SlideShare a Scribd company logo
RFID
RADIO FREQUENCY IDENTIFICATION
What is RFID?
• Radio-frequency identification (RFID) is an automatic
identification method using radio waves.
• RFID also began to see use in wildlife monitoring and
research. RFID tags can be used to monitor animal
movement without adversely affecting the animal.
There’s a chip
Implanted RFID tags in Humans
Applications
• Asset tracking
• Medical applications
• People tracking
• Retail
• Livestock
• Timing
Tag
• An RFID tag is a device that can store and transmit data
to a reader in a contact less manner using radio waves.
• RFID tags can be classified in three different ways.
Passive Tag
Active Tag
Semiactive Tag
Passive Tag
No on-board power source (for example, a battery)
Uses the power emitted from the reader to energize itself
and transmit its stored data to the reader
Reader always communicates first, followed by the tag.
Smaller than an active or semi-active tag. It has a variety
of read ranges starting with less than 1 inch to about 30
feet (9 meters approximately).
Cheaper compared to an active or semi-active tag.
Active Tag
Has on-board power source (for example, a battery; other
sources of power, such as solar, are also possible)
Own on-board power supply to transmit its data to a
reader.
No need for reader's emitted power for data transmission.
A tag always communicates first, followed by the reader.
Can broadcast its data to its surroundings even in the
absence of a reader
Semi-Active (Semi-Passive) Tags
Have an on-board power source (for example, a battery)
Uses the reader's emitted power for transmitting its data
Also called a battery-assisted tag.
Reader always communicates first, followed by the tag.
Reader????
An RFID reader can read from and write data to compatible RFID tags.
A reader thus doubles up as a writer. The act of writing the tag data by a
reader is called creating a tag.
The RFID System
1. Tag
2. Reader
3. Reader antenna
4. Controller
5. Host and software system
6. Communication infrastructure
RFID (RADIO FREQUENCY IDENTIFICATION)
Working
• A radio device called a tag is attached to the object that
needs to be identified.
• When this tagged object is presented in front of a suitable
RFID reader, the tag transmits this data to the reader (via
the reader antenna).
• The reader then reads the data and has the capability to
forward it over suitable communication channels.
• This application can then use this unique data to identify
the object presented to the reader.
• It can then perform a variety of actions.
Advantages
• Contactless. An RFID tag can be read without any
physical contact between the tag and the reader.
• Writable data. The data of a read-write (RW) RFID tag
can be rewritten a large number of times.
• Absence of line of sight. A line of sight is generally not
required for an RFID reader to read an RFID tag.
Advantages Contd.
• Variety of read ranges.
• Wide data-capacity range.
• Support for multiple tag reads.
• Perform smart tasks
Attacks on RFID System
• Reverse Engineering
• Eavesdropping & Replay
• Man-in-the-Middle Attack or Sniffing
• Denial of Service
• Cloning & Spoofing
Conclusion
RFID, is an emerging technology which can be used for a
variety of applications. However, the potential for abuse of
this technology is vast and requires careful consideration to
avoid.
• Questions???
Questions To Prepare
• What is RFID ?
• Explain the RFID tag and reader. what are the different types of tags ?
• Explain in brief working of RFID system with suitable diagram.
• What are the different types of attack on RFID system and also explain the Eavesdropping
and replay attack .
• Advantages of RFID system .

More Related Content

PPT
PPT
Rfidppt398 (1)
PPT
PPTX
Radio frequency identification (rfid)
PPTX
Maxim klimov 1433 how rfid works
DOCX
Rfid
PPTX
Final presentationmlis7505
PPTX
R1x g22 rfid ii
Rfidppt398 (1)
Radio frequency identification (rfid)
Maxim klimov 1433 how rfid works
Rfid
Final presentationmlis7505
R1x g22 rfid ii

What's hot (20)

PPTX
13212907 pss7
PPTX
Ioe module 3
PPT
Teamliftss library management
PPT
TEAMLIFTSS_Library_Management_V2
PPTX
wireless technology
DOCX
RFID Sensor and Its Working
PPTX
PPTX
14216213 pss7
PPTX
Rfid based employee tracking
PPTX
13213652 pss7
PPTX
13213822 pss7
PPTX
Arduino RFID Module (RC522) & Buzzer Access System
PPT
Applications of RFID technology
DOCX
Application of rfid technology in libraries
PPT
Radio Frequency1
PPTX
RFID (RADIO FREQUENCY IDENTIFICATION)
PPTX
Radio frequency identification
PDF
RFID based tracking System
PPTX
RFID AND LIBRARIES
PPS
Basics Of Rfid Technology
13212907 pss7
Ioe module 3
Teamliftss library management
TEAMLIFTSS_Library_Management_V2
wireless technology
RFID Sensor and Its Working
14216213 pss7
Rfid based employee tracking
13213652 pss7
13213822 pss7
Arduino RFID Module (RC522) & Buzzer Access System
Applications of RFID technology
Application of rfid technology in libraries
Radio Frequency1
RFID (RADIO FREQUENCY IDENTIFICATION)
Radio frequency identification
RFID based tracking System
RFID AND LIBRARIES
Basics Of Rfid Technology
Ad

Similar to RFID (RADIO FREQUENCY IDENTIFICATION) (20)

PPT
Rfid technologies
PPTX
PPTX
rfid presentation
PPTX
15251640 pss7
PPTX
ashok mule rfid presentation
PPTX
Rfid technology
PPTX
Ioe module 2
PPTX
Rfid technology
PPTX
Presentation.rfid
PPTX
Radio-Frequency IDentification ppt.pptx
PPTX
Rfid montaser hamza iraq
DOCX
Abstract Radio Frequency Identificatication
PPT
Rfid technologies
PPTX
12201731 PSS7
PPTX
15215237 pss7-ans
PPTX
PDF
Rfid security workshop v0.9 -nahuel_grisolia
PDF
Nahuel Grisolia. RFID Workshop.
Rfid technologies
rfid presentation
15251640 pss7
ashok mule rfid presentation
Rfid technology
Ioe module 2
Rfid technology
Presentation.rfid
Radio-Frequency IDentification ppt.pptx
Rfid montaser hamza iraq
Abstract Radio Frequency Identificatication
Rfid technologies
12201731 PSS7
15215237 pss7-ans
Rfid security workshop v0.9 -nahuel_grisolia
Nahuel Grisolia. RFID Workshop.
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD

RFID (RADIO FREQUENCY IDENTIFICATION)

  • 2. What is RFID? • Radio-frequency identification (RFID) is an automatic identification method using radio waves. • RFID also began to see use in wildlife monitoring and research. RFID tags can be used to monitor animal movement without adversely affecting the animal.
  • 5. Applications • Asset tracking • Medical applications • People tracking • Retail • Livestock • Timing
  • 6. Tag • An RFID tag is a device that can store and transmit data to a reader in a contact less manner using radio waves. • RFID tags can be classified in three different ways. Passive Tag Active Tag Semiactive Tag
  • 7. Passive Tag No on-board power source (for example, a battery) Uses the power emitted from the reader to energize itself and transmit its stored data to the reader Reader always communicates first, followed by the tag. Smaller than an active or semi-active tag. It has a variety of read ranges starting with less than 1 inch to about 30 feet (9 meters approximately). Cheaper compared to an active or semi-active tag.
  • 8. Active Tag Has on-board power source (for example, a battery; other sources of power, such as solar, are also possible) Own on-board power supply to transmit its data to a reader. No need for reader's emitted power for data transmission. A tag always communicates first, followed by the reader. Can broadcast its data to its surroundings even in the absence of a reader
  • 9. Semi-Active (Semi-Passive) Tags Have an on-board power source (for example, a battery) Uses the reader's emitted power for transmitting its data Also called a battery-assisted tag. Reader always communicates first, followed by the tag.
  • 10. Reader???? An RFID reader can read from and write data to compatible RFID tags. A reader thus doubles up as a writer. The act of writing the tag data by a reader is called creating a tag.
  • 11. The RFID System 1. Tag 2. Reader 3. Reader antenna 4. Controller 5. Host and software system 6. Communication infrastructure
  • 13. Working • A radio device called a tag is attached to the object that needs to be identified. • When this tagged object is presented in front of a suitable RFID reader, the tag transmits this data to the reader (via the reader antenna). • The reader then reads the data and has the capability to forward it over suitable communication channels. • This application can then use this unique data to identify the object presented to the reader. • It can then perform a variety of actions.
  • 14. Advantages • Contactless. An RFID tag can be read without any physical contact between the tag and the reader. • Writable data. The data of a read-write (RW) RFID tag can be rewritten a large number of times. • Absence of line of sight. A line of sight is generally not required for an RFID reader to read an RFID tag.
  • 15. Advantages Contd. • Variety of read ranges. • Wide data-capacity range. • Support for multiple tag reads. • Perform smart tasks
  • 16. Attacks on RFID System • Reverse Engineering • Eavesdropping & Replay • Man-in-the-Middle Attack or Sniffing • Denial of Service • Cloning & Spoofing
  • 17. Conclusion RFID, is an emerging technology which can be used for a variety of applications. However, the potential for abuse of this technology is vast and requires careful consideration to avoid.
  • 19. Questions To Prepare • What is RFID ? • Explain the RFID tag and reader. what are the different types of tags ? • Explain in brief working of RFID system with suitable diagram. • What are the different types of attack on RFID system and also explain the Eavesdropping and replay attack . • Advantages of RFID system .