Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas

Slides:



Advertisements
Similar presentations
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advertisements

Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
ETP Brian Vance Top Ten Benefits of an ENGINEERING CAREER This material is based upon work supported by the National Science Foundation under Grant.
Systems Engineer An engineer who specializes in the implementation of production systems This material is based upon work supported by the National Science.
ELECTRONICS ASSEMBLY 1 of 12 MADE IN FLORIDA - INDUSTRY TOURS.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
Andrew McNab - License issues - 10 Apr 2002 License issues for EU DataGrid (on behalf of Anders Wannanen) Andrew McNab, University of Manchester
AUTOMATION IN MANUFACTURING 1 of 12 MADE IN FLORIDA - INDUSTRY TOURS.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
+ Heat Transfer Picture Presentation TEAK – Traveling Engineering Activity Kits Partial support for this project was provided by the National Science Foundation's.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Cut Saturation for p-cycle Design Khalid Al-Snaie Electronics Dept., College of Technology Riyadh, Saudi Arabia Dale R. Thompson* Department of Computer.
11/17/ Introduction to Partial Differential Equations Transforming Numerical.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
National Alliance for Medical Image Computing Licensing in NAMIC 3 requirements from NCBC RFA (paraphrased)
QUALITY MEASURES: METROLOGY MADE IN FLORIDA - INDUSTRY TOURS 1 of 12.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
2/13/ Elliptic Partial Differential Equations - Introduction Transforming.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Prototyping Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings.
PENALTY FOR COPYRIGHT INFRINGEMENT FAIR USE CLAUSE USE OF MULTIMEDIA IN THE CLASSROOM CONDITIONS FOR USING SOMEONE ELSE’S WORDS CONDITIONS FOR USING ANOTHER’S.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Numerical Methods Multidimensional Gradient Methods in Optimization- Example
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Top Ten Benefits of an ENGINEERING CAREER
Enforcing Privacy Policies for RFID Data Collection and Processing
Training Arkansas Computing Teachers (TACT)
Discussion and Conclusion
Written by: Jennifer Doherty, Cornelia Harris, Laurel Hartley
Nanotechnology & Society
Lesson Title: Reader Architecture and Antenna Configurations
Title of Poster Site Visit 2017 Introduction Results
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Supporting Material for the Biodiversity Teaching Experiment
Nanotechnology & Society
Numerical Methods Newton’s Method for One -Dimensional Optimization - Example
SCIENCE BE HAPPY TEACH SCIENCE WANT TO BE IN DEMAND? TEACH SCIENCE
Title of Poster Site Visit 2018 Introduction Results
BLOW MINDS! TEACH PHYSICS
BLOW MINDS! TEACH MATH TEACHING: WORTH IT IN MORE WAYS THAN YOU MIGHT THINK... Most people underestimate teacher salaries by $10,000-$30,000 Most teaching.
BLOW MINDS! TEACH CHEMISTRY
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
BLOW MINDS! TEACH SCIENCE
Project Title: I. Research Overview and Outcome
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008 by Dale R. Thompson

The Future Imagine a world where every item around you and that you carry or wear has sensors, is uniquely identifiable, and can be queried over the Internet. How would that affect you and the rest of society? 2

Transparent Society A good description A bad description 3

Privacy Threats by RFID A bomb in a restaurant explodes when there are five or more Americans with RFID-enabled passports detected. A mugger marks a potential victim by querying the tags in possession of an individual. A fixed reader at any retail counter could identify the tags of a person and show the similar products on the nearby screen to a person to provide individualized marketing. A sufficiently powerful directed reader reads tags in your house or car. – The ISO standard proposed for passports specifies about 4 inches (10 cm) as the typical range. However, NIST with a special purpose antenna read it at 30 feet (10 meters)! RFID enables tracking, profiling, and surveillance of individuals on a large scale.

Top Privacy Threats by RFID Tracking – Determine where individuals are located Tracing – Determine where individuals have been Hotlisting – Single out certain individuals because of the items they possess Profiling – Identifying the items an individual has in their possession

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW: 6

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 7