Presentation is loading. Please wait.

Presentation is loading. Please wait.

RFID technology in mobile applications Karol Hrudkay Transport Research Institute, Žilina, Slovak Republic.

Similar presentations


Presentation on theme: "RFID technology in mobile applications Karol Hrudkay Transport Research Institute, Žilina, Slovak Republic."— Presentation transcript:

1 RFID technology in mobile applications Karol Hrudkay Transport Research Institute, Žilina, Slovak Republic

2 22 Feb 2007Budapest2 RFID technology - introduction Radio Frequency Identification - means to efficiently and quickly auto-identify objects, assess, people,... Real-time tracking of inventory in the supply chain RFID tag – tiny computer chip with very small antenna – passive/active The chip contain Electronic product code (EPC) – uniquely identify the object The antenna transmits EPC to RFID reader – within a certain RF range, without requiring line-of-site

3 22 Feb 2007Budapest3 Current RFID applications Transport and logistics  toll management, tracking of goods, … Security and access control  tracking people, controlling access to restricted areas Supply chain management  item tagging, theft-prevention, product life cycle, … Medical and pharmaceutical applications  identification and location of staff and patients, asset tracking, counterfeit protection for drugs, … Manufacturing and processing  streamlining assembly line process, … Agriculture  tracking of animals, quality control, … Public sector, government  passports, driver’s licenses, library systems, …

4 22 Feb 2007Budapest4 RFID technology - properties Advantages:  rough conditions,  long read ranges,  portable databases,  multiple tag read/write,  tracking items in real-time Results:  quick scanning of products in large bulks,  automated supply chain management  significant savings  accuracy of shipment sent and received,  check on product theft, counterfeiting, product recall,...

5 22 Feb 2007Budapest5 Mobile RFID technology Vision of automatic identification and ubiquitous computing – „Internet of objects“  highly connected network  dispersed devices, objects, items can communicate each other  real-time information about objects, location, contents, destination, ambient conditions  efficient and easy M2M identification, communication and decision-making Handheld portable devices – mobile phones, PDAs – behaves as RFID readers and tags  conventional RFID closer to common user

6 22 Feb 2007Budapest6 Applications of mobile RFID technology Major tasks:  download and view information represented by RFID tag: quickly and easily download info represented by RFID tag and view that info via device's display  M2M identification and communication e.g. RFID mobile device behaves as a RFID tag (authenticate to access, carry out payments, download multimedia content from kiosk, quick call and instant message,...) Mobile RFID application zones:  LBS (Location-based services) zone  enterprise zone  private zone

7 22 Feb 2007Budapest7 LBS zone Services „related to“ and „available at“ customer's current location Coverage: public places, roads, shopping centres, cinemas,... Service provider deploy RFID tagged items/devices Various security threats  most of tags respond to every mobile phones  usually tag-reader mutual authentication and strong secure communication tag-phone is not considered  publicly available tags can be fake or illegally modified – one-way authentication mechanism needed (tag -> phone) Items/product tagged with low-cost passive RFID tags (EPCGlobal Gen. 2 UHF tags) assumed

8 22 Feb 2007Budapest8 Mobile RFID security at LBS zone Security threats and security requirements:  Secure job delegation and trust model identity and authenticity of provider’s information server, security of transaction, protection of privacy – security delegated to mobile operator  Malicious tag information servers it is essential to authenticate and authentic tag information server to be accessed  Authorised tag information access categorisation which user is entitled to download what kind of information - authentication, authorisation, access-control  User privacy protection Identity and location of user, user profile  Data integrity and confidentiality secure electronic data interchange is required (MP – SP IS)

9 22 Feb 2007Budapest9 Mobile RFID security assessment at LBS zone ThreatSecurity requirementTag - MPMP – SP IS User ID privacyPseudonyms Anonym. credentials 0000 0000 Illegal info. access Authentication Authorisation Access control list 0XX0XX 000000 EavesdroppingEncryption/decryption Digital certificate XXXX 0000 Key/pwd. compromise Trust model Key/Pwd. management XXXX 0000 MP: mobile phone X: not required SP IS: service's provider IS 0: required

