Radio Frequency Identification
Radio Frequency Identification
Radio Frequency Identification
1 History
See also: History of radar
In 1945, Lon Theremin invented an espionage tool
1
2 2 DESIGN
communication are solved, and before the eld of useful cuit for storing and processing information, modulating
applications is explored. and demodulating a radio-frequency (RF) signal, collect-
Mario Cardullo's device, patented on January 23, 1973, ing DC power from the incident reader signal, and other
was the rst true ancestor[6] of modern RFID, as it was a specialized functions; and an antenna for receiving and
passive radio transponder with memory.[7] The initial de- transmitting the signal. The tag information is stored in a
vice was passive, powered by the interrogating signal, and non-volatile memory. The RFID tag includes either xed
was demonstrated in 1971 to the New York Port Author- or programmable logic for processing the transmission
ity and other potential users and consisted of a transpon- and sensor data, respectively.
der with 16 bit memory for use as a toll device. The An RFID reader transmits an encoded radio signal to in-
basic Cardullo patent covers the use of RF, sound and terrogate the tag. The RFID tag receives the message and
light as transmission media. The original business plan then responds with its identication and other informa-
presented to investors in 1969 showed uses in transporta- tion. This may be only a unique tag serial number, or may
tion (automotive vehicle identication, automatic toll sys- be product-related information such as a stock number,
tem, electronic license plate, electronic manifest, vehicle lot or batch number, production date, or other specic
routing, vehicle performance monitoring), banking (elec- information. Since tags have individual serial numbers,
tronic check book, electronic credit card), security (per- the RFID system design can discriminate among several
sonnel identication, automatic gates, surveillance) and tags that might be within the range of the RFID reader
medical (identication, patient history).[6] and read them simultaneously.
An early demonstration of reected power (modulated
backscatter) RFID tags, both passive and semi-passive,
2.2 Readers
was performed by Steven Depp, Alfred Koelle, and
Robert Frayman at the Los Alamos National Laboratory
RFID systems can be classied by the type of tag and
in 1973.[8] The portable system operated at 915 MHz and
reader. A Passive Reader Active Tag (PRAT) system
used 12-bit tags. This technique is used by the majority
has a passive reader which only receives radio signals
of todays UHFID and microwave RFID tags.[9]
from active tags (battery operated, transmit only). The
The rst patent to be associated with the abbreviation reception range of a PRAT system reader can be adjusted
RFID was granted to Charles Walton in 1983.[10] from 12,000 feet (0600 m), allowing exibility in ap-
plications such as asset protection and supervision.
An Active Reader Passive Tag (ARPT) system has an
2 Design active reader, which transmits interrogator signals and
also receives authentication replies from passive tags.
2.1 Tags An Active Reader Active Tag (ARAT) system uses ac-
tive tags awoken with an interrogator signal from the ac-
A radio-frequency identication system uses tags, or la- tive reader. A variation of this system could also use a
bels attached to the objects to be identied. Two-way Battery-Assisted Passive (BAP) tag which acts like a pas-
radio transmitter-receivers called interrogators or readers sive tag but has a small battery to power the tags return
send a signal to the tag and read its response. reporting signal.
RFID tags can be either passive, active or battery-assisted Fixed readers are set up to create a specic interrogation
passive. An active tag has an on-board battery and peri- zone which can be tightly controlled. This allows a highly
odically transmits its ID signal. A battery-assisted pas- dened reading area for when tags go in and out of the
sive (BAP) has a small battery on board and is activated interrogation zone. Mobile readers may be hand-held or
when in the presence of an RFID reader. A passive tag mounted on carts or vehicles.
is cheaper and smaller because it has no battery; instead,
the tag uses the radio energy transmitted by the reader.
However, to operate a passive tag, it must be illuminated 2.3 Frequencies
with a power level roughly a thousand times stronger than
for signal transmission. That makes a dierence in inter- 2.4 Signaling
ference and in exposure to radiation.
Signaling between the reader and the tag is done in sev-
Tags may either be read-only, having a factory-assigned eral dierent incompatible ways, depending on the fre-
serial number that is used as a key into a database, or may
quency band used by the tag. Tags operating on LF and
be read/write, where object-specic data can be written HF bands are, in terms of radio wavelength, very close to
into the tag by the system user. Field programmable tags the reader antenna because they are only a small percent-
may be write-once, read-multiple; blank tags may be age of a wavelength away. In this near eld region, the
written with an electronic product code by the user. tag is closely coupled electrically with the transmitter in
RFID tags contain at least two parts: an integrated cir- the reader. The tag can modulate the eld produced by
3
the reader by changing the electrical loading the tag rep- in order to study their behavior.[16] This trend towards
resents. By switching between lower and higher relative increasingly miniaturized RFIDs is likely to continue as
loads, the tag produces a change that the reader can de- technology advances.
tect. At UHF and higher frequencies, the tag is more than Hitachi holds the record for the smallest RFID chip, at
one radio wavelength away from the reader, requiring a 0.05 mm 0.05 mm. This is 1/64th the size of the
dierent approach. The tag can backscatter a signal. Ac- previous record holder, the mu-chip.[17] Manufacture is
tive tags may contain functionally separated transmitters enabled by using the silicon-on-insulator (SOI) process.
and receivers, and the tag need not respond on a frequency These dust-sized chips can store 38-digit numbers using
related to the readers interrogation signal.[13]
128-bit Read Only Memory (ROM).[18] A major chal-
An Electronic Product Code (EPC) is one common type lenge is the attachment of antennas, thus limiting read
of data stored in a tag. When written into the tag by an range to only millimeters.
RFID printer, the tag contains a 96-bit string of data. The
rst eight bits are a header which identies the version of
the protocol. The next 28 bits identify the organization 3 Uses
that manages the data for this tag; the organization num-
ber is assigned by the EPCGlobal consortium. The next
The RFID tag can be axed to an object and used to
24 bits are an object class, identifying the kind of product;
track and manage inventory, assets, people, etc. For ex-
the last 36 bits are a unique serial number for a particu-
ample, it can be axed to cars, computer equipment,
lar tag. These last two elds are set by the organization
books, mobile phones, etc.
that issued the tag. Rather like a URL, the total electronic
product code number can be used as a key into a global RFID oers advantages over manual systems or use of
database to uniquely identify a particular product.[14] bar codes. The tag can be read if passed near a reader,
even if it is covered by the object or not visible. The tag
Often more than one tag will respond to a tag reader,
can be read inside a case, carton, box or other container,
for example, many individual products with tags may be
and unlike barcodes, RFID tags can be read hundreds at
shipped in a common box or on a common pallet. Colli-
a time. Bar codes can only be read one at a time using
sion detection is important to allow reading of data. Two
current devices.
dierent types of protocols are used to singulate a par-
ticular tag, allowing its data to be read in the midst of In 2011, the cost of passive tags started at US$0.09 each;
many similar tags. In a slotted Aloha system, the reader special tags, meant to be mounted on metal or withstand
broadcasts an initialization command and a parameter gamma sterilization, can go up to US$5. Active tags for
that the tags individually use to pseudo-randomly delay tracking containers, medical assets, or monitoring envi-
their responses. When using an adaptive binary tree ronmental conditions in data centers start at US$50 and
protocol, the reader sends an initialization symbol and can go up over US$100 each. Battery-Assisted Passive
then transmits one bit of ID data at a time; only tags (BAP) tags are in the US$310 range and also have sen-
with matching bits respond, and eventually only one tag sor capability like temperature and humidity.
matches the complete ID string.[15] RFID can be used in a variety of applications,[19][20] such
as:
Access management
Tracking of goods
3.1 Commerce
3.2.3 Track & Trace test vehicles and prototype Canada (2013).
parts Standards for RFID passports are determined by the
International Civil Aviation Organization (ICAO), and
In the automotive industry RFID is used to Track & Trace
are contained in ICAO Document 9303, Part 1, Vol-
test vehicles and prototype parts (project Transparent
umes 1 and 2 (6th edition, 2006). ICAO refers to the
Prototype).
ISO/IEC 14443 RFID chips in e-passports as contact-
less integrated circuits. ICAO standards provide for e-
3.3 Public transport passports to be identiable by a standard e-passport logo
on the front cover.
RFID cards are used for access control to public trans- Since 2006, RFID tags included in new United States
port. passports will store the same information that is printed
In London travellers use Oyster Cards on the tube, buses within [36] the passport, and include a digital picture of the
and ferries. It identies the traveller at each turnstile and owner. The United States Department of State initially
so the system can calculate the fare. stated the chips could only be read from a distance of 10
centimetres (3.9 in), but after widespread criticism and a
In the Chicago area, riders use the open standard Ventra clear demonstration that special equipment can read the
card to board CTA buses and trains, along with PACE test passports from 10 metres (33 ft) away,[37] the pass-
buses. ports were designed to incorporate a thin metal lining to
In Ontario, Canada, riders in the GTA and Ottawa Area make it more dicult for unauthorized readers to "skim"
use the Presto card to board trains, buses and street cars information when the passport is closed. The department
across multiple dierent transit companies. will also implement Basic Access Control (BAC), which
functions as a personal identication number (PIN) in the
In Melbourne Australia, Public Transport Victoria uses form of characters printed on the passport data page. Be-
RFID-based Myki tickets across the train, tram and bus fore a passports tag can be read, this PIN must be en-
networks. tered into an RFID reader. The BAC also enables the
In northwest Italy (Piedmont region), BIP card uses RFID encryption of any communication between the chip and
Smart_card based on Calypso (electronic ticketing sys- interrogator.[38] As noted in the section below on secu-
tem) technology to enable travellers to use dierents rity, there are many situations in which these protections
MOT including bike and car sharing. It includes also mu- have been shown to be insucient, and passports have
seums and libraries pass. been cloned based on scans of them while they were be-
ing delivered in the mail.
known as PIT (Passive Integrated Transponder) tags, pas- to the emergence of an ultimate panopticon", a society
sive RFID, or "chips" on animals.[41] The Canadian Cattle where all citizens behave in a socially accepted manner
Identication Agency began using RFID tags as a replace- because others might be watching.[48]
ment for barcode tags. Currently CCIA tags are used in There is much controversy regarding human applications
Wisconsin and by United States farmers on a voluntary of this technology. On July 22, 2006, Reuters reported
basis. The USDA is currently developing its own pro- that two hackers, Newitz and Westhues, at a confer-
gram. ence in New York City showed that they could clone
RFID tags are required for all cattle, sheep and goats sold the RFID signal from a human implanted RFID chip,
in Australia.[42] showing that the chip is not hack-proof as was previously
claimed.[49] Privacy advocates have protested against im-
plantable RFID chips, warning of potential abuse.
3.8 Human identication
3.9 Institutions
ups between sperm and ova in IVF clinics is also being conveyor belt, which reduces sta time. This can all be
considered.[56] done by the borrowers themselves, reducing the need for
In October 2004, the FDA approved USAs rst RFID library sta assistance. With portable readers, invento-
chips that can be implanted in humans. The 134 kHz ries could be done on a whole shelf of materials within
[60]
RFID chips, from VeriChip Corp. can incorporate per- seconds. However, as of 2008 this technology remains
sonal medical information and could save lives and limit too costly for many smaller libraries, and the conversion
injuries from errors in medical treatments, according to period has been estimated at 11 months for an average-
the company. Anti-RFID activists Katherine Albrecht size library. A 2004 Dutch estimate was that a library
which lends 100,000 books per year should plan on a cost
and Liz McIntyre discovered an FDA Warning Letter
that spelled out health risks.[57] According to the FDA, of 50,000 (borrow- and return-stations: 12,500 each,
detection porches 10,000 each; tags 0.36 each). RFID
these include adverse tissue reaction, migration of the
implanted transponder, failure of implanted transpon- taking a large burden o sta could also mean that fewer
sta will be needed, resulting in some of them getting laid
der, electrical hazards and magnetic resonance imag-
ing [MRI] incompatibility. o,[59] but that has so far not happened in North Amer-
ica where recent surveys have not returned a single library
that cut sta because of adding RFID. In fact, library bud-
3.9.2 Libraries gets are being reduced for personnel and increased for in-
frastructure, making it necessary for libraries to add au-
tomation to compensate for the reduced sta size. Also,
the tasks that RFID takes over are largely not the pri-
mary tasks of librarians. A nding in the Netherlands
is that borrowers are pleased with the fact that sta are
now more available for answering questions.
Privacy concerns have been raised surrounding library
use of RFID. Because some RFID tags can be read from
up to 100 metres (330 ft), there is some concern over
whether sensitive information could be collected from an
unwilling source. However, library RFID tags do not con-
tain any patron information,[61] and the tags used in the
majority of libraries use a frequency only readable from
approximately 10 feet (3.0 m).[58] Further, another non-
library agency could potentially record the RFID tags of
every person leaving the library without the library ad-
ministrators knowledge or consent. One simple option is
to let the book transmit a code that has meaning only in
conjunction with the librarys database. Another possible
enhancement would be to give each book a new code ev-
ery time it is returned. In future, should readers become
ubiquitous (and possibly networked), then stolen books
RFID tags used in libraries: square book tag, round CD/DVD tag could be traced even outside the library. Tag removal
and rectangular VHS tag could be made dicult if the tags are so small that they
t invisibly inside a (random) page, possibly put there by
Libraries have used RFID to replace the barcodes on li- the publisher.
brary items. The tag can contain identifying information
or may just be a key into a database. An RFID system
may replace or supplement bar codes and may oer an- 3.9.3 Museums
other method of inventory management and self-service
checkout by patrons. It can also act as a security device, RFID technologies are now also implemented in end-user
taking the place of the more traditional electromagnetic applications in museums. An example was the custom-
security strip.[58] designed temporary research application, eXspot, at the
Exploratorium, a science museum in San Francisco, Cal-
It is estimated that over 30 million library items world- ifornia. A visitor entering the museum received an RF
wide now contain RFID tags, including some in the Tag that could be carried as a card. The eXspot system
Vatican Library in Rome.[59] enabled the visitor to receive information about specic
Since RFID tags can be read through an item, there is exhibits. Aside from the exhibit information, the visitor
no need to open a book cover or DVD case to scan an could take photographs of themselves at the exhibit. It
item, and a stack of books can be read simultaneously. was also intended to allow the visitor to take data for later
Book tags can be read while books are in motion on a analysis. The collected information could be retrieved at
3.10 Sports 9
3.11 Complement to barcode tags may be found in future supply chain scenarios. The
main advantage in comparison to traditional RFID tags
RFID tags are often a complement, but not a substitute, is their low price and the usually employed oine preag-
for UPC or EAN barcodes. They may never completely gregation of data to the class level.
replace barcodes, due in part to their higher cost and Unlike most other RFID chips (which use radio
the advantage of multiple data sources on the same ob- frequencies of 0.1250.1342, 0.1400.1485, 13.56,
ject. Also, unlike RFID labels, barcodes can be generated and 868928 MHz), optical RFID operates in the
and distributed electronically, e.g. via e-mail or mobile electromagnetic spectrum between the frequencies of 333
phone, for printing or display by the recipient. An exam- THz (3.331014 hertz, 900 nm) and 380 THz (788 nm)
ple is airline boarding passes. The new EPC, along with and 750 THz (400 nm). The tag information is com-
several other schemes, is widely available at reasonable municated to the reader by reecting the read request.
cost. Parts of the incoming signal are ltered by the tag in a
The storage of data associated with tracking items will well-dened way as it is sent back to the reader. On the
require many terabytes. Filtering and categorizing RFID readers side, the tag data can be deduced by analysing
data is needed to create useful information. It is likely the pattern used for ltering.[72] As an alternative to re-
that goods will be tracked by the pallet using RFID tags, ection mode, active circuits can be used, replacing awk-
and at package level with Universal Product Code (UPC) ward RFID antennae with photovoltaic components and
or EAN from unique barcodes. IR-LEDs on the ICs.One of the earliest examples of Op-
tical RFID is RFIG: Radio Frequency Identity and Ge-
The unique identity is a mandatory requirement for RFID
ometry, by Ramesh Raskar, Paul Dietz, Paul Beardsley
tags, despite special choice of the numbering scheme.
and colleagues. This combines an optical tag with a RF
RFID tag data capacity is large enough that each individ-
tag to provide ID as well as geometric operations, such as
ual tag will have a unique code, while current bar codes
location, pose, motion, orientation and change detection.
are limited to a single type code for a particular product.
The uniqueness of RFID tags means that a product may Regarding privacy, optical RFID provides much more
be tracked as it moves from location to location, nally protection against abuse than RFID based on common
ending up in the consumers hands. This may help to com- electromagnetic waves. This is mainly because line-of-
bat theft and other forms of product loss. The tracing of sight is required for malicious read out. Such an attack
products is an important feature that gets well supported can easily be prevented with low cost optical RFID sight
with RFID tags containing a unique identity of the tag and blockers. Nevertheless, if needed some penetration of
also the serial number of the object. This may help com- solids and liquids can be achieved e.g. with near-IR wave-
panies cope with quality deciencies and resulting recall lengths.
campaigns, but also contributes to concern about tracking
and proling of consumers after the sale.
5 Regulation and standardization
3.12 Telemetry
A number of organizations have set standards for RFID,
including the International Organization for Standardiza-
Active RFID tags also have the potential to function as
tion (ISO), the International Electrotechnical Commis-
low-cost remote sensors that broadcast telemetry back to
sion (IEC), ASTM International, the DASH7 Alliance
a base station. Applications of tagometry data could in-
and EPCglobal.
clude sensing of road conditions by implanted beacons,
[71] There are also several specic industries that have set
weather reports, and noise level monitoring.
guidelines. These industries include the Financial Ser-
Passive RFID tags can also report sensor data. For ex-
vices Technology Consortium (FSTC) which has set a
ample, the Wireless Identication and Sensing Platform
standard for tracking IT Assets with RFID, the Com-
is a passive tag that reports temperature, acceleration and
puter Technology Industry Association CompTIA which
capacitance to commercial Gen2 RFID readers.
has set a standard for certifying RFID engineers, and the
It is possible that active or battery-assisted passive (BAP) International Airlines Transport Association IATA which
RFID tags, could broadcast a signal to an in-store receiver has set tagging guidelines for luggage in airports.
to determine whether the RFID tag (product) is in the
In principle, every country can set its own rules for
store.
frequency allocation for RFID tags, and not all radio
bands are available in all countries. These frequencies are
known as the ISM bands (Industrial Scientic and Med-
4 Optical RFID ical bands). The return signal of the tag may still cause
interference for other radio users.
Optical RFID (aka OPID) is an alternative to RFID that is
based on optical readers. Applications for optical RFID Low-frequency (LF: 125134.2 kHz and 140148.5
11
kHz) (LowFID) tags and high-frequency (HF: 13.56 Part 3: Parameters for air interface communi-
MHz) (HighFID) tags can be used globally without cations at 13.56 MHz
a license. Part 4: Parameters for air interface communi-
cations at 2.45 GHz
Ultra-high-frequency (UHF: 865928 MHz) (Ultra-
HighFID or UHFID) tags cannot be used globally Part 6: Parameters for air interface communi-
as there is no single global standard and regulations cations at 860960 MHz
dier from country to country. Part 7: Parameters for active air interface
communications at 433 MHz
In North America, UHF can be used unlicensed for 902 ISO/IEC 18092 Information technology
928 MHz (13 MHz from the 915 MHz center fre- Telecommunications and information exchange
quency), but restrictions exist for transmission power. In between systemsNear Field Communication
Europe, RFID and other low-power radio applications are Interface and Protocol (NFCIP-1)
regulated by ETSI recommendations EN 300 220 and
EN 302 208, and ERO recommendation 70 03, allow- ISO 18185: This is the industry standard for elec-
ing RFID operation with somewhat complex band restric- tronic seals or e-seals for tracking cargo containers
tions from 865868 MHz. Readers are required to moni- using the 433 MHz and 2.4 GHz frequencies.
tor a channel before transmitting (Listen Before Talk); ISO/IEC 21481 Information technology
this requirement has led to some restrictions on perfor- Telecommunications and information exchange
mance, the resolution of which is a subject of current between systemsNear Field Communication
research. The North American UHF standard is not ac- Interface and Protocol 2 (NFCIP-2)
cepted in France as it interferes with its military bands.
On July 25, 2012, Japan changed its UHF band to 920 ASTM D7434, Standard Test Method for Determin-
MHz, more closely matching the United States 915 MHz ing the Performance of Passive Radio Frequency
band. Identication (RFID) Transponders on Palletized or
Unitized Loads
In some countries, a site license is needed, which needs to
be applied for at the local authorities, and can be revoked. ASTM D7435, Standard Test Method for Determin-
According to an overview assembled by GS1, as of 31 ing the Performance of Passive Radio Frequency
October 2014, regulations are in place in 78 countries Identication (RFID) Transponders on Loaded
representing ca. 96.5% of the worlds GDP, and work on Containers
regulations is in progress in 3 countries representing circa ASTM D7580, Standard Test Method for Rotary
1% of the worlds GDP.[73] Stretch Wrapper Method for Determining the Read-
Standards that have been made regarding RFID include: ability of Passive RFID Transponders on Homoge-
nous Palletized or Unitized Loads
ISO 11784/11785 - Animal identication. Uses ISO 28560-2 : species encoding standards and data
134.2Khz. model to be used within libraries.[74]
ISO 14223 Radiofrequency [sic] identication of In order to ensure global interoperability of products, sev-
animals Advanced transponders eral organizations have set up additional standards for
RFID testing. These standards include conformance, per-
ISO/IEC 14443: This standard is a popular HF
formance and interoperability tests.
(13.56 MHz) standard for HighFIDs which is be-
ing used as the basis of RFID-enabled passports un- Groups concerned with standardization are:
der ICAO 9303. The Near Field Communication
standard that lets mobile devices act as RFID read- DASH7 Alliance an international industry group
ers/transponders is also based on ISO/IEC 14443. formed in 2009 to promote standards and inter-
operability among extensions to ISO/IEC 18000-7
ISO/IEC 15693: This is also a popular HF (13.56 technologies[75]
MHz) standard for HighFIDs widely used for non-
contact smart payment and credit cards. EPCglobal this is the standardization framework
that is most likely to undergo international stan-
ISO/IEC 18000: Information technologyRadio dardisation according to ISO rules as with all sound
frequency identication for item management: standards in the world, unless residing with limited
scope, as customs regulations, air-trac regulations
Part 1: Reference architecture and denition and others. Currently the big distributors and gov-
of parameters to be standardized ernmental customers are pushing EPC heavily as a
Part 2: Parameters for air interface communi- standard well-accepted in their community, but not
cations below 135 kHz yet regarded as for salvation to the rest of the world.
12 6 PROBLEMS AND CONCERNS
the database structure of Object Naming Services may Shielding eectiveness depends on the frequency being
be susceptible to inltration, similar to denial-of-service
used. Low-frequency LowFID tags, like those used in
attacks, after the EPCglobal Network ONS root serversimplantable devices for humans and pets, are relatively
were shown to be vulnerable.[87] resistant to shielding though thick metal foil will prevent
most reads. High frequency HighFID tags (13.56 MHz
smart cards and access badges) are sensitive to shielding
6.4 Health and are dicult to read when within a few centimetres
of a metal surface. UHF Ultra-HighFID tags (pallets and
Microchipinduced tumors have been noted during ani- cartons) are dicult to read when placed within a few
mal trials.[88][89] millimetres of a metal surface, although their read range
is actually increased when they are spaced 24 cm from
a metal surface due to positive reinforcement of the re-
6.5 Exploitation ected wave and the incident wave at the tag.
6.6 Passports
6.7 Shielding
possible to indirectly deduce the identity of the pur- ing his card with aluminum foil.[103]
chaser by reading the globally unique ID of that item In 20042005 the Federal Trade Commission Sta con-
(contained in the RFID tag). This is only true if the ducted a workshop and review of RFID privacy concerns
person doing the watching also had access to the loy- and issued a report recommending best practices.[104]
alty card data and the credit card data, and the per-
son with the equipment knows where you are going RFID was one of the main topics of 2006 Chaos Com-
to be. munication Congress (organized by the Chaos Computer
Club in Berlin) and triggered a big press debate. Top-
ics included: electronic passports, Mifare cryptography
Most concerns revolve around the fact that RFID tags af- and the tickets for the FIFA World Cup 2006. Talks
xed to products remain functional even after the prod- showed how the rst real world mass application of RFID
ucts have been purchased and taken home and thus can at the 2006 FIFA Soccer World Cup worked. Group
be used for surveillance and other purposes unrelated to monochrom staged a special 'Hack RFID' song.[105]
their supply chain inventory functions.[99]
The RFID Network argued that these fears are unfounded
in the rst episode of their syndicated cable TV series 7.2 Government control
by letting RF engineers demonstrate how RFID works .
They provided images of RF engineers driving an RFID- Some individuals have grown to fear the loss of rights due
enabled van around a building and trying to take an inven- to RFID human implantation.
tory of items inside. They discussed satellite tracking of a
By early 2007, Chris Paget of San Francisco, Califor-
passive RFID tag, which is surprising since the maximum
nia, showed that RFID information can be pulled from
range is under 200m.
individuals by using only $250 worth of equipment.
The concerns raised by the above may be addressed in This supports the claim that with the information cap-
part by use of the Clipped Tag. The Clipped Tag is an tured, it would be relatively simple to make counterfeit
RFID tag designed to increase consumer privacy. The passports.[106]
Clipped Tag has been suggested by IBM researchers Paul
According to ZDNet, critics believe that RFID will lead
Moskowitz and Guenter Karjoth. After the point of sale,
to tracking individuals every movement and will be an in-
a consumer may tear o a portion of the tag. This allows
vasion of privacy.[107] In the book SpyChips: How Major
the transformation of a long-range tag into a proximity
Corporations and Government Plan to Track Your Every
tag that still may be read, but only at short range less
Move by Katherine Albrecht and Liz McIntyre, one is en-
than a few inches or centimeters. The modication of the
couraged to imagine a world of no privacy. Where your
tag may be conrmed visually. The tag may still be used
every purchase is monitored and recorded in a database
later for returns, recalls, or recycling.
and your every belonging is numbered. Where some-
However, read range is both a function of the reader and one many states away or perhaps in another country has a
the tag itself. Improvements in technology may increase record of everything you have ever bought. Whats more,
read ranges for tags. Tags may be read at longer ranges they can be tracked and monitored remotely.[108]
than they are designed for by increasing reader power.
The limit on read distance then becomes the signal-to-
noise ratio of the signal reected from the tag back to 7.3 Deliberate destruction in clothing and
the reader. Researchers at two security conferences have other items
demonstrated that passive Ultra-HighFID tags normally
read at ranges of up to 30 feet, can be read at ranges of According to an RSA laboratories FAQ, RFID tags can
50 to 69 feet using suitable equipment.[100][101]
be destroyed by a standard microwave oven;[109] however
In January 2004 privacy advocates from CASPIAN and some types of RFID tags, particularly those constructed
the German privacy group FoeBuD were invited to the to radiate using large metallic antennas (in particular RF
METRO Future Store in Germany, where an RFID pi- tags and EPC tags), may catch re if subjected to this
lot project was implemented. It was uncovered by acci- process for too long (as would any metallic item inside a
dent that METRO Payback customer loyalty cards con- microwave oven). This simple method cannot safely be
tained RFID tags with customer IDs, a fact that was dis- used to deactivate RFID features in electronic devices,
closed neither to customers receiving the cards, nor to this or those implanted in living tissue, because of the risk
group of privacy advocates. This happened despite as- of damage to the host. However the time required is
surances by METRO that no customer identication data extremely short (a second or two of radiation) and the
was tracked and all RFID usage was clearly disclosed.[102] method works in many other non-electronic and inani-
During the UN World Summit on the Information So- mate items, long before heat or re become of concern.
ciety (WSIS) between the 16th to 18 November 2005, Some RFID tags implement a kill command mech-
founder of the free software movement, Richard Stall- anism for permanently and irreversibly disabling them.
man, protested the use of RFID security cards by cover- This mechanism can be applied if the chip itself is trusted
15
or the mechanism is known by the person that wants to [4] Hacking Exposed Linux: Linux Security Secrets & Solutions
kill the tag. (third ed.). McGraw-Hill Osborne Media. 2008. p. 298.
ISBN 978-0-07-226257-5.
UHF RFID tags that comply with the EPC2 Gen 2 Class
1 standard usually support this mechanism, while pro- [5] Stockman, Harry (October 1948), Communication by
tecting the chip from being killed with a password.[110] Means of Reected Power, Proceedings of the IRE, 36
Guessing or cracking this needed 32-bit password for (10): 11961204, doi:10.1109/JRPROC.1948.226245
killing a tag would not be dicult for a determined
attacker.[111] [6] Genesis of the Versatile RFID Tag. RFID Journal. Re-
trieved 2013-09-22.
Optical RFID [12] Weis, Stephen A. (2007), RFID (Radio Frequency Identi-
cation): Principles and Applications, MIT CSAIL
PositiveID
[13] Daniel M. Dobkin, The RF in RFID: Passive UHF RFID In
Privacy by design Practice, Newnes 2008 ISBN 978-0-7506-8209-1, chap-
ter 8
Proximity card
[14] John R. Vacca Computer and information security hand-
Resonant inductive coupling book, Morgan Kaufmann, 2009 ISBN 0-12-374354-0,
page 208
RFID on metal
[15] Bill Glover, Himanshu Bhatt ,RFID essentials, O'Reilly
RSA blocker tag Media, Inc., 2006 ISBN 0-596-00944-5, pages 88-89
Smart label [16] Ants home search habit uncovered. BBC News. 2009-
04-22. Retrieved 2013-09-03.
Speedpass
[17] Hitachis RFID powder freaks us the heck out. Engad-
TecTile get. Retrieved 2010-04-24.
Tracking system [18] TFOT (2007). Hitachi Develops Worlds Smallest RFID
Chip. Retrieved 2009-03-27.
RFID in schools
[19] Martein Meints (June 2007). D3.7 A Structured Col-
lection on Information and Literature on Technological
and Usability Aspects of Radio Frequency Identication
9 References (RFID), FIDIS deliverable 3(7)". Retrieved 2013-09-22.
[1] Automatic Identication and Data Collection (AIDC) [20] Paolo Magrassi (2001). A World Of Smart Objects: The
Archived May 5, 2016, at the Wayback Machine. Role Of Auto Identication Technologies. Retrieved
2007-06-24.
[2] Angell, I., Kietzmann, J. (2006). RFID and the end of
cash?" (PDF). Communications of the ACM. 49 (12): 90 [21] Pete Harrison (2009-07-28). EU considers overhauling
96. doi:10.1145/1183236.1183237. Retrieved 9 Novem- rules for lost air luggage. Reuters. Retrieved 2009-09-09.
ber 2013.
[22] [Miles, Stephen Bell (2011). RFID Technology and Ap-
[3] RFID Forecasts, Players and Opportunities in 2014- plications. London: Cambridge University Press. pp. 6
2024. IDTechEx. 8]
16 9 REFERENCES
[29] Archived August 1, 2015, at the Wayback Machine. [50] RFID Frequently Asked Questions. RFIDJournal.com.
Retrieved 2013-05-20.
[30] Bermudas RFID Vehicle Registration System Could
Save $2 Million/Year. Rdjournal.com. 2007-05-18. [51] Group Health Reinvents Patient Care With RTLS.
Retrieved 2013-09-03. RFID Journal. 22 August 2012.
[31] Smart License May Cut Car Theft. Rdjournal.com. [52] Veterans Aairs to Install RFID in Hospitals across
2002-10-11. Retrieved 2013-09-03. America. Impinj. 14 June 2013.
[62] Hsi, Sherry; Fait, Holly (2005). RFID enhances [83] Hancke, Gerhard P (2011). Practical eavesdropping
visitors museum experience at the Explorato- and skimming attacks on high-frequency RFID tokens.
rium. Communications of the ACM. 48 (9): 605. Journal of Computer Security. 19 (2): 259288.
doi:10.1145/1081992.1082021. doi:10.3233/JCS-2010-0407. Retrieved 10 August 2012.
[63] Schoolchildren to be RFID-chipped. Net- [84] Ilyas, edited by Syed Ahson, Mohammad (2008). 26.5.
works.silicon.com. Archived from the original on RFID handbook : applications, technology, security, and
April 27, 2012. Retrieved 2013-09-03. privacy ([Online-Ausg.] ed.). Boca Raton: CRC Press. p.
478. ISBN 9781420054996. Retrieved 7 August 2012.
[64] Williams, Christopher (2007-10-22). Schoolkid chip-
ping trial 'a success". Theregister.co.uk. Retrieved 2013- [85] RFID Privacy and Security. RSA Laboratories. Re-
09-03. trieved 2013-09-22.
[65] Epic Mix - Skiiers [sic] and Snowboarders Social Media [86] RFID Security and Privacy Lounge. Avoine.net. Re-
Dream. 2010-09-07. Retrieved 2013-09-22. trieved 2013-09-22.
[66] [87] Tedjasaputra, Adi (2006-12-11). Putting RFID Network
[67] Kinsella, Bret. (2010-09-07) Vail shows that Security in Perspective. RFID Asia. Retrieved 2007-08-
Consumer RFID delivers a better experience. 03.
Blog.odintechnologies.com. Retrieved on 2013-08-
[88] Albrecht, Katherine (2010). Microchip-induced tumors
16.
in laboratory rodents and dogs: A review of the literature
[68] How a pair of microchips could transform football into 19902006. IEEE. doi:10.1109/ISTAS.2010.5514622.
an intricate dance of data. DailyDot. Retrieved 1
September 2015. [89] Lewan, Todd (8 September 2007). Chip Implants
Linked to Animal Tumors. Washington Post.
[69] The NFL has a (RFID) Chip on its shoulder. News Surgo
Group. Retrieved 1 September 2015. [90] RFID chips can carry viruses. Ars Technica. Retrieved
2006-08-26.
[70] All NFL Players Are Getting RFID Chips This Season.
Wired. Retrieved 1 September 2015. [91] McCullagh, Declan (2005-10-25). Passports to get
RFID chip implants. wired.
[71] 0001-0782
[92] Sterling, Bruce (2006-11-17). RFID Passports cracked.
[72] Imagineering (2007). Optically Powered RFID Tags and Easily, cheaply, and quickly. wired. Retrieved 2007-03-
Optical Tag Readers. Retrieved 2009-03-27. 21.
[73] Regulatory status for using RFID in the EPC Gen 2 band [93] RFID Passports cracked through the mail. the register.
(860 to 960 MHz) of the UHF spectrum (PDF). GS1.org. Retrieved 2007-03-21.
2014-10-31. Retrieved 2015-03-23.
[94] Electromagnetically Opaque Sleeve Test Procedure ver-
[74] ISO Standard
sion 3.0.0 (PDF). GSA.
[75] O'Connor, Mary Catherine (March 18, 2009). Dash7 Al-
[95] FIPS 201 Evaluation Program Approved Products List
liance Seeks to Promote RFID Hardware Based on ISO
(APL)". U.S. CIO and the Federal CIO Councils.
18000-7 Standard. RFID Journal LLC. Retrieved 2010-
03-23. [96] FIPS-201, Personal Identity Verication (PIV) of Fed-
[76] Roberti, Mark (2004-12-16). EPCglobal Raties Gen 2 eral Employees and Contractors (PDF). NIST.
Standard. RFID Journal. Retrieved 2011-07-07. [97] Can Aluminum Shield RFID Chips?". RFID Shield.
[77] Catherine O'Connor, Mary (2004-07-12). Gen 2 EPC
[98] Aluminum Foil Does Not Stop RFID. Omniscience is
Protocol Approved as ISO 18000-6C. RFID Journal.
Bliss.
Retrieved 2011-07-07.
[78] Roberti, Mark (2006-05-06). A 5-Cent Breakthrough. [99] Markus Hansen, Sebastian Meissner: Identication and
RFID Journal. Retrieved 2007-01-26. Tracking of Individuals and Social Networks using the
Electronic Product Code on RFID Tags, IFIP Summer
[79] Bill Glover, Himanshu Bhatt, RFID Essentials, O'Reilly School, Karlstad, 2007, Slides.
Media, Inc., 2006 ISBN 0-596-00944-5 page 43
[100] Archived September 28, 2011, at the Wayback Machine.
[80] Radio Silence. The Economist. 7 June 2007.
[101] Archived February 7, 2009, at the Wayback Machine.
[81] RFID Technology Transforming Food Retailers Like
Wal-Mart [Google Inc, Ingram Micro Inc.. Seeking Al- [102] Katherine Albrecht; Liz McIntyre. The METRO Future
pha. 2010-03-18. Retrieved 2013-09-22. Store Special Report. Spychips.
[82] Whats New. Radio Frequency Identication (RFID). 4 [103] Richard M Stallman. The WSIS in Tunis. Fsf.org. Re-
April 2007. trieved 2013-09-22.
18 10 EXTERNAL LINKS
[105] monochrom. R F I D.
[111] EPC Gen 2 FAQ. Smart Card Alliance. July 2006. Re-
trieved 2015-03-25.
10 External links
UHF regulations overview by GS1
What is RFID? Educational video by The RFID
Network
RFID at DMOZ
What is RFID? - Animated Explanation
con8765, Scruy brit, Ggpur, Michael Frind, Bestpctech, Ronhip, Whalemusic, GirasoleDE, SaltyBoatr, SMC89, SieBot, TJRC, Tiddly
Tom, Dav1dyeo, Unregistered.coward, SE7, Pkgx, Mangostar, Nocohen, Joe3600, Dustman81, Mr.Z-bot, RucasHost, Happysailor, Oda
Mari, Babil2000, Nopetro, Yerpo, Rassmguy, Tasunke, Joshii, CasperMilquetoast, Whitely3000, Kcdmorris, Dillard421, KHLehmann,
Karl2620, Scruymmh, Fergussa, Anyeverybody, Sphilbrick, DRAGONrking, Arriba7, Pinkadelica, Treekids, JL-Bot, HairyWombat,
SeattleBrad, ElectronicsEnthusiast, Wdwd, Loren.wilton, Martarius, ClueBot, RFID-pro, Hyper12332, Phoenix-wiki, 113, Lurgy-
man, Avenged Eightfold, Douyan08, Brjoro, Rabindrabrj03, The Thing That Should Not Be, School20077002, Hypotroph, Timaru, Enthu-
siast01, Ignorance is strength, Cp111, Mild Bill Hiccup, Niemeyerstein en, Niceguyedc, Gizen, Stefanbcn, Gameforge, Auntof6, Pointillist,
Jannisri, Srrockefeller, Three-quarter-ten, Drydom, PixelBot, Mrbobster, Constrat, Jdenm8, Poisonink, Redthoreau, Dekisugi, Gunder-
sen53, Xme, Rangline, Chaosdruid, Aitias, Dank, Mgoltara, 2, Thunderstix, PeterJaquiery, Johnuniq, SoxBot III, DumZiBoT, Vbhatia71,
DeeJay100, Hyan christian, RianC, AlanM1, XLinkBot, Roxy the dog, PraveenKurup, Mfournier, PseudoOne, Mitch Ames, WikHead,
Constrat1, Nato Welch, Unimpeccable, Snapperman2, Osarius, Chaser120, Kingfaicl, Thebestofall007, Edebeun, Addbot, Mortense, Kvs-
nut, Melab-1, WiiUser23, Auto-ID, ARSMilano, AkhtaBot, Tanhabot, MagnusA.Bot, Fluernutter, MrOllie, Download, WolRon, Morn-
ing277, AndersBot, Oneletter, ChenzwBot, LinkFA-Bot, Tassedethe, Milestephen, Vargonis, Tide rolls, Lightbot, Iune, MuZemike, Wire-
less friend, Jarble, Cattons, Vegaswikian1, Abby1001, Shikharag1987, Yobot, WikiDan61, Tohd8BohaithuGh1, Incu, Huayuan, Mmxx,
Spacious, Comfortable, Enjoyable, Vroo, Thaiio, Nitro2k01, Koman90, AnomieBOT, Momoricks, Professor Tournesol, Rubinbot, Thad-
deusB, Ylnahar, Accuruss, Palace of the Purple Emperor, Piano non troppo, Ipatrol, SanilSalvi, Polarbear24, Ahmedak30, Kushagraalankar,
Materialscientist, SvartMan, Citation bot, Eumolpo, Wrelwser43, LilHelpa, Essamak30, Obersachsebot, Xqbot, TheAMmollusc, Konor
org, Injust, Ahmed.essamak30, The sock that should not be, Capricorn42, Renaissancee, Mattmacdougall, Rdosantiago, Anna Frodesiak,
Barkinfool, Jaizanuar, Ilovetheusa, Bhtpbank, RichHandsmGuy, Jgeorge60, Sdepares, Nasa-verve, GrouchoBot, Jordi igo, Donnerrm,
RibotBOT, Kyng, Wiki rd, Nanax, Alblefter, Texas141, Rdmonthly, GhalyBot, Smallman12q, Howwy29, Bo98, Jferdon, Renesmee-ej,
LeeBergerMD, Karlok69, Plot Spoiler, Hapekrk, DeNoel, GliderMaven, FrescoBot, Surv1v4l1st, Conradchase, Pathoptomist, Blackkn-
white, KateWoodcock, VS6507, Yickbob, Zygryk, Redmosquito86, Steve Quinn, Jakeblackman, Vishal Singhal, Hakusato, HamburgerRa-
dio, Citation bot 1, Shrestha027, Seepat, JohnathanP, I dream of horses, Adlerbot, Jonesey95, Tom.Reding, Rushbugled13, ThatWasThen,
Peburns, Manthanbhavsar, Pikiwyn, SpaceFlight89, Just a guy from the KP, Veritas66, Full-date unlinking bot, Bgpaulus, Danyeager,
GrahamAMM, Snircher, Augustwoods79, FoxBot, ClarityLost, TobeBot, Aadharp, Animalparty, Gautit, Vraya, Tooncoppens, Brandis-
mom1990, Betterman0720, Vrenator, Darp-a-parp, Sehateld, 777sms, Yo i rule, Jakejake94, Acatyes, Catshsticks, Conalhamill, Suu-
sion of Yellow, Yuysalli, Bimmiss, Qui516, Reach Out to the Truth, Kastang, DeepakChandran, Fshky2009, Saurael, Kamyarrasta, Rjwilm-
siBot, GM1995, Cloudancer, Jesse Greener, ElPeste, DSP-user, Apgilber, Bigb350, Smd75jr, EmausBot, John of Reading, Smarty9002,
MudskipperMarkII, MrFawwaz, Immunize, BillyPreset, Nkalandadze, Chandrashekhara h, Tisane, Sergedomk, Wikipelli, Dcirovic, We
hope, Anirudh Emani, Gagandeeps117, Rdtags, Meumeumarj, CYBRA1, Cayden Ryan, Jonpatterns, CandaceIDZ, Egomorales, Wikfr,
Kellystark, Allisonk45, Msheng1, Thine Antique Pen, Eprojetech, , Samarth.iitkgp, Donner60, Bobogoobo, Foot23ball, DragonFly0524,
MainFrame, Smogblog, MarcusLeDain, PJSweeney007, JanetteDoe, Purpley Stu, 28bot, Boblefevere, Jamac666, Homermlb, Kavya
Manohar, Jorge A. Morales, Silence89e, ClueBot NG, Kg2608, Thegoodstudent, Smtchahal, Jmcfarland27, Buskie13, Longbiaochen,
Matthiaspaul, CocuBot, Mountainseeker, Kunalnn, Stultiwikia, Kweir88, Anaelle.blonder, Rkolay~enwiki, Elemakwiki, Agrichuck2010,
Tristanwitt, Ntjones83, O.Koslowski, Ninjanoodle, Minhojo77, Widr, G8yingri, Reify-tech, Joe-rd, Richard.h.blaine, Ngilchr, Phila-
Siti, Willjbryan, Vibhijain, Fltyingpig, Helpful Pixie Bot, HMSSolent, Curb Chain, Nursinginformatics, BG19bot, Virtualerian, Osama
02, Frontmech, All Rows4, They, PhnomPencil, MusikAnimal, Kendall-K1, Casey7207, CDCalvert91, Op47, Compfreak7, Jkietzma,
Volkancc, Rm1271, Mrrd, Semanticwebbing, Zorglub x, Cjhorn, Mascarponette, Iaito, Vitrify, Scot gardner, Glacialfox, Next gen RFID,
Kitwezambia, Loriendrew, Anbu121, Skunk44, BattyBot, Cryptos2k, Pai Walisongo, Barcoding inc, Spital8katz, RFIDNetwork, Cyber-
bot II, Mr crawzs, GoShow, Jethro B, Yackermann, ISIOorg, Dexbot, Ryanussery, Bilal Bangash, Cerabot~enwiki, Lugia2453, Isarra
(HG), Joseperez22, Wrightbrett, 069952497a, Me, Myself, and I are Here, GPSwizard, Wortecom, Epicgenius, Bdolph, Ruby Murray,
Melonkelon, Whjms, Retrolord, Tentinator, Hendrick 99, Vhutienga, ObamaTyrant, PJSweeney2013, Babitaarora, UweFried, Ugog Niz-
dast, Jacquelyntwiki, AlexOn37, Ginsuloft, Jianhui67, Catverine, WikiJuggernaut, TF92, Hlbgle, Wikismartsg, TheEpTic, Rahulkrgupta,
Mbowma13, LogiTag Systems, Monkbot, SchippersID, Prashantakerkar, Ali.bulbul88, Gcs, BethNaught, Ddion4657, Armoroftruth, Gra-
hamJohnEdwardWright, Hlevy2, Wasdichsoveraenderthat, MarissaUBM, AlKrup, Kansiime, Saini naveen87, Bertus.home, Gcmbotha,
BrandonM07, Hphaikuku, WikiEditorial101, Qcrd, Knowledgebattle, InsaneHacker, Khaloudi, YITYNR, Bingomadangle, Iamsinner,
Sundayclose, KasparBot, Rinkykhanna234, IQnection1, Yasuo Miyakawa, ProprioMe OW, Alcoaariel, Martlmj, Sunfollowme, David-
meow1, Kurousagi, Sophia Andre, DigitalMarketingEditor, InternetArchiveBot, Williambinns07, Rd.automobile, GreenC bot, Stefan
Nolte, Gomyschool, Superchunk22, Bender the Bot, Wiki.user187, Seekw and Anonymous: 2105
11.2 Images
File:2008_Nike+_Human_Race_in_Taipei_the_ChampionChip.jpg Source: https://upload.wikimedia.org/wikipedia/commons/a/ab/
2008_Nike%2B_Human_Race_in_Taipei_the_ChampionChip.jpg License: CC BY-SA 4.0-3.0-2.5-2.0-1.0 Contributors: Rico Shen Orig-
inal artist: Rico Shen
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
File:EPC-RFID-TAG.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d8/EPC-RFID-TAG.svg License: CC-BY-SA-
3.0 Contributors:
EPC-RFID-TAG.jpg Original artist:
derivative work: Sakurambo (talk)
File:FasTrak_transponder.jpg Source: https://upload.wikimedia.org/wikipedia/commons/8/80/FasTrak_transponder.jpg License: CC-
BY-SA-3.0 Contributors: ? Original artist: ?
File:Marathon_Zeitnahme.JPG Source: https://upload.wikimedia.org/wikipedia/commons/8/80/Marathon_Zeitnahme.JPG License:
CC-BY-SA-3.0 Contributors: Own work Original artist: rupp.de
File:Microchip_rfid_rice.jpg Source: https://upload.wikimedia.org/wikipedia/commons/c/c7/Microchip_rfid_rice.jpg License: Public
domain Contributors: No machine-readable source provided. Own work assumed (based on copyright claims). Original artist: No machine-
readable author provided. Light Warrior assumed (based on copyright claims).
File:RFID_Tags.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e3/RFID_Tags.jpg License: CC BY 2.5 Contributors:
Self-photographed Original artist: Grika at English Wikipedia
11.3 Content license 21