Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

RFID Technology: Understanding the Future of Contactless Identification, Study notes of School management&administration

Rfid (radio-frequency identification) is a wireless non-contact technology used for value-added identification and tracking applications. The basics of rfid, how it works, its applications, and the privacy concerns associated with it.

Typology: Study notes

Pre 2010

Uploaded on 09/17/2009

koofers-user-zfh
koofers-user-zfh 🇺🇸

10 documents

1 / 6

Toggle sidebar

Related documents


Partial preview of the text

Download RFID Technology: Understanding the Future of Contactless Identification and more Study notes School management&administration in PDF only on Docsity! 1 RF ID EJ Jung 12/07/06 What is RFID? Radio-Frequency Identification Tag Chip Antenna 2 How Does RFID Work? Tags (transponders) Attached to objects, “call out” identifying data on a special radio frequency 02.3DFEX4.78AF51 EasyToll card #816 Reader (transceiver) Reads data off the tags without direct contact Radio signal (contactless) Range: from 3-5 inches to 3 yards Database Matches tag IDs to physical objects RFID is the Barcode of the Future Barcode RFID Line-of-sight reading • Reader must be looking at the barcode Specifies object type • E.g., “I am a pack of Juicy Fruit” Reading by radio contact • Reader can be anywhere within range Specifies unique object id • E.g., “I am a pack of Juicy Fruit #86715-A” Fast, automated scanning (object doesn’t have to leave pocket, shelf or container) Can look up this object in the database 5 Risks Personal privacy • FDA recommended tagging drugs with RFID “pedigrees”; ECB planned to add RFID tags to euro banknotes… – I’ll furtively scan your briefcase and learn how much cash you are carrying and which prescription medications you are taking Skimming: read your tag and make my own • In February 2005, JHU-RSA Labs team skimmed and cloned Texas Instruments’ RFID device used in car anti- theft protection and SpeedPass gas station tokens Corporate espionage • Track your competitor’s inventory RFID Tag Power Sources Passive (this is what mostly used now) • Tags are inactive until the reader’s interrogation signal “wakes” them up • Cheap, but short range only Semi-passive • On-board battery, but cannot initiate communication – Can serve as sensors, collect information from environment: for example, “smart dust” for military applications • More expensive, longer range Active • On-board battery, can initiate communication 6 RFID Capabilities No or very limited power Little memory • Static 64- or 128-bit identifier in current 5-cent tags Little computational power • A few thousand gates at most • Static keys for read/write access control Not enough resources to support public- or symmetric-key cryptography • Cannot support modular arithmetic (RSA, DSS), elliptic curves, DES, AES; hash functions are barely feasible – Recent progress on putting AES on RFID tags Blocking Unwanted Scanning Kill tag after purchase • Special command permanently de-activates tag after the product is purchased • Disables many futuristic applications Faraday cage • Container made of foil or metal mesh, impenetrable by radio signals of certain frequencies – Shoplifters are already known to use foil-lined bags • Maybe works for a wallet, but huge hassle in general Active jamming • Disables all RFID, including legitimate applications
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved