r. f .i. d technology

Upload: rajan

Post on 30-May-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 R. F .I. D Technology

    1/21

    RFID

    . .ro ra ja n h it@ g m a il co

  • 8/14/2019 R. F .I. D Technology

    2/21

    RADIO FREQUENCY IDENTIFICATION?

    RFID is a system that facilitates the tracking Of, ,objects primarily for inventory tracking via a three

    ,part technology comprised of a reader a decoder host( ).and a transponder RF tag RFID is a wireless system

    that works in conjunction with an organization sinformation technology infrastructure to improve

    business processes such as inventory management andefficienc in su l chain mana ement

  • 8/14/2019 R. F .I. D Technology

    3/21

    RFID System Components

    RFID Tag(Transponder)o Also known as a ,transponder the tag consists of a silicon chip

    RFID Reader(Transceiver)o , ,Consist of a RF module a control unit and a coupling element t

    interrogate tags via RF communicationo Also have secondary interface to communicate with backend systemso Reads tags located in hostile environment

    Data Processing Subsystem(Host)o -Connected via high speed networko Database storage

  • 8/14/2019 R. F .I. D Technology

    4/21

    . . . . .HOW RFID WORKS?

    SN1234568

    Tag

    Reader

    Host

    http://www1.euro.dell.com/content/products/compare.aspx/dimen?c=uk&l=en&s=dfh
  • 8/14/2019 R. F .I. D Technology

    5/21

    TAGS

    Key holder

    Clock Plastic

    card

    Small box Plastic pin Roll of smartlabels

  • 8/14/2019 R. F .I. D Technology

    6/21

    TYPES OF TAGS

    Active tags Passive tags

    Power Battery Supplied by the reader

    Availability of power Continuous Only in field of reader

    Range ~100m up to 3-5m, usually less

    Price 10-100 euro less than 10 eurocentsMemory 1-2Mb 0.5-2Kb

    Size > 2cm > 0.05mm

    .Tags can be passive or active An active tag,contains some type of power source on the tag

    whereas the passive tags rely on the radio signal.sent by the reader for power Most RFIDapplications today utilize passive tags because

    .they are so much cheaper to manufacture

  • 8/14/2019 R. F .I. D Technology

    7/21

    ;RFID tags can be read at much greater distances an RFID reader can.pull information from a tag at distances up to 300 feet The range, .to read a barcode is much less typically no more than fifteen feet

    IFFFERENCE BETWEEN tags AND Barcode

    . , , / ;inted barcode RFID tags however can be read write devices the RFID re

    ;o the printed barcode RFID readers do not require a direct line of sig

    .RFID tags and barcodes both carry information about products

    ,However there are important differences between these twotechnologies:

    , ,RFID tags are typically more expensive than barcodes in some cases much more

    APPLICATION OF RFID TECHNOLOGY IN A PORT

  • 8/14/2019 R. F .I. D Technology

    8/21

    APPLICATION OF RFID TECHNOLOGY IN A PORT

    /The primary advantage to RFID in a port terminal application is that it is . ,an automatic data collection technology That is no operator

    ,intervention or action is required Whereas other forms of data collection,whether bar code or manual methods depend on employees to record

    .information

    :The two direct benefits of this are

  • 8/14/2019 R. F .I. D Technology

    9/21

    Cont...

    There are five major areas where RFID can be effectively used in a port car:terminal

    q ;Access Control

    qq ;Container Securityqq ;Container Identification and Locationqq ;Activity Tracking