10 22 Feb 2007Budapest10 Mobile RFID at LBS zone – building blocks Mobile RFID (M-RFID)  Mobile phone with RFID reader and tag RFID tags  every tag contains its unique EPC number company identification, product number, object unique identifier related product information is stored on EPC network Mobile operator (MO)  trust is concentrated at the site of MO –,trusted proxy’ EPC network  specifically to look up EPC data (like DNS) – further information is stored on databases and servers of EPC network  communication can be encrypted

11 22 Feb 2007Budapest11 Mobile RFID at LBS zone – security solutions Mutual authentication M-RFID – MO  secure job delegation, trust model, data integrity and confidentiality Mutual authentication MO – EPC IS  MO takes responsibility so select, identify and authenticate only genuine SP (and its servers) Certification for identity management, authentication and authorisation  M-RFID can request anonymous certificate from MO M-RFID privacy  kill the tag  lock the tag  blocker tag

12 22 Feb 2007Budapest12 Mobile RFID at enterprise zone Mobile phone assists mobile staff  inventory checkers, field engineers, maintenance and repair staff, security guards, … Different areas  real-time inventory management, work attendance, instructions on how to operate tagged items, identification of and access control to tagged equipments and secure enclosures, presence of staff on monitored places, … Security framework  list of employees and items/products,  designing and implementing of key/psw. distribution, data integrity and confidentiality, identification, authentication, and access control among staff, RFID reader, RFID tagged items and EPC network

13 22 Feb 2007Budapest13 Mobile RFID security assessment - enterprise zone ThreatSecurity requirementTag - MPMP – E-EPC User ID privacyPseudonyms Anonym. credentials XXXX XXXX Illegal info. access Authentication Authorisation Access control list 00X00X 000000 EavesdroppingEncryption/decryption Digital certificate XXXX 0000 Key/pwd. compromise Trust model Key/Pwd. management X0X0 X0X0 MP: mobile phone X: not required E-EPC: Enterprise's EPC network 0: required

14 22 Feb 2007Budapest14 Mobile RFID at private zone Mobile phone assists user in the private space  instant call or instant message by scanning RFID tagged items Characterisation  small zone, simple security model – easily deployed and maintained  off-the-shelf mobile RFID kits  possible obtain storage space on the EPC network  reader to tag authentication needed (within home)  user identity and access control list

15 22 Feb 2007Budapest15 RFID and standardisation Need for harmonisation at national and international level Standardisation ensures compatibility and interoperability Various players  Automotive Industry Action Group (AIAG)  European Article Numbering (EAN),  EPCglobal  European Radiocommunication Office (ERO)  European Telecommunication Standard Institute (ETSI)  International Air Transport Association (IATA)  International Civil Aviation Organisation (ICAO)  International Organisation for Standardisation (ISO), International Electrotechnical Commission (IEC)  International Telecommunication Union (ITU)  Universal Postal Union (UPU)

16 22 Feb 2007Budapest16 Areas of RFID standardisation Air interface, protocols Data structure Conformance Applications Existing standards focus on specific area or sector

17 22 Feb 2007Budapest17 RFID based mobile telecommunication services Information retrieval Data transmission Automated messaging Voice services Device integration Presence indication Mobile payment

18 22 Feb 2007Budapest18 RFID and SIM card SIM card with embedded RFID capabilities benefits of contactless cards into the MP using SIM cards as a storage device installed, updated cancelled over the air (GSM)

19 22 Feb 2007Budapest19 Practical issues Mobile RFID technology - privacy/security issues Impact on networks  new services will generate more traffic in fixed and mobile networks how big this impact is, how network design has to change Internetworking technologies  how RFID technology can integrate into existing network context of RFID applications in MP with other technologies RFID – (Internet protocol) IP mapping evolution towards active RFID tags with networking capability – large number of tag will need network addresses Service capabilities, architecture at network and service levels, signalling protocols, QoS, business model

20 22 Feb 2007Budapest20 Conclusion RFID enables ubiquitous computing – integrating computation into environment MP and RFID – potential for mobile telecommunication services Broad range of services, attractive for customers Variety of technical questions Security and privacy issues Impact on fixed and mobile networks

21 22 Feb 2007Budapest21 Thank you for your attention! Karol Hrudkay Transport Research Institute Žilina, Slovakia hrudkay@vud.sk


Download ppt "RFID technology in mobile applications Karol Hrudkay Transport Research Institute, Žilina, Slovak Republic."

Similar presentations


Ads by Google