This document discusses the use of RFID technology for human implantation and addresses privacy issues. It provides background on RFID technology and its use for tracking items and in various industries. The document then discusses potential uses of RFID chips implanted in humans, including medical applications and assisting disabled people. However, it also notes privacy and security issues with human implantation, such as tracking location and accessing private information. The goal of the research presented is to develop methods and a framework to address the privacy issues surrounding RFID chips implanted in humans to enhance security while allowing for beneficial applications of the technology.
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
Â
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between userexperience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
Â
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Â
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
Â
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between userexperience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
Â
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Â
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
The Internet of Things (IoT) integrates various sensors, objects and smart nodes that are capable of communicating with each other without human intervention.
The IoT Forensics could be perceived as a subdivision of the Digital Forensics. IoT Forensics is a relatively new and unexplored area. The purpose of the IoT Forensics is similar to the one of the Digital Forensics, which is to identify and extract digital information in a legal and forensically sound manner.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
Â
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
Security Issues and Challenges in Internet of Things â A ReviewIJERA Editor
Â
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
A novel integrated approach for handling anomalies in RFID dataijujournal
Â
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
The Internet of Things (IoT) integrates various sensors, objects and smart nodes that are capable of communicating with each other without human intervention.
The IoT Forensics could be perceived as a subdivision of the Digital Forensics. IoT Forensics is a relatively new and unexplored area. The purpose of the IoT Forensics is similar to the one of the Digital Forensics, which is to identify and extract digital information in a legal and forensically sound manner.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
Â
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
Security Issues and Challenges in Internet of Things â A ReviewIJERA Editor
Â
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
Â
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
A novel integrated approach for handling anomalies in RFID dataijujournal
Â
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
International Journal of Business and Management Invention (IJBMI) inventionjournals
Â
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Radio Frequency Identification RFID is a programmed innovation and helps machines or PCs to distinguish objects, record metadata or control singular focus through radio waves. Associating RFID reader to the terminal of Internet, the reader can distinguish, track and screen the articles appended with labels all inclusive, consequently, and progressively, if necessary. This is the supposed Internet of Things IOT . Radio Frequency Identification RFID is an innovation that utilizes correspondence through electromagnetic waves to trade information between a terminal and an electronic label joined to an article, with the end goal of ID and tracking Sapna Yadav | Pratibha Jha ""RFID Technology: An Overview"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23247.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23247/rfid-technology-an-overview/sapna-yadav
1. Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
79
A Sector Analysis for Rfid Human Implantation: Technical
Analyses for Privacy Enhancing Techniques
Muhammad Habib
yahabebi@ymail.com
Abstract
Radio Frequency Identification (RFID) has produced a lot of attention in replacing the barcode with microchip.
This interdisciplinary research aims to undertake a scoping study of emerged technology serving the security
purposes of devices, infrastructures and human utilization. The study aims to address the key areas of
widespread RFID implementation, its control over the applied widgets and the effective improvement in the
protection measures like owner tracking and cloning. As a part of research an attempt will be taken toward
discussion on security framework to improve the model of smart environment eliminating the privacy loopholes.
To enhance the real time security structure the Origins of RFID Microchips are essential to be discussed for the
application in several sectors like logistics and health care industries. The study will contribute to develop
methods and procedures to re-plane the RFID control system, as well as mark other privacy issues which arise in
operations.
INTRODUCTION
Radio Frequency Identification (RFID) technology had humble beginnings in WWII in flying industries, Allied
airplanes as well as to track nuclear material and in Australia its being in use by veterinary industry (NLIS) at
large scale [1]. Technology then took another jump and currently used in logistics and supply chain management
to track the items. Broadly the RFID tags are classified in three categories Active tag, Passive tag and Semi-
Passive tags.
The ultimate aim of this research is to contribute to the existing technology of RFID, a microchip
having the ability to transmit static identity at the short distance: short distance is due to low power of emitting
electromagnetic waves. Extensive research has been done to serve the humanity medically with RFID
technology. The prosthetic use of microchips can progress scientifically, assist people to hear better, help the
handicaps and possibly can facilitate the paralyzed people to move [2]. The human embedding microchip
technology is available which
implant the chips under the controlled application methods though some issues arises in its functional
security framework as well as in the control application concerns. The issues include, tracking the personâs
location at exact coordinates, habitual changes in action at security access point, the privacy concerns as well as
the hacking personnel information and access to the secured data illegally. The security problems in the RFID
are complex in nature. The undergone research will contribute to steadfast all the significant issue related to the
Microchip implementation methodology, its operational measures and all the intensive security issues.
