This presentation provides an overview of RFID (radio frequency identification) technology. It defines RFID as using radio frequency tags to identify objects via radio waves. The presentation describes the basic components of an RFID system including tags, readers, and antennas. It discusses the history of RFID and barcodes and provides examples of current RFID applications in areas like inventory tracking, building access, toll collection, and smart appliances. Both advantages like automatic identification and disadvantages like privacy concerns are outlined. Regulations surrounding RFID are also briefly addressed before concluding with predictions about the continued growth and standardization of RFID technology.
RFID Presentation Overview, Applications, Advantages & Concerns
1. M A N A G E M E N T I N F O R M A T I O N S Y S T E M
PRESENTATION
ON
RFID
4/20/2014
1
2. Overview
What is RFID?
Brief History
How RFID Works
Current Applications
Future Applications
Potential Research
Advantages and Disadvantages
Privacy concern
Regulations
Conclusion
4/20/2014
2
3. What is RFID?
RFID is an acronym for radio frequency
identification.
Briefly the RF stand for “radio-frequency” and ID
means “identifier” that allows an item,
The use of radio frequency tags to identify real
objects, for instance a library book, to be identified,
accessed, stored, reprogrammed and communicated
by using radio waves
4/20/2014
3
4. Brief History
First Bar code patents – 1930s
First use of RFID device – 2nd world war – Britain used
RFID-like technology for Identify- Friend or Foe
Commercial Operation begun from 1960’s …
In 1970s developers, inventors, companies, academic
institution and government sectors were actively worked
on RFID
Most common application were tracked person and
objects, identified goods in supply chain, reusable
container, high value tools, security, controlling access to
building, networks, payment systems and other assets.
4/20/2014
4
5. Identification Examples
Bar Codes
License Plates
Social Security Numbers
Student ID
Serial Numbers
Car Keys
Database Keys
4/20/2014
5
6. How Does RFID Work?
3 Components
Transceiver – Tag Reader
Transponder – RFID tag
Antenna
4/20/2014
6
9. Passive Tags Active Tags
No battery: passive
tags use the incoming
signal through
induction
Passive tags only
function in the closer
range (at the most a
few meters).
Low cost: Generally,
$0.15 to $5.00
Active tags are powered
by batteries.
Longer range (100m+)
High cost: Generally,
$15 to $100
Types of Tags
4/20/2014
9
10. RFID Applications
Tracking Books in Libraries
Inventory Tracking:
Walmart required it of their
top 100 vendors
Authorized building access
(Prox Cards)
Passports (US passports
recently)
AmEx Blue credit card
Prison inmates (embedded)
Livestock Tagging
Passive / Secure Entry
Airline Baggage Tracking
Postal Package Tracking
Time and Attendance
Electronic Article
Surveillance (EAS)
Automated Toll Collection
Vehicle Anti-Theft
Wild Animal Tracking
4/20/2014
10
13. Smart Fridge
Recognizes what’s been put in it
Recognizes when things are removed
Creates automatic shopping lists
Notifies you when things are past their expiration
4/20/2014
13
14. RFID’s Advantages
Automatically identify
objects
Store data on a tag
Can be hidden
Work in harsh
environments
Improve Customer
Services
Easily Prevent Theft
An AUTO-ID based
System
A method for controlling
inventory
Saving Time and Money
Minimize Work Stress of
Staff
Offering Self Check out/in
4/20/2014
14
15. RFID’s Disadvantages
Lack of standards!
Short range in case of passive tag
Cost
Privacy concerns
4/20/2014
15
16. Privacy Concerns
Tracking an individual’s movements. If RFID tags are embedded in
clothing or vehicles, for example, and if there is a sufficiently dense
network of readers in place, it becomes possible to track those tags in
time and space.
Sense of limiting or controlling: the revelation of personal information
such as medical prescription or personal health histories could have an
impact on the availability of insurance or employment;
Information leakage. Consumer rights organizations worry about the
possibility that e.g. authorities or thieves will be able to monitor people’s
personal belongings through small embedded RFID microchips
remaining active after purchase.
Impersonation: Impersonation of RFID tags can be achieved by tag
cloning, tag swapping, tag reprogramming or spoofing.
4/20/2014
16
18. Regulation
Currently no global body governing RFID frequency
allocation
In Europe, tags must be removed from packaging
before disposal due to recycling disruptions and
health regulations
There is limited or no regulation of RFID’s for the
most part leading to more controversy
4/20/2014
18
19. Conclusion
RFID technology is rapidly is becoming more
standardized, but problems do still exist
The number of adopters of RFID technology is
growing
Regulation and education is necessary to quell some
of the fears regarding RFID technology and it’s
implications
4/20/2014
19