
imperative to track their movement and
collect information regarding their
location, usage, process flow, and
available inventory.
APPLICATIONS OF RFID SYSTEM
 Jewellery Management : RFID Tagging of
jewellery articles can assist in the quick,
accurate and efficient management of these
goods. RFID tagged jewellery items can be
read in bulk which makes stock-taking and
bookkeeping very quick and reduces the scope
of manual error.
INDUSTRY & LOGISTICS
 Manufacturing & Automation: The tags are deployed to help in
management of all assets on the assembly line from manufacturing
machinery, equipment and tools to WIP and final goods produced.
They help in data collection, maintaining accurate reports and
records, finding inconsistencies in process or quality, tracking rework
and rejected material and even proper and accurate dispatches.
APPLICATIONS OF RFID SYSTEM
 Access Control: The access control system is one of the most
commonly used systems in electronic door control using a card or a
magnetic stripe that can be accessed by swiping through a reader on
the door. These access control systems are used for security
purposes. It is widely used in Offices, Server rooms, Homes, Airports,
Defence, Data centers, etc.
 Library Applications: RFID based system supports the library in
tracking and recording the transactions, it helps in monitoring and
improving the handling process. RFID tags are attached to books &
material in the library with their stored information on the chip.
 Other Applications of RFID:
 Mobile Payments
 Parking Management
 Personal Identification
 Public Transport
ACCESS & SECURITY
APPLICATIONS OF RFID SYSTEM
 Animal Identification & Tracking: RFID based Animal Tracking and
identification are used the world over to track history and movement
of farm animals, zoo animals, and pet animals. It is necessary to
maintain records regarding animal origin, health, nutrition, the
threat of disease and so on.
ANIMAL
 Hospital Equipment Tracking: RFID tags can be used to track
inventory, locate assets, follow maintenance cycles, and optimize
equipment usage across the hospital for different procedures.
 Patient Tracking: Patients are made to wear RFID Wristband tags
which are stored with information regarding their diagnosis, medical
history, and treatment process.
PHARMA & HEALTHCARE
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 RFID tags and readers can be reverse engineered i.e. Hackers can
take apart the chip in order to find out how it works in order to
receive the data from the IC.
 Purpose: Steal Information and/or Gain Access
REVERSE ENGINEERING
 A Federal Information Processing standard refers to chip coatings as
an anti-reverse engineering method to prevent attacks.
 Various tamper proof techniques have been developed to defend
against reverse engineering attacks. For instance, by adding a
tamper-release layer to RFID tags, operations personnel can be
alerted if a tag has been tampered with.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 Power analysis is a form of side-channel attack that is intended to
retrieve information by analyzing changes in the power consumption
of a device. The power emission patterns are different when the
card received correct and incorrect password bits or cryptographic
keys. It is possible to breach smart card security by monitoring
power consumption signals.
 Purpose: Steal Information and/or Gain Access
POWER ANALYSIS
 Filtering power signals or delaying the computation randomly can
increase the difficulty for the attacker to identify the power
consumption patterns.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 Eavesdropping, is when an unauthorized RFID reader listens to
conversations between a tag and reader then obtains important
data.
 Replay attacks builds on eavesdropping and specifically occur when
one part of communication in an RFID system is recorded and then
‘replayed’ at a later time to the receiving device in order to steal
information or gain access.
 Purpose: Steal Information and/or Gain Access
EAVESDROPPING & REPLAY
 Countermeasures against eavesdropping include establishing a secure
channel and/or encrypting the communication between tag and
reader.
 Another approach is to only write the tag with enough information to
identify the object. The identity is used to look up relevant
information about the object in a back end database, thus requiring
the attacker to have access to both the tag and the database to
succeed in the attack.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 A man-in-the-middle attack happens during the transmission of a
signal. Like eavesdropping, the hacker listens for communication
between a tag and reader and then intercepts and manipulates the
information. The hacker diverts the original signal and then sends
false data while pretending to be a normal component in the RFID
system.
 Purpose: Take Down System
SNIFFING (MAN-IN-THE-MIDDLE ATTACK)
 Several technologies can be implemented to reduce MITM threats,
such as encrypting communications, sending information through a
secure channel, and providing an authentication protocol.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 A Denial of Service attack is the broad concept of an RFID system
failure that is associated with an attack. These attacks are usually
physical attacks like jamming the system with noise interference,
blocking radio signals, or even removing or disabling RFID tags.
 Purpose: Take Down System
DENIAL OF SERVICE
 It is easier to detect DoS attacks than prevent them from happening
but detected, the attacks can generally be stopped before they do
too much harm. For eg, countermeasures against jamming can use
passive listening to detect the tags whose transmission exceeds a
predefined volume, and then use block functions to thwart them.
 Cowuntermeasures against detaching the tags from the targeted
items could be either through enhancing the mechanical connection
between the tags and items, or adding an alarm function to active
tags.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 Cloning and spoofing are usually done back to back. Cloning is
duplicating data from a pre-existing tag, and spoofing is then using
the cloned tag to gain access to a secured area or item. Because the
hacker has to know the data on the tag to clone it, this type of
attack is mainly seen in access or asset management operations.
 Purpose: Gain Access
CLONING & SPOOFING
 To defeat a spoofing attack is to implement an RFID authentication
protocol and data encryption, which increases the cost and
technology complexity needed for a successful attack.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
 RFID tags currently do not have enough memory capacity to store a
virus; but in the future, viruses could be a serious threat to an RFID
system. A virus programmed on an RFID tag by an unknown source
could cripple an RFID system when the tagged item is read at a
facility. When read, the virus would transfer from tag to reader and
then to a company’s network and software – bringing down
connected computers, RFID components, and networks.
 Purpose: Take Down System
VIRUS
 The virus attacks which have been demonstrated on RFID-based
systems are the common attacks against information systems, such
as buffer overflow attacks, code or SQL injection attacks, etc. Well-
developed middleware can be used to avoid virus attacks by blocking
anomalous bits from the tag.
COUNTERMEASURES
SECURITY ATTACKS ON RFID SYSTEMS & COUNTER
MEASURES
Reverse
Engineering
‱Optical Tamper Sensor
‱Chip Coating
Power Analysis
‱Randomization
Eavesdropping
‱Encryption
‱Shift data to backend
Man-in-the-Middle
‱Encryption
‱Authentication
Cloning
‱Authentication
‱Recognizing
Duplicates
Unauthorized
Reading
‱Authentication
‱Install Field Detector
‱Shift Data to backend
Unauthorized
writing/Modification
‱Authentication
‱Install Field Detector
‱Use read-only tags
Spoofing
‱Install Field Detector
‱Frequency
Division/Hopping
Jamming
Transmitters
‱Authentication
‱Encryption
Reply
‱Challenge and
Response
Virus
‱Bounds Checking &
Parameter
Detaching Tag
from Tagged item
‱Mechanical connection
‱Alarm Function for
Active Tags
Tracking
‱Kill function
Misuse Kill
Command
‱Authentication
THANK
YOU!

