SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
RFID Based Tracking System
Shahrukh Ayaz Khan
Seminar Presentation
SSBT’s College of Engineering & Technology,
Bambhori, Jalgaon - 425 001, Maharashtra, India
April 10, 2015
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Presentation Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 2/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 3/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Introduction
In last few years RFID technology has become a major
driver for various business like logistics, supply chain
management and acess control
Many of these applications have based on successful
implementations of RFID tags but on reader’s side we
show how semi-passive tags helps implementing and
attacking security enhanced RFID.
It has various security and privacy concerns, which is due
to the inherent vulnerabilities in the architecture of the
RFID system..
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 4/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
What is RFID?
Radio Frequency Identification
Uses Radio Frequency waves to transfer data between a
reader and a tag to identify, categorize, track...
One form of Automatic Identification
RFID is fast reliable and does not require physical sight or
contact between reader/scanner and the tagged item.
Provides unique identification or serial number of an
object (pallets, cases, items, animals, humans
Some of the large companies like Microsoft and Wallmart
are mandating their suppliers to use RFIDs to cut their
warehousing costs and other relating expenses
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 5/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 6/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Why was RFID invented?
Like most technologies used today, RFID got it start from
WWII. The parent technology of RFID is transponder.
Transponders are radio devices that can recieve or send
signals. They are found virtually on all aircrafts and
watercrafts.
In WWII transponders were used as IFF (identify Friend or
Foe) to distinguish Allied Aircraft from enemey ones.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 7/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Key Components of RFID system
A RFID system is made up of two parts: a tag or label and
a reader.
RFID tags or labels are embedded with a transmitter and
a receiver.
The RFID component on the tags have two parts: a
microchip that stores and processes information, and an
antenna to receive and transmit a signal.
RFID Reader is also known an interrogator
Figure: Basic Parts of RFID system
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 8/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
RFID Tag
Figure: RFID TAG
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 9/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Types of tags
Passive: gets energy from reader
Active: battery powered
Semi-passive: battery and energy from reader The
Semi-passive tags are mainly targeted for the security and
privacy attacks
Figure: Use of tags
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 10/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 11/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
How it works?
Figure: Working of RFID
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 12/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
How it Works?
The tag contains the specific serial number for one specific
object.
To read the information encoded on a tag, a two-way
radio transmitter-receiver called an interrogator or reader
emits a signal to the tag using an antenna.
The tag responds with the information written in its
memory bank.
The interrogator will then transmit the read results to an
RFID computer program.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 13/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 14/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Security and Privacy challenges
RFID Tag Cloning Attack :cloning is done by forging the
data from an authentic tag generally into a blank tag
Physical Attack: Any kind of tampering to tag
architecture depending upon intention of attacker
Skimming Attack: Usually done by reading the data of tag
without authorization of tag holder
Spoofing Attack: Attacker try to act like a reader inorder
to interrogate tags
Relay Attack: Attacker acts an Man In Middle between
tag and reader
Denial of Services(DOS) Attack: It involves jamming of
operating frequency of communication channel
Clandestine Tracking: It exploits the ubiquitous nature of
the tag, thus making it a very easy attack prone
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 15/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Sucessful Attacks
HID cards (2007)
Britsh e-Passports(2008)
RFID credit cards(2009)
Sacremento Capitol access cards(2010)
Human Implantable ”VERICHIP”(2010)
Dutch e-Passports(2009)
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 16/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 17/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Some of the Applications
People/Animal tracking
Figure: Animal/ Human Tracking
Manufacturing or Supply chain Management
Figure: Supply Chain Mangement
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 18/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Contd..
Government Issued Machine readable travel documents
Figure: e-Passports
Toll collection and contactless payment
Figure: Toll booth
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 19/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Contd..
Library management
Figure: Library Managing
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 20/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Recent Innovation
Small RFID chip, here compared to a grain of rice, is
incorporated in consumer products, and implanted in pets,
for identification purposes
Figure: Small RFID chip ”Verichip”
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 21/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 22/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Advantages
Inventory efficiency
Vulnerability to damage minimized
Easy to use
High memory capacity
Cannot be easily replicated and therefore, it increases the
security of the product.
Simple to install/inject inside the body of animals/human
beings
Disadvantages
Security concerns like possibility of unauthorized reading of
passports and credit cards
More expensive than barcode system
Unread tags
Doesnt work properly on liquids and metal products.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 23/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 24/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Conclusion
In this research, we identified the various challenges facing
RFID Card, with careful references.
We also highlighted the diverse application areas of the
RFID technology
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 25/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
References
1 D. Anthony, T. Henderson, and D. Kotz, Privacy in
location aware computing environments, IEEE Pervasive
Computing,2009.
2 A. Beresford and F. Stajano, Location privacy in pervasive
computing, IEEE Pervasive Computing, 2011.
3 A. R. Beresford and F. Stajano, Mix zones: User privacy in
location-aware services, in Pervasive Computing and
Communications Workshops (PERCOMW), 2008.
4 J. I. Hong and J. A. Landay, An architecture for privacy
sensitive ubiquitous computing, in International conference
on Mobile systems, applications, and services (MobiSys),
2009.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 26/27
RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Thank You...
ShahrukhA.Khan
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 27/27

Más contenido relacionado

La actualidad más candente

Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Pranav Veerani
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemRajan Bairasriya
 
RFID
RFIDRFID
RFIDdont
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and ApplicationsAnal Mandal
 

La actualidad más candente (20)

Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
RFID
RFID RFID
RFID
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
RFID
RFIDRFID
RFID
 
Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster Smart shopping trolley using rfid and remote control Poster
Smart shopping trolley using rfid and remote control Poster
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection System
 
RFID
RFIDRFID
RFID
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
RFID Asset Tracking ppt
RFID Asset Tracking pptRFID Asset Tracking ppt
RFID Asset Tracking ppt
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 

Destacado

Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfidSaurav Suman
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemShahrikh Khan
 
Asset Tracking Presentation From American Barcode And Rfid
Asset Tracking Presentation From American Barcode And RfidAsset Tracking Presentation From American Barcode And Rfid
Asset Tracking Presentation From American Barcode And RfidAmerican Barcode and RFID
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDMetalcraft Inc
 
IT Asset Tracking with RAIN RFID Demonstration
IT Asset Tracking with RAIN RFID DemonstrationIT Asset Tracking with RAIN RFID Demonstration
IT Asset Tracking with RAIN RFID DemonstrationImpinj RFID
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentImpinj RFID
 
Precision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location SystemsPrecision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location SystemsPeter Batty
 
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...AnalyzeFuture
 

Destacado (13)

CampusBox
CampusBoxCampusBox
CampusBox
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
RFID and Barcode
RFID and BarcodeRFID and Barcode
RFID and Barcode
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfid
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
Asset Tracking Presentation From American Barcode And Rfid
Asset Tracking Presentation From American Barcode And RfidAsset Tracking Presentation From American Barcode And Rfid
Asset Tracking Presentation From American Barcode And Rfid
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFID
 
Equippment management
Equippment managementEquippment management
Equippment management
 
IT Asset Tracking with RAIN RFID Demonstration
IT Asset Tracking with RAIN RFID DemonstrationIT Asset Tracking with RAIN RFID Demonstration
IT Asset Tracking with RAIN RFID Demonstration
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and Equipment
 
Precision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location SystemsPrecision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location Systems
 
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
 
Indoor positioning system
Indoor positioning systemIndoor positioning system
Indoor positioning system
 

Similar a RFID based tracking System

Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)kartik shah
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptfodyy
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfManju Badiger
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
IRJET-Major Challenges in Adoption of RFID for Indian SME’s
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET-Major Challenges in Adoption of RFID for Indian SME’s
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET Journal
 
Battery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTBattery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTFARSENS
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
 
AssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideAssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideGarrett Conti
 
China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...Qianzhan Intelligence
 
China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...Qianzhan Intelligence
 

Similar a RFID based tracking System (20)

Rfid
RfidRfid
Rfid
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)Radio Frequency Identification Chip (RFID)
Radio Frequency Identification Chip (RFID)
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.ppt
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
IRJET-Major Challenges in Adoption of RFID for Indian SME’s
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET-Major Challenges in Adoption of RFID for Indian SME’s
IRJET-Major Challenges in Adoption of RFID for Indian SME’s
 
Prathma main seminar
Prathma main seminarPrathma main seminar
Prathma main seminar
 
Battery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoTBattery-free RFID sensors in the IoT
Battery-free RFID sensors in the IoT
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
AssetWorks RFID Quick Guide
AssetWorks RFID Quick GuideAssetWorks RFID Quick Guide
AssetWorks RFID Quick Guide
 
China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...
 
China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...China rfid industry market forecast and investment strategy planning report, ...
China rfid industry market forecast and investment strategy planning report, ...
 