    qq Regulatory Compliance

  • 8/14/2019 R. F .I. D Technology

    10/21

    Access Control

    q EMPLOYEES IDqq

    q VEHICLE CONTROL

    CONTAINER IDENTIFICATION AND LOCATION

  • 8/14/2019 R. F .I. D Technology

    11/21

    CONTAINER IDENTIFICATION AND LOCATION

    CONTAINER TAGGING LOCATION TRACKING

  • 8/14/2019 R. F .I. D Technology

    12/21

    Container SecuritY Activity Tracking

    .Regulatory Compliance

    USES OF RFID IN OTHER AREAS

  • 8/14/2019 R. F .I. D Technology

    13/21

    USES OF RFID IN OTHER AREAS

    New British passp

    Animal identification

    Dutch library reader sStockidentification

    o ,Animal tracking tags inserted, - .beneath the skin can be rice sized

    o

    o -Credit card shaped for use in access.applications

    o

    o -The anti theft hard plastic tagsattached to merchandise in stores are

    .also RFID tagso

  • 8/14/2019 R. F .I. D Technology

    14/21

    se of RFID for Human Identification

    Miners or firefighters might be appropriately identified using RFID because

    .of identification is at a premium in dangerous situations

    Facilities managers use identification to control access to sensitive.infrastructures that may be damaged or used to harm They use it to control

    access to facilities where sensitive information about other infrastructure

    , .may be kept or where security planning or operations are carried out

    :2004 The attorney general of Mexicoand 18 of his staff had chips- .implanted to allow them to gain access to certain high security areas

    :2006 President of Colombia

    :agree to require Colombian citizens to be

    implanted with RFID chips before they could gain entry into the US forseasonal work

    :2008 UK jails considering RFID implants for prisoners

    Thi g th t g g

  • 8/14/2019 R. F .I. D Technology

    15/21

    Things that can go wrong

    Skimming-The envelope contains a hermetically sealed RFID enabled

    .credit card Malicious reader can extract the information as

    - .the envelope is not necessarily RF hermetic Can be a problem.if mailboxes can be easily accessed

    Tag cloningJamming

    jamming attack, where an adversary blocks all RF channels between reader

  • 8/14/2019 R. F .I. D Technology

    16/21

    Recent Developments in RFID

    , , ,Companies like Microsoft IBM and Philips Electronics which recently,made product enhancement announcement in this area are also

    . , , , ,participants in the industry IBM in Armonk New York and Philips in, ,Amsterdam will team on RFID for supply chain management retail and

    , , -asset management as well as smart card technology for finance e, .government transportation and event ticketing

    - , , Wal Mart the world s second largest company is deploying RFID.technology in its stores

    The US Defense Department recently announced it would require its suppliers( )to use wirelesstagsbased on radio frequency identification RFID

    technology

  • 8/14/2019 R. F .I. D Technology

    17/21

    Positive trendsq - .Degines of RFID are improving day by dayqq Cost of RFID decreases as capablity and funtionality expand

    qq .Expanding capablities of RFIDq

  • 8/14/2019 R. F .I. D Technology

    18/21

    enefits ASSOCIATED WITH PORT USING RFIDq Consistently monitor container security and

    .integrity

    q .Speed shipments through the supply chainq Verify that a container was loaded at a secure

    .loading pointq Gather enough data to conduct a virtual

    .inspection in advance of arrivalq Guarantee that shipping containers meet

    .governmental security regulationsq Receive fast track or green lane handling through

    /customs at the point of dispatch and or the point

    .of receipt

    q Avoid extensive delays in the shipment and receipt.

  • 8/14/2019 R. F .I. D Technology

    19/21

    Conclusion

    Most of the Ports around the World is using thisTechnology for betterment

    RFID Technology is coming faster than what wethought

    RFID is a boom for Port and Shipping Industry If properly used it provides a Greater Landmark for

    &Port Shipping Sector

  • 8/14/2019 R. F .I. D Technology

    20/21

    Suggestions...

    o Individuals should be able to turn off any RFID signal

    .associated with tracking their presence or activities Where,possible they also should have the option not to participatea program involving the use of RFID technology to track

    .their movements

    o

    o

    o ,Ensure that only authorized readers can read the tags and that;only authorized personnel have access to the readers

    o

    o /Avoid electronic collisions when multiple tags and or readers

    are present;o

    o Maintain the integrity of the data on the chip and stored in;the database

    o

    o

    Private tag contents should be protected by access control and

    encryption

    Should be very cheap

  • 8/14/2019 R. F .I. D Technology

    21/21

    Thank you

    Questions?

    j h it@ il