SlideShare a Scribd company logo
1 of 3
Download to read offline
ANS :
Radio frequency identification (RFID) has been around for decades. Only recently, however, has
the convergence of lower cost and increased capabilities made businesses take a hard look at
what RFID can do for them.A major push came when retailinggiant Wal-Mart dramatically
announced that it would require its top 100 suppliers to supply RFID-enabled shipments by
January 2005. Though the bottom line story of that deployment has yet to surface, it does seem
to support the inevitable movement of inventory tracking and supply chain management toward
RFID.
CHALLENGES AND ISSUES IN RFID :
Although promising, RFID is not without its challenges, which arise from both a technological
and usage point of view.
Privacy concerns :
A common concern with RFID is privacy. It is disconcerting for many people to have their
movements or buying habits automatically tracked electronically. Many privacy groups are
concerned about the ability to identify people as they walk through a store or shopping center via
the tags embedded in their clothing and linked to them at the time of purchase .
However, anytime someone automatically stores and tracks personal identification in electronic
databases, privacy concerns are very real. RFID tags used in transportation systems—whether for
fare collection on mass transit systems or automatic toll payment on bridges and
highways—allows for the easy and unprecedented trackingnof movement. If you can pay for
products in an RFID tag and companies later bill you automatically, it takes all possible
anonymity out of the retail process. Companies and government agencies must address these
concerns
before the public will truly feel comfortable using RFID systems. People will want to see
policies about the use of an RFID system and the information it collects.
Security :
Security is another key issue in RFID. An organization that implements RFID in its supply chain
does not want competitors to track its shipments and inventory. People who use devices that
carry personal financial information, such as credit card or other ID numbers, do not want others
to access their accounts. These are significant security vulnerabilities in RFID. Some researchers
have proposed schemes that would require tags to authenticate readers, transmitting information
only to authorized readers.The tags would have to store ID numbers for authorized readers, and a
reader would have to broadcast its ID to the tag. To protect the reader’s ID—and prevent others
from eavesdropping and stealing the information—the reader uses either a fixed or
randomly generated number to hash (encrypt) its ID (Gao and colleagues).
Integration with legacy systems :
Another challenge to RFID is its integration into existing systems. Several vendors are
developing RFID middleware that will link new RFID systems into existing back-end
infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If
an organization picks a standard that changes or loses its market prevalence, middleware can
transform the data from readers into the format supported by back-end systems.
WAL-MART: TAKING THE LEAD IN RFID FOR RETAIL :
Taking lead in RFID for retail Of the many organizations having implemented RFID,the one that
received the most media attention is Wal-Mart. The world’s largest retailer, Wal-Mart has one of
the most efficient supply chains in the world. With a large array of suppliers from many different
industries,Wal-Mart’s RFID effort has the potential to cause a web of RFID implementations.
Solution
ANS :
Radio frequency identification (RFID) has been around for decades. Only recently, however, has
the convergence of lower cost and increased capabilities made businesses take a hard look at
what RFID can do for them.A major push came when retailinggiant Wal-Mart dramatically
announced that it would require its top 100 suppliers to supply RFID-enabled shipments by
January 2005. Though the bottom line story of that deployment has yet to surface, it does seem
to support the inevitable movement of inventory tracking and supply chain management toward
RFID.
CHALLENGES AND ISSUES IN RFID :
Although promising, RFID is not without its challenges, which arise from both a technological
and usage point of view.
Privacy concerns :
A common concern with RFID is privacy. It is disconcerting for many people to have their
movements or buying habits automatically tracked electronically. Many privacy groups are
concerned about the ability to identify people as they walk through a store or shopping center via
the tags embedded in their clothing and linked to them at the time of purchase .
However, anytime someone automatically stores and tracks personal identification in electronic
databases, privacy concerns are very real. RFID tags used in transportation systems—whether for
fare collection on mass transit systems or automatic toll payment on bridges and
highways—allows for the easy and unprecedented trackingnof movement. If you can pay for
products in an RFID tag and companies later bill you automatically, it takes all possible
anonymity out of the retail process. Companies and government agencies must address these
concerns
before the public will truly feel comfortable using RFID systems. People will want to see
policies about the use of an RFID system and the information it collects.
Security :
Security is another key issue in RFID. An organization that implements RFID in its supply chain
does not want competitors to track its shipments and inventory. People who use devices that
carry personal financial information, such as credit card or other ID numbers, do not want others
to access their accounts. These are significant security vulnerabilities in RFID. Some researchers
have proposed schemes that would require tags to authenticate readers, transmitting information
only to authorized readers.The tags would have to store ID numbers for authorized readers, and a
reader would have to broadcast its ID to the tag. To protect the reader’s ID—and prevent others
from eavesdropping and stealing the information—the reader uses either a fixed or
randomly generated number to hash (encrypt) its ID (Gao and colleagues).
Integration with legacy systems :
Another challenge to RFID is its integration into existing systems. Several vendors are
developing RFID middleware that will link new RFID systems into existing back-end
infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If
an organization picks a standard that changes or loses its market prevalence, middleware can
transform the data from readers into the format supported by back-end systems.
WAL-MART: TAKING THE LEAD IN RFID FOR RETAIL :
Taking lead in RFID for retail Of the many organizations having implemented RFID,the one that
received the most media attention is Wal-Mart. The world’s largest retailer, Wal-Mart has one of
the most efficient supply chains in the world. With a large array of suppliers from many different
industries,Wal-Mart’s RFID effort has the potential to cause a web of RFID implementations.

More Related Content

Similar to ANS Radio frequency identification (RFID) has been around for dec.pdf

Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
isme
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
nettletondevon
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
Liz Sims
 
Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
Saqib Raza
 
RFID application in scm and vm
RFID application in scm and vmRFID application in scm and vm
RFID application in scm and vm
Mohnish Madkaikar
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.ppt
fodyy
 
What is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdfWhat is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdf
arihantcommunication
 

Similar to ANS Radio frequency identification (RFID) has been around for dec.pdf (20)

RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim Bloedau
 
3 supply chain management
3 supply chain management3 supply chain management
3 supply chain management
 
RFID
RFIDRFID
RFID
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 
RFID:A pragmatic approach
RFID:A pragmatic approachRFID:A pragmatic approach
RFID:A pragmatic approach
 
The future is now final
The future is now finalThe future is now final
The future is now final
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
The future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-finalThe future is now chain store_age_guest-column_may2003-final
The future is now chain store_age_guest-column_may2003-final
 
RFID in retail sector
RFID in retail sectorRFID in retail sector
RFID in retail sector
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Parking solution presentation
Parking solution presentationParking solution presentation
Parking solution presentation
 
RFID application in scm and vm
RFID application in scm and vmRFID application in scm and vm
RFID application in scm and vm
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.ppt
 
What is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdfWhat is the role of RFID chips in logistics What is the role o.pdf
What is the role of RFID chips in logistics What is the role o.pdf
 
IS new.pptx
IS new.pptxIS new.pptx
IS new.pptx
 
Radio-frequency_identification‎
Radio-frequency_identification‎ Radio-frequency_identification‎
Radio-frequency_identification‎
 

More from mukhtaransarcloth

Let us assume the conc of Ba(OH)2 is known to us .pdf
                     Let us assume the conc of Ba(OH)2 is known to us .pdf                     Let us assume the conc of Ba(OH)2 is known to us .pdf
Let us assume the conc of Ba(OH)2 is known to us .pdf
mukhtaransarcloth
 
We are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdfWe are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdf
mukhtaransarcloth
 
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdfTay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
mukhtaransarcloth
 
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdfpublicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
mukhtaransarcloth
 
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdfPart-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
mukhtaransarcloth
 
Combustion of glucose is respiration. The equatio.pdf
                     Combustion of glucose is respiration. The equatio.pdf                     Combustion of glucose is respiration. The equatio.pdf
Combustion of glucose is respiration. The equatio.pdf
mukhtaransarcloth
 
iam giving you entire process of  forensc duplication;the response.pdf
iam giving you entire process of  forensc duplication;the response.pdfiam giving you entire process of  forensc duplication;the response.pdf
iam giving you entire process of  forensc duplication;the response.pdf
mukhtaransarcloth
 

More from mukhtaransarcloth (20)

S monoclinic is most stable since entropy is the .pdf
                     S monoclinic is most stable since entropy is the .pdf                     S monoclinic is most stable since entropy is the .pdf
S monoclinic is most stable since entropy is the .pdf
 
Option D is correct. B is limiting reagent .pdf
                     Option D is correct.  B is limiting reagent      .pdf                     Option D is correct.  B is limiting reagent      .pdf
Option D is correct. B is limiting reagent .pdf
 
Let us assume the conc of Ba(OH)2 is known to us .pdf
                     Let us assume the conc of Ba(OH)2 is known to us .pdf                     Let us assume the conc of Ba(OH)2 is known to us .pdf
Let us assume the conc of Ba(OH)2 is known to us .pdf
 
london dispersion forces .pdf
                     london dispersion forces                         .pdf                     london dispersion forces                         .pdf
london dispersion forces .pdf
 
Methods a, b, c, and e are formal additions of H2.pdf
                     Methods a, b, c, and e are formal additions of H2.pdf                     Methods a, b, c, and e are formal additions of H2.pdf
Methods a, b, c, and e are formal additions of H2.pdf
 
h2s4 structure is H-S-S-S-S-H there for two middl.pdf
                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf
h2s4 structure is H-S-S-S-S-H there for two middl.pdf
 
freezing point decreases with increase in imp.pdf
                     freezing point decreases   with  increase  in imp.pdf                     freezing point decreases   with  increase  in imp.pdf
freezing point decreases with increase in imp.pdf
 
We are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdfWe are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdf
 
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdfThe balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
 
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdfTay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
 
E.) is less acidic in other A ,B triple bond an.pdf
                     E.) is less acidic   in other A ,B triple bond an.pdf                     E.) is less acidic   in other A ,B triple bond an.pdf
E.) is less acidic in other A ,B triple bond an.pdf
 
Solution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdfSolution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdf
 
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdfpublicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
 
please give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdfplease give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdf
 
covalent bond .pdf
                     covalent bond                                    .pdf                     covalent bond                                    .pdf
covalent bond .pdf
 
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdfPart-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
 
Peru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdfPeru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdf
 
Combustion of glucose is respiration. The equatio.pdf
                     Combustion of glucose is respiration. The equatio.pdf                     Combustion of glucose is respiration. The equatio.pdf
Combustion of glucose is respiration. The equatio.pdf
 
in truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdfin truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdf
 
iam giving you entire process of  forensc duplication;the response.pdf
iam giving you entire process of  forensc duplication;the response.pdfiam giving you entire process of  forensc duplication;the response.pdf
iam giving you entire process of  forensc duplication;the response.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 

ANS Radio frequency identification (RFID) has been around for dec.pdf

  • 1. ANS : Radio frequency identification (RFID) has been around for decades. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them.A major push came when retailinggiant Wal-Mart dramatically announced that it would require its top 100 suppliers to supply RFID-enabled shipments by January 2005. Though the bottom line story of that deployment has yet to surface, it does seem to support the inevitable movement of inventory tracking and supply chain management toward RFID. CHALLENGES AND ISSUES IN RFID : Although promising, RFID is not without its challenges, which arise from both a technological and usage point of view. Privacy concerns : A common concern with RFID is privacy. It is disconcerting for many people to have their movements or buying habits automatically tracked electronically. Many privacy groups are concerned about the ability to identify people as they walk through a store or shopping center via the tags embedded in their clothing and linked to them at the time of purchase . However, anytime someone automatically stores and tracks personal identification in electronic databases, privacy concerns are very real. RFID tags used in transportation systems—whether for fare collection on mass transit systems or automatic toll payment on bridges and highways—allows for the easy and unprecedented trackingnof movement. If you can pay for products in an RFID tag and companies later bill you automatically, it takes all possible anonymity out of the retail process. Companies and government agencies must address these concerns before the public will truly feel comfortable using RFID systems. People will want to see policies about the use of an RFID system and the information it collects. Security : Security is another key issue in RFID. An organization that implements RFID in its supply chain does not want competitors to track its shipments and inventory. People who use devices that carry personal financial information, such as credit card or other ID numbers, do not want others to access their accounts. These are significant security vulnerabilities in RFID. Some researchers have proposed schemes that would require tags to authenticate readers, transmitting information only to authorized readers.The tags would have to store ID numbers for authorized readers, and a reader would have to broadcast its ID to the tag. To protect the reader’s ID—and prevent others from eavesdropping and stealing the information—the reader uses either a fixed or randomly generated number to hash (encrypt) its ID (Gao and colleagues).
  • 2. Integration with legacy systems : Another challenge to RFID is its integration into existing systems. Several vendors are developing RFID middleware that will link new RFID systems into existing back-end infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If an organization picks a standard that changes or loses its market prevalence, middleware can transform the data from readers into the format supported by back-end systems. WAL-MART: TAKING THE LEAD IN RFID FOR RETAIL : Taking lead in RFID for retail Of the many organizations having implemented RFID,the one that received the most media attention is Wal-Mart. The world’s largest retailer, Wal-Mart has one of the most efficient supply chains in the world. With a large array of suppliers from many different industries,Wal-Mart’s RFID effort has the potential to cause a web of RFID implementations. Solution ANS : Radio frequency identification (RFID) has been around for decades. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them.A major push came when retailinggiant Wal-Mart dramatically announced that it would require its top 100 suppliers to supply RFID-enabled shipments by January 2005. Though the bottom line story of that deployment has yet to surface, it does seem to support the inevitable movement of inventory tracking and supply chain management toward RFID. CHALLENGES AND ISSUES IN RFID : Although promising, RFID is not without its challenges, which arise from both a technological and usage point of view. Privacy concerns : A common concern with RFID is privacy. It is disconcerting for many people to have their movements or buying habits automatically tracked electronically. Many privacy groups are concerned about the ability to identify people as they walk through a store or shopping center via the tags embedded in their clothing and linked to them at the time of purchase . However, anytime someone automatically stores and tracks personal identification in electronic databases, privacy concerns are very real. RFID tags used in transportation systems—whether for fare collection on mass transit systems or automatic toll payment on bridges and highways—allows for the easy and unprecedented trackingnof movement. If you can pay for products in an RFID tag and companies later bill you automatically, it takes all possible anonymity out of the retail process. Companies and government agencies must address these
  • 3. concerns before the public will truly feel comfortable using RFID systems. People will want to see policies about the use of an RFID system and the information it collects. Security : Security is another key issue in RFID. An organization that implements RFID in its supply chain does not want competitors to track its shipments and inventory. People who use devices that carry personal financial information, such as credit card or other ID numbers, do not want others to access their accounts. These are significant security vulnerabilities in RFID. Some researchers have proposed schemes that would require tags to authenticate readers, transmitting information only to authorized readers.The tags would have to store ID numbers for authorized readers, and a reader would have to broadcast its ID to the tag. To protect the reader’s ID—and prevent others from eavesdropping and stealing the information—the reader uses either a fixed or randomly generated number to hash (encrypt) its ID (Gao and colleagues). Integration with legacy systems : Another challenge to RFID is its integration into existing systems. Several vendors are developing RFID middleware that will link new RFID systems into existing back-end infrastructures. Middleware, for example, can help with the current lack of standards in RFID. If an organization picks a standard that changes or loses its market prevalence, middleware can transform the data from readers into the format supported by back-end systems. WAL-MART: TAKING THE LEAD IN RFID FOR RETAIL : Taking lead in RFID for retail Of the many organizations having implemented RFID,the one that received the most media attention is Wal-Mart. The world’s largest retailer, Wal-Mart has one of the most efficient supply chains in the world. With a large array of suppliers from many different industries,Wal-Mart’s RFID effort has the potential to cause a web of RFID implementations.