Último

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 

Último (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

RFID based tracking System

  • 1. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion RFID Based Tracking System Shahrukh Ayaz Khan Seminar Presentation SSBT’s College of Engineering & Technology, Bambhori, Jalgaon - 425 001, Maharashtra, India April 10, 2015 April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27
  • 2. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Presentation Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 2/27
  • 3. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 3/27
  • 4. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Introduction In last few years RFID technology has become a major driver for various business like logistics, supply chain management and acess control Many of these applications have based on successful implementations of RFID tags but on reader’s side we show how semi-passive tags helps implementing and attacking security enhanced RFID. It has various security and privacy concerns, which is due to the inherent vulnerabilities in the architecture of the RFID system.. April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 4/27
  • 5. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion What is RFID? Radio Frequency Identification Uses Radio Frequency waves to transfer data between a reader and a tag to identify, categorize, track... One form of Automatic Identification RFID is fast reliable and does not require physical sight or contact between reader/scanner and the tagged item. Provides unique identification or serial number of an object (pallets, cases, items, animals, humans Some of the large companies like Microsoft and Wallmart are mandating their suppliers to use RFIDs to cut their warehousing costs and other relating expenses April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 5/27
  • 6. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 6/27
  • 7. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Why was RFID invented? Like most technologies used today, RFID got it start from WWII. The parent technology of RFID is transponder. Transponders are radio devices that can recieve or send signals. They are found virtually on all aircrafts and watercrafts. In WWII transponders were used as IFF (identify Friend or Foe) to distinguish Allied Aircraft from enemey ones. April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 7/27
  • 8. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Key Components of RFID system A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are embedded with a transmitter and a receiver. The RFID component on the tags have two parts: a microchip that stores and processes information, and an antenna to receive and transmit a signal. RFID Reader is also known an interrogator Figure: Basic Parts of RFID system April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 8/27
  • 9. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion RFID Tag Figure: RFID TAG April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 9/27
  • 10. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Types of tags Passive: gets energy from reader Active: battery powered Semi-passive: battery and energy from reader The Semi-passive tags are mainly targeted for the security and privacy attacks Figure: Use of tags April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 10/27
  • 11. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 11/27
  • 12. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion How it works? Figure: Working of RFID April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 12/27
  • 13. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion How it Works? The tag contains the specific serial number for one specific object. To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator or reader emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The interrogator will then transmit the read results to an RFID computer program. April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 13/27
  • 14. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 14/27
  • 15. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Security and Privacy challenges RFID Tag Cloning Attack :cloning is done by forging the data from an authentic tag generally into a blank tag Physical Attack: Any kind of tampering to tag architecture depending upon intention of attacker Skimming Attack: Usually done by reading the data of tag without authorization of tag holder Spoofing Attack: Attacker try to act like a reader inorder to interrogate tags Relay Attack: Attacker acts an Man In Middle between tag and reader Denial of Services(DOS) Attack: It involves jamming of operating frequency of communication channel Clandestine Tracking: It exploits the ubiquitous nature of the tag, thus making it a very easy attack prone April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 15/27
  • 16. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Sucessful Attacks HID cards (2007) Britsh e-Passports(2008) RFID credit cards(2009) Sacremento Capitol access cards(2010) Human Implantable ”VERICHIP”(2010) Dutch e-Passports(2009) April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 16/27
  • 17. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 17/27
  • 18. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Some of the Applications People/Animal tracking Figure: Animal/ Human Tracking Manufacturing or Supply chain Management Figure: Supply Chain Mangement April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 18/27
  • 19. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Contd.. Government Issued Machine readable travel documents Figure: e-Passports Toll collection and contactless payment Figure: Toll booth April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 19/27
  • 20. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Contd.. Library management Figure: Library Managing April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 20/27
  • 21. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Recent Innovation Small RFID chip, here compared to a grain of rice, is incorporated in consumer products, and implanted in pets, for identification purposes Figure: Small RFID chip ”Verichip” April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 21/27
  • 22. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 22/27
  • 23. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Advantages Inventory efficiency Vulnerability to damage minimized Easy to use High memory capacity Cannot be easily replicated and therefore, it increases the security of the product. Simple to install/inject inside the body of animals/human beings Disadvantages Security concerns like possibility of unauthorized reading of passports and credit cards More expensive than barcode system Unread tags Doesnt work properly on liquids and metal products. April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 23/27
  • 24. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Outline 1 Introduction 2 The Basics 3 Working of RFID 4 Concerns 5 Applications 6 Pros and Cons 7 Conclusion April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 24/27
  • 25. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Conclusion In this research, we identified the various challenges facing RFID Card, with careful references. We also highlighted the diverse application areas of the RFID technology April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 25/27
  • 26. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion References 1 D. Anthony, T. Henderson, and D. Kotz, Privacy in location aware computing environments, IEEE Pervasive Computing,2009. 2 A. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, 2011. 3 A. R. Beresford and F. Stajano, Mix zones: User privacy in location-aware services, in Pervasive Computing and Communications Workshops (PERCOMW), 2008. 4 J. I. Hong and J. A. Landay, An architecture for privacy sensitive ubiquitous computing, in International conference on Mobile systems, applications, and services (MobiSys), 2009. April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 26/27
  • 27. RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion Thank You... ShahrukhA.Khan April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 27/27