LITERATURE REVIEW
Radio Frequency Identification (RFID) technology began in World War II with an "Early Identification Friend
(IFF) systems where it was possible for Allied fighters and anti-aircraft systems to distinguish their own
returning bombers from aircraft sent by the enemyââ [3]. All along with the benefits of the Micro chipping there
are also some potential health problems as well. For example the major effects of radio waves can harm in a
dangerous way where Non-lionizing Radiation from microwave radio frequency and magnetic fields can also
cause of various health issues [4]. Within the medical field there are different ways that RFID can be
incorporated. For example RFID chips can be used to track equipment within a hospital. Wristbands with an
RFID chip embedded can help hospitals with patient safety requirements. Medical personnel can read the chip to
get instant access to the patients' medical history such has medication allergies, medications prescribed and
dosage, and specimen results [5].
One example of the Neuro electronic Interface being used is with a paraplegic named John Nagle.
"Nagle showed an ability to perform a number of tasks with his mind: control a TV, move a mouse cursor on a
screen, and command an artificial hand to open and close grip" [6]. There are limitations at this time for the
Neuro-electronic Interface for RFID chip usage in human. The first is the amount of neurons available for the
device. The fewer amounts of neurons there are will result the less likely the device work performance. There is
health risks associated with the human being implanted with a microchip. Some health issues include "adverse
tissue reaction, migration of implanted transponder, electromagnetic interference, electrical hazards, and
magnetic resonance imaging incompatibility" [7]. The majority of RFID applications have centered on firms
increasing efficiencies in the supplier management process, which ultimately results in lowered costs. However,
RFID is also currently being used by logistic service companies in order to enhance the service effectiveness to
2. Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
80
the customer, thus enhancing the overall value perception. Instead of focusing on efficiencies of supplier
relationships for manufacturers, these service firms seek to employ the technology to generate additional value
for the customer [8].
RESEARCH OBJECT IVES
Using the undergone privacy problems in operations, applications and their analysis (Objective 1), previous
literature for concepts and ideas regarding RFID data secrecy measures, the set of design implications (Objective
2), the design of security frameworks covering existing threats to transmit information (Objective 3) and
identifying categorical RFID implementation areas (Objective 4), it will be explore the possibility of developing
a generalized framework in human implantation and its privacy matters that can be applied to the design of RFID
systems to support co-located collaborations. However, if we find that the said framework formulation will
require substantial extension of the research effort, we may decide to leave it open as a future research endeavor.
PROBLEM STATEMENT
The major challenges arises round the globe regarding RFID (Radio Frequency Identification) technology are its
data privacy which results location tracking and harmful for secret information to be snatched. In the same way
human embedded microchip is also traced during transmitting data from chip to application database which
results to locate the person. These issues provide a strong resistance to the technology and its performance
capabilities. In context of these issues the research theme designs the privacy framework and the operational
methodology which helps the technology to excel and be applicable within and across the domains diversely
with steadfast its performance.
RESEARCH GOALS
G1. Uncertainty control mechanism occurring in RFID data.
G2. How to effectively utilize the RFID for human intensive care purposes? Radical application to
respond and transmit data on demand (operational features of Active tags)
G3. Implementation of the proposed novel privacy framework for RFID
G4. What are the countermeasures to conceal the RFID Tag Existence?
G5. How to effectively utilize the time gap when the RFID reader is waiting for the RFID tag to respond to
an earlier transmitted command after pre-computation of one or more commands and what technique
to apply in such a realistic scenario?
RESEARCH GAPS
The RFID technology is an emerging area of research and still it is on its initial adoption phases yet facing
several research gaps which has to be addressed. The gaps are existed between the performance of RFID systems
and its associated issues. Due to various real time uncertainty limitations in such systems, the Faraday Cage (to
wrap up the Tag with foil) technique preventing to intercept electromagnetic waves, i.e, ID-Queries, in order to
prevent the tag from emitting response to reader. The soft computing practices like fuzzy logic (to map the real-
world uncertainty), Complex security schemes (Hash Locking/Kill Commands), Countermeasures to emit extra
data (Jamming) techniques are yet to be applied to such systems in order to effectively address the problems in
existing RFID systems leading to enhanced privacy and performance.
RESEARCH DESIGN & METHODOLOGY
The research process for this study will involve distinct phases. First, an extensive literature review will be
carried out within innovation-adoption by the target sector and RFID domain. Based on literature, particularly
dealing with organizational adoption, an initial research model will be developed. In the secondary research
phase, the tentative privacy framework will be designed based on synthesis of existing research. The indicators
of âuncertaintyâ (data uncertainty, demand uncertainty, and technology uncertainty) are not necessarily correlated
among each other; rather they form the construct [9].