More Related Content

What's hot

RFID Basics
RFID BasicsRFID Basics
RFID Basicsfizzyjazzy
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Kandarp Vyas
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application15225763
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working Niranjan
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
RFID in Textile
RFID in TextileRFID in Textile
RFID in TextileTakbir Ahmed
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFIDYudhi Irawan
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of VehiclesIRJET Journal
 
rfid presentation
rfid presentationrfid presentation
rfid presentationDinesh Nikam
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 

What's hot (20)

RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
Rfid
RfidRfid
Rfid
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID in Textile
RFID in TextileRFID in Textile
RFID in Textile
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFID
 
Page 1 54
Page 1 54Page 1 54
Page 1 54
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
Rfid
RfidRfid
Rfid
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Rfid In Brief Ii
Rfid In Brief IiRfid In Brief Ii
Rfid In Brief Ii
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 

Similar to RFID Presentation: Tracking Supply Chains & Assets

Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxnirdeshmucha1
 
Rfid technology
Rfid technologyRfid technology
Rfid technologyDeepak Raj
 
Automatic car parking system
Automatic car parking system Automatic car parking system
Automatic car parking system Ankit Verma
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industrybizpresenter
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)Robiul Islam
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)KOPPOLI KIRANKUMAR
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationharoonahmed0044
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
 

Similar to RFID Presentation: Tracking Supply Chains & Assets (20)

Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptx
 
Rfid
RfidRfid
Rfid
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID
RFIDRFID
RFID
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
 
Automatic car parking system
Automatic car parking system Automatic car parking system
Automatic car parking system
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
Major project
Major projectMajor project
Major project
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar Topic
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

RFID Presentation: Tracking Supply Chains & Assets

  • 1. PRESENTATION FOR RADIO FREQUENCY IDENTIFICATION & IT’S IMPLEMENTATION
  • 2. INTRODUCTION TO RFID  RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object.  Radio frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. WHAT IS RFID?  A tag can be from up to several feet away and does not need to be within direct line-of-sight of the reader to be tracked.
  • 3. INTRODUCTION TO RFID WHAT IS RFID? RFID READER OBJECT RFID Waves RFID Tags or labels attached to the objects to be identified Two-way radio transmitter-receivers called interrogators /readers send a signal to the tag and read its response.
  • 4. Category Low Frequency High Frequency Ultra High Frequency General Frequency Range 30 - 300 kHz NA 300 - 3000 MHz Primary Frequency Range 125 - 134 kHz 13.56 MHz 433 MHz, 860 - 960 MHz Read Range 10 Centimetres 30 Centimetres Active 30 - 100+ M Passive 25M Average Cost Per Tag $0.75 - $5.00 $0.20 - $10.00 Active $25.00 - $50.00 Passive $0.09 - $20.00 Applications Animal Tracking, Access Control, Car Key-Fob, Applications with High Volumes of Liquids and Metals DVD Kiosks, Library Books, Personal ID Cards, Poker/Gaming Chips, NFC Applications A: Vehicle Tracking, Auto Manufacturing P: Supply Chain Tracking, Manufacturing, Pharmaceuticals, Pros Works well near Liquids & Metals NFC Global Protocols, Larger Memory Option Large Memory Capacity Cons Very Short Read Range, Limited Quantity of Memory, Short Read Range, Low Data Transmission Rate High Per Tag Cost
  • 5. COMPONENTS OF RFID SYSTEM RFID System RFID Reader RFID Tags Active Tag Passive Tag Fixed Reader Mobile Reader
  • 6. COMPONENTS OF RFID SYSTEM COMPONENTS OF RFID READER Microcontroller/ Computer RF Signal Generator Receiver Signal Detector Antenna From RFID Tag
  • 7. COMPONENTS OF RFID SYSTEM  Fixed readers stay in one location and are typically mounted on walls, on desks, into portals, or other stationary locations.  Fixed RFID Readers typically have external antenna ports that can connect anywhere from one additional antenna to up to eight different antennas. With the addition of a multiplexer, some readers can connect to up to 32 RFID antennas.  The number of antennas connected to one reader depends on the area of coverage required for the RFID application. Some desktop applications, like checking files in and out, only need a small area of coverage, so one antenna works well. Other applications with a larger area of coverage, such as a finish line in a race timing application typically require multiple antennas to create the necessary coverage zone. FIXED RFID READER
  • 8. COMPONENTS OF RFID SYSTEM  Application: Typically used at a doorway/walkthrough like docks warehouse FIXED RFID READER
  • 9. COMPONENTS OF RFID SYSTEM  Mobile readers are handheld devices that allow for flexibility when reading RFID tags while still being able to communicate with a host computer or smart device.  There are two primary categories of Mobile RFID readers – readers with an on-board computer, called Mobile Computing Devices, and readers that use a Bluetooth or Auxiliary connection to a smart device or tablet, called Sleds.  These can be used for low budget projects, flexible with low infrastructure cost. MOBILE RFID READER
  • 10. COMPONENTS OF RFID SYSTEM  Application: These can be used for projects related to warehouse and storage areas, ticket scanning for a park or event. MOBILE RFID READER
  • 11. COMPONENTS OF RFID SYSTEM RFID TAG Controller Memory Rectifier Circuit Transponder Power Source
  • 12. COMPONENTS OF RFID SYSTEM  Active RFID tags possess their own power source – an internal battery that enables them to have extremely long read ranges as well as large memory banks.  RFID that use active tags are called Active RFID systems these tags continuously broadcast their own signal.  There are two main frequencies used by active systems – 433 MHz and 915 MHz. Generally RFID systems that operate on the 433 MHz is used, because it has a longer wavelength enabling it to work a little better with non-RF friendly materials like metal and water.  Pros  Extremely Long Read Range  Increased tag abilities with partnered technologies (GPS, sensors,etc.)  Extremely Rugged tag options ACTIVE TAG
  • 13. COMPONENTS OF RFID SYSTEM  In a system that uses an active transponder tag, the reader (like passive systems) will send a signal first, and then the active transponder will send a signal back with the relevant information.  Transponder tags are very efficient because they conserve battery life when the tag is out of range of the reader. TYPES OF ACTIVE TAG: TRANSPONDER  Application: Active RFID transponders are commonly used in secure access control and in toll booth payment systems.
  • 14. COMPONENTS OF RFID SYSTEM  In a system that uses an active beacon tag, the tag will not wait to hear the reader’s signal. Instead, true to its name, the tag will ‘beacon’, or send out its specific information every 3 - 5 seconds.  Active tag’s beacons can be read hundreds of meters away, but, in order to conserve battery life, they may be set to a lower transmit power in order to reach around 100 meters read range. TYPES OF ACTIVE TAG: BEACONS  Application: Beacon tags are very common in the oil and gas industry, as well as mining and cargo tracking applications.
  • 15. COMPONENTS OF RFID SYSTEM  Passive tags operate with no internal power source and instead are powered by the electromagnetic energy transmitted from an RFID reader. PASSIVE TAG Reader Antenna Energy RF Wave Read Zone (Tag is read) Internal Antenna Energy from RF Wave Integrated Circuit Tag RF Wave Signal Information Interpretation
  • 16. COMPONENTS OF RFID SYSTEM  Pros  Cheaper , Smaller, thinner/more flexible tags  Higher range of tag options  Tags can last a lifetime without a battery  Application  Access control  File tracking  Race timing  Supply chain management  Smart labels, and more. PASSIVE TAG
  • 17. COMPONENTS OF RFID SYSTEM  Passive RFID tags have no internal power source, and a standard passive RFID tag consists only of an IC and internal antenna; this basic structure is referred to as an RFID inlay. TYPES OF PASSIVE TAG: INLAY TAGS  Hard RFID tags are durable and made of plastic, metal, ceramic and even rubber. They come in all shapes and sizes and are typically designed for a unique function, material, or application. TYPES OF PASSIVE TAG: HARD TAGS
  • 18. ACTIVE TAG VS PASSIVE TAG
  • 19. COMPONENTS OF RFID SYSTEM  RFID Antennas convert the RFID reader’s signal into RF waves that can be picked up by RFID tags.  RFID antennas receive their power directly from the reader. When the reader’s energy is transmitted to the antenna, the antenna generates an RF field and, subsequently, an RF signal is transmitted to the tags in the vicinity.  Antenna Gain: The antenna’s efficiency of generating waves in a specific direction is known as the antenna’s gain. The higher the gain, the more powerful, and further-reaching RF field an antenna will have.  Antenna Polarity: The RFID antenna gives off RFID waves along a horizontal or vertical plane, which is described as the antenna’s polarity. RFID ANTENNA
  • 20. COMPONENTS OF RFID SYSTEM  If the RF field is a horizontal plane, is it called horizontally linear, and if in vertical plane it is vertically linear.  An antenna’s polarity impacts upon a system’s read range to maximize read range antenna’s polarity should align with the polarity of the RFID tag. TYPES OF RFID ANTENNA  A circularly-polarized antenna transmits waves that continually rotate between horizontal and vertical planes in order to give an application enhanced flexibility by allowing for RFID tags to be read in multiple orientations  The energy is divided between two planes, a circularly-polarized antenna’s read range is shorter versus a similar gain linear antenna.
  • 21. APPLICATIONS OF RFID SYSTEM  Asset Tracking: Companies can keep a record of their assets; also can track their movement in and out of a gateway through RFID. INDUSTRY & LOGISTICS  The RFID systems can be used at Baggage Handling at airports and Container Tracking at shipment docks.  Beer Keg Tracking : RFID is used to track draught beer to reach retail outlets , the kegs are tracked from the breweries through the distributors and wholesalers all the way to where it is consumed.
  • 22. APPLICATIONS OF RFID SYSTEM  Electronic Toll Collection: These system allows electronically charging a toll to an established customer account. ETC allows vehicles to pass through a toll without stopping or requiring any action by the driver. The automatic toll collection requires an account with the concerned government authority. RFID Tag with a chip in it is fixed on the windshield of the vehicle and enables a customer to make the toll payment directly from the account linked to the tag. INDUSTRY & LOGISTICS  Gas Cylinder Identification : RFID tags can be used effectively to monitor, track and bill for gas cylinders quickly and accurately.
