The Place of Emerging RFID Technology in National Security and Development



Similar documents
RFID BASED VEHICLE TRACKING SYSTEM

WHITE PAPER. ABCs of RFID

How To Understand The Power Of An Freddi Tag (Rfid) System

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

Evolving Bar Codes. Y398 Internship. William Holmes

LibRFID: Automation Software for Library Management System Using RFID Technology

Implementing RFID in Library: Methodologies, Advantages and Disadvantages

RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

Radio Frequency Identification (RFID) An Overview

1-9 August 2003, Berlin

Radio Frequency Identification (RFID)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

915MHz RFID State of the Art RFID

To effectively manage and control a factory, we need information. How do we collect it?

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Time & Access System An RFID based technology

Using RFID Techniques for a Universal Identification Device

International Journal of Engineering Research & Management Technology

RTLS 101 What It Is and Why You Need It

A RFID based Inventory Control System for Nigerian Supermarkets

Why Has the Development in RFID Technology Made Asset Management More Urgent?

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

The Drug Quality & Security Act

RF ID Security and Privacy

Efficient Asset Tracking: From Manual to Automated

EL 25,1. Received 21 December 2005 Revised 31 March 2006 Accepted 7 April 2006

Radio Frequency Identification (RFID) Vs Barcodes

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

Military Usage of Passive RFID 1

An Introductory and Elementary Study on RFID & Its Applications

Radio Frequency Security System for User-Luggage Recognition

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

whitepaper How RFID Technology Can Enhance Your Asset Management Program

RFID Based Toll Automation System

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

RADIO FREQUENCY IDENTIFICATION IN LIBRARIES

Modern Multipurpose Security Management System

Track+Race LS RTLS for truck managed warehouses

entigral whitepaper Understanding RFID and Barcode Differences

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking

Active RFID Solutions for Asset Tracking and Inventory Management

Security in RFID Networks and Protocols

The ROI for Automatic Container Tracking Using RFID. A Case Study Analysis based on Re-usable Intermediate Bulk Containers

RF Attendance System Framework for Faculties of Higher Education

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

RFID the next step in consumer-product relations or Orwellian nightmare?

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now

SOURCE ID RFID Technologies and Data Capture Solutions

Automated Identification Technologies

Using RFID for Supply Chain Management

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

RFID based Bill Generation and Payment through Mobile

Enabling the secure use of RFID

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

a GAO GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION

RFID Asset Management Solutions. Distributed globally by

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Automobile Speed Violation Detection System using RFID and GSM Technologies

BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Inventory & Location System

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract

OI-TECH Asset Management

Asset Management Services. White Paper

Study of Logistics Warehouse Management System Based on RFID

Implementing radio frequency identification technology in libraries: Advantages and disadvantages

If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!

RFID Radio Frequency Identification

Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Privacy and Security in library RFID Issues, Practices and Architecture

RFID Journal Live! 2006 May 1-3, 2006 MGM Grand Conference Center Las Vegas, Nevada

INVENTORY MANAGEMENT SYSTEM USING RFID FOR FSKKP LABORATORY IN UMP. JESSICA OLIVIA ANAK SIMON PAtE

CHAPTER 1 Introduction 1

Warehouse Management System

Strengthen RFID Tags Security Using New Data Structure

Design for Management Information System Based on Internet of Things

RFID Design Principles

Determining The Right Lift Truck Navigation System. For Your Very Narrow Aisle (VNA) Warehouse

Student Management System based on RFID Technology

rf Technology to automate your BUsiness

K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

Cloud RFID UHF Gen 2

Helwan University & UNINETTUNO

Transcription:

The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University of Cape Town, Texas 77901 Rondesbosch 7701 United States of America. South Africa. akintola2087@yahoo.com okboyinbode@yahoo.com Abstract RFID (radio frequency identification) is one of the system solutions for tracking and tracing objects both globally and locally using RFID tags. It is an auto-id procedure for identifying objects automatically within a geographical area. It allows information about an object to be collected automatically without having to handle the object or enter its data manually. RFID uses tags which communicate information by radio wave through antennae on small computer chips attached to objects so that such objects may be identified, located, and tracked. This technology has found a significant areas of application in business supply chains, in medical line, in security applications, and in fact many areas of human endeavor. As Auto-ID and RFID technologies are developing at an alarming rate around the world with new information appearing daily, particularly on the Internet, this paper aims to describe the technology of RFID, the areas of applications of this technology particularly in industries, security and health care management and the potential benefits of adopting the technology. The overall aim of the paper is to sensitize Nigeria to start tapping this technology for national development and security. Keywords: RFID, Tags, Antennae. 1. Introduction RFID or Radio Frequency Identification is a technology that enables the tracking and/or identification of objects and living things using radio waves. Unlike ubiquitous bar-code technology, RFID technology does not require contact or lineof-sight for communication. RFID technology is an automated system of wireless data capture, consisting of two parts: the tag (or transponder) and the reader. The tag is a silicon chip that contains information, usually a unique numerical identifier, transmitted by an attached antenna to the RFID reader through radio waves. Depending on the radio frequency and power source, readers can pick up the radio waves at a range between three and 37

thirty feet and read the stored digital information on the chip (Mariko Yoshihara 2008). The precursors of RFID technology were first widely used during World War II to help identify ally or enemy planes. Due to its efficiency and falling cost, RFID technology soon expanded into the commercial sector. Compared to magnetic strips or barcodes, which usually contain only generic, category-levels of information, RFID tags can carry significantly more data, be reprogrammed with new data, and also be read faster, from farther away, without being in a direct line of sight (Mariko Yoshihara 2008). RFID tags can be embedded in products, government-issued ID cards, credit cards, toll devices and even people with the aim of tracking the products or people with ease. The block diagram of RFID is presented below. 2. RFID COMPONENTS: TAG ANTENNA READER INTERFACE RFID tags send Pertinent information to the Antennas The Antennas pickup the info from the Tags via radio waves, then send that info to the Readers The Readers interpret the info, organize it, then send it to the Interface Software The Readers also control the Antennas The Interface Software (Middleware) formats the info so that it can talk to the user s computer/network Figure 1. Block Diagram of RFID The Tag or Transponder can be either active, passive or semi-active. It responds to a signal from the Interrogator (reader/ writer/ antenna) which in turn sends a signal to the Computer. The Tag comes in a variety of shapes. It is made up from a chip (IC) and an antenna. Depending on your application it may be embedded in glass, or epoxy, or it may be in a label, or a card. Passive tags get all their power from the signal sent by the interrogator. As well as using this radio wave to carry the data, the tag is able to convert it into power. This means that the tag is only powered when it is in the beam of the interrogator. The tag then uses a technique called backscatter to reply to the interrogator. This does not involve a transmitter on the tag, but is a means of "reflecting" the carrier wave and putting a signal into that reflection. * RFID Tags do not require line-of-sight. * RFID Tags can store far more information than bar codes. 38

* Some RFID Tags are writable, so information can be updated as time goes on or as the tag travels to different locations.* Some RFID Tags have sensors that can record information. For example, a tag on a shipment of frozen foods could record the temperatures that the foods were exposed to. * RFID Tags can go on all kinds of objects and even on living beings. *Tags come in many shapes and sizes. The tag can be passive, battery assisted, or active. Battery assisted tags are just like passive tags (they use backscatter) but they have a battery to provide the power to the chip. This provides a big advantage, because the tag is not dependent on the strength of the carrier from the interrogator to provide the power it needs. Now it can use all the power from the battery and so is able to work at a greater distance from the interrogator. Active tags, have not only a battery, but also some form of transmitter on the tag. The disadvantage of having a battery is two fold. One, it adds cost to the tag, and two they run out of power eventually. The decision on which one to use will depend on your application. Semi-passive tags do not communicate with a reader, but instead, use a battery to perform other functions, such as to power the internal electronics or write information obtained from monitoring a sensor. The tag is made of an IC and an antenna. The IC will include memory and some form of processing capability. The memory may be read only or read/write, the type selected will depend on the application. The Antenna The Antenna receives the information from the Tag. The communication between the Tag and the Antenna is wireless, via radio waves and generally does not require line-of-sight. In some cases, facilities can use existing Wi-Fi Network antennas for the RFID System, eliminating the need to install RFID antennas. The antenna in a tag is the physical interface for the RF to be received and transmitted. Its construction varies depending on the tag itself and the frequency it operates on. Low frequency tags often use coils of wire, whereas high frequency tags are usually printed with conducting inks. The Reader The Reader sends information to a computer or network which houses interface software known as Middleware. Information is now available to users. Depending on the RFID system, the information could include: item s current location, where it has traveled, how much it has been used, environmental conditions it was exposed to and more. Functions of the Readers: a. To receive information from the Antennas and convert it to a usable format b. To energize and control the Antennas 39

3. Operating techniques of RFID Symbol's XR400 RFID reader Tag Antenna Reader Computer Figure 2. The basic schematic of all RFID systems The tag talks to the interrogator (reader) using what is called the air-interface. This is a specification for how they talk to each other and includes the frequency of the carrier, the bit data rate, the method of encoding and any other parameters that may be needed. ISO 18000 is the standard for the air interface for item management. Also a part of this air interface is what is commonly called the anti-collision protocol (if the tag supports it). This is a means of allowing many tags in the field to talk "at the same time". There are several ways of doing this, and each manufacturer has developed their own way of implementing it. Two other terms generally used are "Reader talks first" (RTF) and "Tag talks first" (TTF). With a RTF system, the tag just sits there, until it hears a request from the interrogator. This means that even though a tag may be illuminated (receiving power) from the interrogator, it does not talk until it is asked a question. With TTF the tag talks as soon as it gets power, or in the case of a battery assisted tag or active tag, it talks for short periods of time, all the time. This gives a much faster indication of a tag within sight of the interrogator, but it also means that the airwaves have constant traffic. 4.0 Implementing RFID systems in Nigeria. There are numerous areas where this technology could be applied in Nigeria ranging from security, to supply chain management. The list is endless. However I will mention some of the areas for the purpose of this paper. RFID in library Automation With RFID technology, library Inventory can be fast and efficient. A whole shelf of books can be read by the reader. This can quickly help us to know which library materials are missing. Locating books also can be done on time with the help of a powerful reader which can access every books in the library at once. RFID can be used as a security measure in the libraries. As users are leaving the Library, the tags are read to ensure that items are properly checked out. Self-check systems have 40

become very popular in advance countries. RFID self-check systems allow registered users to check-in or check-out several books at a time. Self-check systems reduce the number of staff needed at the circulation desk. RFID in Hospitals RFID can be adopted in Hospitals in Nigeria both public and private with the goal of locating equipment when medical staff need them. This Will help medical staff, to spend less time looking for and gathering equipments especially in an emergency case. Such RFID systems are called indoor positioning systems. Apart from this, public hospitals can use active RFIDs for patient and personnel identification and location purposes.this can help locate patients and read their information anywhere they are before administrating medications. Toll Gates Fees Collection Vehicles can be equipped with tags to make toll gate collection in Nigeria easier and improve traffic flow. In Nigeria today many people have lost their live in toll gates as a result of hazards which occur at the toll gates and which always involve many vehicles. So to make charging easier, RFID can be used to identify each vehicle passing through the toll gates and deductions of their charges are done automatically from their accounts based on the information stored in their tags. This will reduce traffic hold ups at the toll gates. Vehicle Tracking The rate of theft of vehicles is too much in Nigeria. (RFID) devices can assist in in the tracking of goods an vehicles. Tags work like a wireless plate. It transmits its identity to readers which are placed at strategic locations along the road like entry/exit of a premise, highway, weighing bridge, parking lots and others. Readers pick up these signals and transmit them to the centralized data servers from where the information can be viewed or utilized anywhere. The read-range of the reader varies from 5m to 30 m depending upon the technology (Passive Vs Active) in place. RFID-embedded International ID cards RFID can be embedded in international ID cards. This type of cards will be good instant identification of holders. This will reduce the time of information processing. RFID in Inventory management 41

