30
Radio Frequency I dentification (RFI D) Judy Chen

Judy Chen

Embed Size (px)

Citation preview

Page 1: Judy Chen

Radio Frequency

Identification

(RFID)Judy Chen

Page 2: Judy Chen

Outline

• Overview• Taxonomy• Technical details• Applications• Privacy and security• Challenges and controversy• Current research

Page 3: Judy Chen

What is RFID?

• Radio Frequency Identification• Identification system that consists of

chip-based tags and readers• Data is stored and retrieved remotely

using radio waves– Onboard sensors– Product information

Page 4: Judy Chen

Components of an RFID

system

Page 5: Judy Chen

Layout of a transponder

Page 6: Judy Chen

Taxonomy

**insert figure 2.1 (pg. 12)

Page 7: Judy Chen

Operation type

• Full and half duplex systems– Transponder’s response is broadcast when

the reader’s RF field is switched on

• Sequential procedure– Reader’s RF field is periodically switched off– Loss of power during breaks– Need auxiliary capacitors or batteries

Page 8: Judy Chen

Data capacity

• Normal range is from a few bytes to several kilobytes

• 1-bit transponders– Useful for simple monitoring– Low cost

Page 9: Judy Chen

Read only vs writeable

• Electrically erasable programmable read-only memory (EEPROM)– High power consumption– Limited number of write cycle

• Ferromagnetic random access memory (FRAM)– Lower power consumption

• Static random access memory (SRAM)– Rapid write cycles– Needs power supply for data retention

Page 10: Judy Chen

Power supply

• Passive– Require no internal power source or

maintenance– Tag reader is responsible for power

• Active– Require a power source– More reliable and efficient in rugged

environments

Page 11: Judy Chen

Frequencies of operation

• Low frequency – 30-300 kHz– Tags need to be closer to the reader– Poor discrimination

• High frequency/radio frequency– 3-30 MHz– Tags can be read from relatively greater distances– Tags can hold more information

• Ultra high frequency/microwave– >300 MHz– Longest range– More interference

Page 12: Judy Chen

Technical details

Page 13: Judy Chen
Page 14: Judy Chen

Applications

• Keyless entry• Electronic Product Code (EPC)• Proximity cards

Page 15: Judy Chen

Applications (cont’d)

• Payment tokens– Contact-less credit cards– Automatic toll-payment

• Euro banknotes• Passports

Page 16: Judy Chen

Applications (cont’d)

• Libraries• Security device

– Bookstores

Page 17: Judy Chen

More applications

• Animal and human implantation– Avid– Pet-ID– VeriChip

• RFID-privacy legislation– REAL ID Act

Page 18: Judy Chen

Privacy Concerns

• Clandestine tracking• Inventorying

Page 19: Judy Chen

Protecting Privacy

• Kill function• Normal tags

– Prevents unauthorized readings– Blocks electric waves– Jamming and interference

• Smart tags– Rewritable memory– Anonymous-ID scheme– Lightweight circuits

» Hash-function circuit

Page 20: Judy Chen

Other challenges and

concerns• Big Brother is watching• Worker displacement• Dependent on orientation• Blocked signals• Cost• No standard

Page 21: Judy Chen

4 requirements for

consumer use• Notify the consumer• Visible and easily removable tags• Disabled at point of sale• Tag the product’s packaging

Page 22: Judy Chen

Benetton Controversy

Page 23: Judy Chen

Smart-shelf system

Page 24: Judy Chen

Current Research

• Trevor Pering (automatic configuration)• Eric Dishman (memory impairment)• PSA Corporation, Hutchinson-Whampoa,

P&O (anti-terrorism)

Page 25: Judy Chen

SmartMoveX

• Low cost active badge system• A small radio transmitter is attached to

the person being tracked• Receivers are placed around the

building– Measure the RF signal strength from badge

transmissions to compute locations– Average error within 3.05 meters

Page 26: Judy Chen

Proactive Computing

• David Tennenhouse• Systems anticipate what we need • We do little to nothing• Networks of RFID readers will be

everywhere– Permanent and connected by cables – Ad hoc wireless network

Page 27: Judy Chen

More open research

issues• Rogue scanning and eavesdropping

– Nominal read range– Rogue scanning range– Tag-to-reader eavesdropping– Reader-to-tag eavesdropping

Page 28: Judy Chen

Open research issues

(cont’d)• Authentication• Denial of service

Page 29: Judy Chen

Conclusion

• RFID has many potential uses• Likely to play a key technological role• Perceptions of privacy and security vary• Privacy and security concerns must be

addressed

Page 30: Judy Chen

References

• Ohkubo, M., Suzuki, K., and Kinoshita, S. RFID privacy issues and technical challenges. Communications of the ACM, ACM Press (2005), 66-71.

• Want, R. RFID: A key to automating everything. Scientific American, 2003, 56-65.

• Juels, A. RFID security and privacy: A research survey. To appear in Proc. Of IEEE JSAC’06.

• Want, R. An introduction to RFID Technology. IEEE Pervasive Computing, 2006, 25-33.

• Wikipedia. http://en.wikipedia.org/wiki/RFID .• Finkenzeller, K. RFID Handbook. West Sussex, England:

Wiley, 2003.• CNET News.

http://news.com.com/2100-1017_3-1023934.html .• Krumm, J., Williams, L., and Smith, G. SmartMoveX on

a graph: An inexpensive active badge tracker. UbiComp, Springer-Verlag (2002), 299-307.