  • 23. APPLICATIONS OF RFID SYSTEM  Inventory Management: RFID technology helps in the identification and recording of individual products and components, and to track them throughout the verticals from production to point-of-sale. This process does not require direct line-of-sight and it creates visibility of stock in hand, thus helps proper utilization to it. Every movement of the inventory/stock can be automatically stored on the system with the help of this technology. INDUSTRY & LOGISTICS  Pallet Tracking: Pallet movement contributes significantly towards the handling, transport and storage costs. As goods move on pallets through a warehouse or a supply chain, it becomes imperative to track their movement and collect information regarding their location, usage, process flow, and available inventory.
  • 24. APPLICATIONS OF RFID SYSTEM  Jewellery Management : RFID Tagging of jewellery articles can assist in the quick, accurate and efficient management of these goods. RFID tagged jewellery items can be read in bulk which makes stock-taking and bookkeeping very quick and reduces the scope of manual error. INDUSTRY & LOGISTICS  Manufacturing & Automation: The tags are deployed to help in management of all assets on the assembly line from manufacturing machinery, equipment and tools to WIP and final goods produced. They help in data collection, maintaining accurate reports and records, finding inconsistencies in process or quality, tracking rework and rejected material and even proper and accurate dispatches.
  • 25. APPLICATIONS OF RFID SYSTEM  Access Control: The access control system is one of the most commonly used systems in electronic door control using a card or a magnetic stripe that can be accessed by swiping through a reader on the door. These access control systems are used for security purposes. It is widely used in Offices, Server rooms, Homes, Airports, Defence, Data centers, etc.  Library Applications: RFID based system supports the library in tracking and recording the transactions, it helps in monitoring and improving the handling process. RFID tags are attached to books & material in the library with their stored information on the chip.  Other Applications of RFID:  Mobile Payments  Parking Management  Personal Identification  Public Transport ACCESS & SECURITY
  • 26. APPLICATIONS OF RFID SYSTEM  Animal Identification & Tracking: RFID based Animal Tracking and identification are used the world over to track history and movement of farm animals, zoo animals, and pet animals. It is necessary to maintain records regarding animal origin, health, nutrition, the threat of disease and so on. ANIMAL  Hospital Equipment Tracking: RFID tags can be used to track inventory, locate assets, follow maintenance cycles, and optimize equipment usage across the hospital for different procedures.  Patient Tracking: Patients are made to wear RFID Wristband tags which are stored with information regarding their diagnosis, medical history, and treatment process. PHARMA & HEALTHCARE
  • 27. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  RFID tags and readers can be reverse engineered i.e. Hackers can take apart the chip in order to find out how it works in order to receive the data from the IC.  Purpose: Steal Information and/or Gain Access REVERSE ENGINEERING  A Federal Information Processing standard refers to chip coatings as an anti-reverse engineering method to prevent attacks.  Various tamper proof techniques have been developed to defend against reverse engineering attacks. For instance, by adding a tamper-release layer to RFID tags, operations personnel can be alerted if a tag has been tampered with. COUNTERMEASURES
  • 28. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  Power analysis is a form of side-channel attack that is intended to retrieve information by analyzing changes in the power consumption of a device. The power emission patterns are different when the card received correct and incorrect password bits or cryptographic keys. It is possible to breach smart card security by monitoring power consumption signals.  Purpose: Steal Information and/or Gain Access POWER ANALYSIS  Filtering power signals or delaying the computation randomly can increase the difficulty for the attacker to identify the power consumption patterns. COUNTERMEASURES
  • 29. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  Eavesdropping, is when an unauthorized RFID reader listens to conversations between a tag and reader then obtains important data.  Replay attacks builds on eavesdropping and specifically occur when one part of communication in an RFID system is recorded and then ‘replayed’ at a later time to the receiving device in order to steal information or gain access.  Purpose: Steal Information and/or Gain Access EAVESDROPPING & REPLAY  Countermeasures against eavesdropping include establishing a secure channel and/or encrypting the communication between tag and reader.  Another approach is to only write the tag with enough information to identify the object. The identity is used to look up relevant information about the object in a back end database, thus requiring the attacker to have access to both the tag and the database to succeed in the attack. COUNTERMEASURES
  • 30. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  A man-in-the-middle attack happens during the transmission of a signal. Like eavesdropping, the hacker listens for communication between a tag and reader and then intercepts and manipulates the information. The hacker diverts the original signal and then sends false data while pretending to be a normal component in the RFID system.  Purpose: Take Down System SNIFFING (MAN-IN-THE-MIDDLE ATTACK)  Several technologies can be implemented to reduce MITM threats, such as encrypting communications, sending information through a secure channel, and providing an authentication protocol. COUNTERMEASURES
  • 31. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  A Denial of Service attack is the broad concept of an RFID system failure that is associated with an attack. These attacks are usually physical attacks like jamming the system with noise interference, blocking radio signals, or even removing or disabling RFID tags.  Purpose: Take Down System DENIAL OF SERVICE  It is easier to detect DoS attacks than prevent them from happening but detected, the attacks can generally be stopped before they do too much harm. For eg, countermeasures against jamming can use passive listening to detect the tags whose transmission exceeds a predefined volume, and then use block functions to thwart them.  Cowuntermeasures against detaching the tags from the targeted items could be either through enhancing the mechanical connection between the tags and items, or adding an alarm function to active tags. COUNTERMEASURES
  • 32. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  Cloning and spoofing are usually done back to back. Cloning is duplicating data from a pre-existing tag, and spoofing is then using the cloned tag to gain access to a secured area or item. Because the hacker has to know the data on the tag to clone it, this type of attack is mainly seen in access or asset management operations.  Purpose: Gain Access CLONING & SPOOFING  To defeat a spoofing attack is to implement an RFID authentication protocol and data encryption, which increases the cost and technology complexity needed for a successful attack. COUNTERMEASURES
  • 33. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES  RFID tags currently do not have enough memory capacity to store a virus; but in the future, viruses could be a serious threat to an RFID system. A virus programmed on an RFID tag by an unknown source could cripple an RFID system when the tagged item is read at a facility. When read, the virus would transfer from tag to reader and then to a company’s network and software – bringing down connected computers, RFID components, and networks.  Purpose: Take Down System VIRUS  The virus attacks which have been demonstrated on RFID-based systems are the common attacks against information systems, such as buffer overflow attacks, code or SQL injection attacks, etc. Well- developed middleware can be used to avoid virus attacks by blocking anomalous bits from the tag. COUNTERMEASURES
  • 34. SECURITY ATTACKS ON RFID SYSTEMS & COUNTER MEASURES Reverse Engineering ‱Optical Tamper Sensor ‱Chip Coating Power Analysis ‱Randomization Eavesdropping ‱Encryption ‱Shift data to backend Man-in-the-Middle ‱Encryption ‱Authentication Cloning ‱Authentication ‱Recognizing Duplicates Unauthorized Reading ‱Authentication ‱Install Field Detector ‱Shift Data to backend Unauthorized writing/Modification ‱Authentication ‱Install Field Detector ‱Use read-only tags Spoofing ‱Install Field Detector ‱Frequency Division/Hopping Jamming Transmitters ‱Authentication ‱Encryption Reply ‱Challenge and Response Virus ‱Bounds Checking & Parameter Detaching Tag from Tagged item ‱Mechanical connection ‱Alarm Function for Active Tags Tracking ‱Kill function Misuse Kill Command ‱Authentication