Automatic Inventory management system now uses RFID system where products in the inventory are attached with RFID. This enables proper keeping of records in the Inventory. 4. Conclusion RFID systems are becoming ubiquitous systems that allow objects to be tracked without physical contact with the objects. This system has been found useful in so many areas of national development and security, such as vehicle tracking, supply chain management, library information systems, National ID cards, International Passports, hospitals management systems to mention but a few. Some of the systems are already in operation in developed countries such as America, Germany and United Kingdom. It is time Nigeria begin to tap into these resources for their national security, better hospital management, better toll gates management, and better stock and inventory management. The application of this technologies will cut short wasteful expenditures and enhance national security. References [1.] Alastair McArthur (2003) Integrating RFID into library systems Myths and Realities World Library and Information Congress: 69th IFLA General Conference and Council 1-9 August 2003, Berlin. [2.] Department of Homeland Security, Comments of the Electronic Privacy Information Center, available at.http://www.epic.org/privacy/us-visit/comm120605.pdf. [3.] General RFID Information, http://www.rfidjournal.com/faq/16/50. [4.] INFORMATION SECURITY: RFID TECHNOLOGY IN THE FEDERAL GOVERNMENT, GAO-05-551 (May 2005), available at http://www.gao.gov/new.items/d05551.pdf. [5.] J.A. Fisher, Indoor positioning and digital management: emerging surveillance regimes in hospitals, in: T. Monahan (Ed.), Surveillance and Security: Technological Politics and Power in Everyday Life, Routledge, New York, 2006, pp. 77 88. [6.] Jill A. Fisher, Torin Monahan (2008) Tracking the social dimensions of RFID systems in hospitalss Elsevier international journal of medical informatics 7 7 ( 2 0 0 8 ) 176 183. [7.] Jonathan Collins, (2007) Hospital Gets Ultra-Wideband RFID, available at http://www.rfidjournal.com/article/articleview/1088/1/1/. [8.] Mariko Yoshihara (2008) RFID and Privacy Public Law Research Institute UC Hastings College of the Law 100 McAllister Street, Suite 405. [9.] Mohammed Abu Jahed and Mohammad Monoar Hossain(2009)Using Radio Frequency Identification (RFID) Technology to Improve Supply Chain Efficiency The Bangladesh Accountant/October - December 2009. [10.] Radio Frequency Identification (RFID) Systems, available at http://www.epic.org/privacy/rfid/. [11.] The History of RFID Technology, http://www.rfidjournal.com/article/articleview/1338/1/129/. 42

Authors Akintola Kolawole Gabriel graduated from the Federal University of Technology Akure where he studied Computer Science in 1995. I had my masters degree in the same Institution in 2004. Presently I am a computer Science lecturer in the university. I lecture Compiler Construction, data structures and algorithms. I also carry out Research activities in Wired and Wireless Networking especially in relation to quality of services in multimedia networks and applications of computer networks in collaborative teaching learning and research. I write computer programs using languages such as JAVA, C, C++, and.net platform. Olutayo Kehinde BOYINBODE is currently a lecturer at the Department of Computer Science, the Federal University of Technology, Akure, Ondo-State, Nigeria. She received her B. Tech (Hons) from Federal University of Technology, Akure in 1995 and Master of Science from University of Lagos in 1998. Presently, She is a PhD student at the same school where she taught. Her research focus is on Ubiquitous Learning, Sensor networks, Grid computing, Mobile and wireless networking Email:- okboyinbode@yahoo.com 43

44