TIME FRAME AND RESOURCES
The approximate time required for the completion of research is about 3-4 years which includes the theoretical
studies and the experimental work to be prepared. Fifty percent of time will be spent on research and reading
relevant material and ten percent of time will be utilized in sorting and marking the research findings and
remaining forty percent of time will be spent for writing, formatting and documenting under the potential
supervision. There are few experimental resources like RFID tags (Active and Passive), RFID readers and
software, which could be sorted out according to the supervision suggestions.
3. Innovative Systems Design and Engineering www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol.5, No.10, 2014
81
REFERENCES
[1]. Tonsor, G.T., Schroeder, T.C., 2006. Livestock identification: Lessons for the U.S. Beef Industry
from the Australian System. Journal of International Food & Agribusiness Marketing 18(3/4), 1 03-
118.
[2]. Charles, Techonal J., Manag, 2008. Human Microchip Implantation. Journal of Technology
Management & Innovation 08(3/3)151-1 60.
[3]. GARFINKEL, S., Holtzman, H. (2005) Understanding RFID Technology. Pg. 15-16. Garfinkel
Book [Links]
[4]. COVACIO, S. (2003) Technological Problems Associated with Subcutaneous Microchips for Human
Identification (SMHId). Informing Science. [Links]
[5]. CASTRO, L, Wamba, S.F. (2007) An Inside LookAt RFID Technology. Journal of
Technology and lnnovation,Volume 2, Issue I. Pg.4. [Links]
[6]. CHAN, E. (2007) The FDA and the Future of the Brain-Computer Interface: Adapting FDA Device Law
to the Challenges of Human-Machine Enhancement. John Marshall Journal of Computer & Information
Law Volume 25 Issue I. Pg. 13, 16, 24. http://works.bepress.com/eric_chan/1/. Retrieved 11-02-07 [Links]
[7]. GAD, L. (2006) Human Microchip Implantation. Wisconsin Legislative Reference Bureau. Pg.
1.www.legis.state.wi.us/lrb. Retrieved 9-28-07. [Links]
[8]. Leea, L.S., Fiedlera, K.D. and Smithb, J.S. (2008), âRadio frequency identification (RFID)
implementation in the service sector: A customer-facing diffusion modelâ, Int. J. Production Economics,
112, 587â600.
[9]. Teo, H.H., Wei, K.K., Benbasat, I., 2003. Predicting intention to adopt interorganizational linkages:
An institutional perspective. MIS Quarterly 27(1), 19-49.
4. Business, Economics, Finance and Management Journals PAPER SUBMISSION EMAIL
European Journal of Business and Management EJBM@iiste.org
Research Journal of Finance and Accounting RJFA@iiste.org
Journal of Economics and Sustainable Development JESD@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Industrial Engineering Letters IEL@iiste.org
Physical Sciences, Mathematics and Chemistry Journals PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Journal of Mathematical Theory and Modeling MTM@iiste.org
Advances in Physics Theories and Applications APTA@iiste.org
Chemical and Process Engineering Research CPER@iiste.org
Engineering, Technology and Systems Journals PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems CEIS@iiste.org
Innovative Systems Design and Engineering ISDE@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Control Theory and Informatics CTI@iiste.org
Journal of Information Engineering and Applications JIEA@iiste.org
Industrial Engineering Letters IEL@iiste.org
Journal of Network and Complex Systems NCS@iiste.org
Environment, Civil, Materials Sciences Journals PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science JEES@iiste.org
Journal of Civil and Environmental Research CER@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL
Advances in Life Science and Technology ALST@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare JBAH@iiste.org
Journal of Food Science and Quality Management FSQM@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Education, and other Social Sciences PAPER SUBMISSION EMAIL
Journal of Education and Practice JEP@iiste.org
Journal of Law, Policy and Globalization JLPG@iiste.org
Journal of New Media and Mass Communication NMMC@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Historical Research Letter HRL@iiste.org
Public Policy and Administration Research PPAR@iiste.org
International Affairs and Global Strategy IAGS@iiste.org
Research on Humanities and Social Sciences RHSS@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Journal of Arts and Design Studies ADS@iiste.org
5. The IISTE is a pioneer in the Open-Access hosting service and academic event management.
The aim of the firm is Accelerating Global Knowledge Sharing.
More information about the firm can be found on the homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
There are more than 30 peer-reviewed academic journals hosted under the hosting platform.
Prospective authors of journals can find the submission instruction on the following
page: http://www.iiste.org/journals/ All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than those
inseparable from gaining access to the internet itself. Paper version of the journals is also
available upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek
EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar