RFID Essay

Decent Essays
Radio frequency identification (RFID) and wireless sensor networks (WSN)
Chengmei Ren
International American University
BUS 530 Management Information Systems
Matthew Keogh, PhD
Aug 15th 2015 Radio frequency identification (RFID) and wireless sensor networks (WSN)
Radio frequency identification (RFID) systems provide a powerful technology for tracking the movement of goods throughout the supply chain. The most controversial use of RFID is RFID tags in passports. Other uses of RFID include product tracking, hospital patient identification, asset tracking and security, animal identification, automotive security, car licenses, access systems and public transport payment systems. Wireless sensor networks (WSNs) are networks of interconnected
…show more content…
The Germans, Japanese, Americans and British were all using radar—which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-Watt—to warn of approaching planes while they were still miles away. Because of this, the capabilities of RFID have expanded exponentially. The development in RFID includes the decrease of components price, increased read ranges and accuracy, better anti-collision techniques, and increased performance in demanding and previously non-ideal environments. Much progress has been made in the last few years in creating global and industry standards for RFID, thus increasing compatibility and ROI of investments in RFID. (Jovix, …show more content…
A wireless ad hoc network is a collection of wireless nodes, which communicate directly over a common wireless channel. There is no additional infrastructure needed for ad hoc networks. Therefore, every node is equipped with a wireless transceiver and has to be able to act as a router, to process packets to their destinations. (Nack. F, n.d.)
Conclusion and Future
As a conclusion, we know that RFID and WSN are widely used in business world, they are efficient methods to monitor the status of products and One of the major advantages of RFID is that information exchange between tags and readers is rapid, automatic and does not require direct contact or line of sight.
Wireless sensor networks are used in monitoring environmental changes, traffic or military activity, protecting property, efficiently operating and managing machinery and vehicles, establishing security perimeters, monitoring supply chain management, or detecting chemical, biological, or radiological material. (Kenneth C. Laudon & Jane P. Laudon,

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    802.11b and 802.11a WLAN standards were made official in September of 1999 by the IEEE committee. Included with its ratification was Wired Equivalent Privacy (WEP) technology for authentication and encryption. When utilizing the WEP standard every frame is encrypted before transmission over wireless LAN by using the RC4 encryption technique. WEP utilized shared key authentication and open system authentication.…

    • 199 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Here’s why; Google Navigator and GPS services are more accurate when Wi-Fi is turned on, allowing your whereabouts to be tracked more easily. Brick-and-mortar stores are also getting in on the action. New technology allows retailers to track your every movement, gather data and monitor your behavior by following the Wi-Fi signals from your smartphone. Retail monitoring may make for a better future shopping experiences, but it just feels a little too much like invasion of privacy.…

    • 1361 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    1984 Government Privacy

    • 1135 Words
    • 5 Pages

    Pinpoints track any wi-fi-enabled devices like smartphones, tablets within a building. Ips will get all the information they need just from people using the wifi in any building “Ips services could easily track you right down to, say, the table you’re occupying in a mall’s food court as long as your mobile devices wifi is turned on” (Desmarais, 2012). The way in which any buildings are constructed not to mention physical obstacles people interfere with GPS abilities to pinpoint people's location, calls, text, and where they are at. Navizon ITS new technology is the navizon indoor triangulation services that review blogs discussion so “ITS can provide accurate tracking of wifi-enable devices, including smartphones,tablets, laptops, anywhere inside a building or throughout a campus” (Desmarais, 2012). Regarding location information specifically google’s privacy policy states that when you use a location-enabled google service they may collect and process information about your actual location, like GPS signals send to your mobile…

    • 1135 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    "None of our Business?" by Roberta Fusaro Raydar Electronics is a technology firm which makes radio frequency identification tags and readers. This article describes the use of RFIDs and where they are placed, what their intended purpose is, and why it has stirred commotion to people. Dante Sorella, a CEO of a technology firm informs the readers of some presentations that were given as well. One quick example of this that places such as the US military which have been experimenting with RFIDs on tires for vehicles they use. Further into the article, Marketing director at KoolKids incorporated Carol Sullivan and the CEO of KK Craig Davis took an interest in Raydar to know what is going in and out of the warehouse.…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    You may not believe it, but a famous movie actress invented the idea of wifi! This was the actress Hedy Lamar. She was voted most desirable women by soldiers in the 1940s. She didn't want to be known for her looks, she wanted to be know for her brains also. So, Hedy Lamar invented frequency hopping.…

    • 583 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Rfid Pros And Cons

    • 2432 Words
    • 10 Pages

    Topic: Radio Frequency Identification (RFID) -Pros & Cons 1.0 Explanation of marking justification. The topic of the pros and cons of radio frequency identification (RFID) had been evaluated during the presentation session and marks had been given. There are two categories in marking criteria which are content and presentation. For the content which 60 marks in total, there are divided into details which is research, relevance, topicality, and conclusion.…

    • 2432 Words
    • 10 Pages
    Great Essays
  • Decent Essays

    In phase one opportunities are sought by exploring inspiration, measuring product value chain and plotting the intra- and inter-business procedures while the possible of RFID technology is measured in phase two. Also, in phase two the test is replicated to make one last decision for the test study which is confirmed in the lab. In phase 3, supply chain test is run with RFID technology. While in the testing state, the products go through the RFID gateways, tags, and information are taken in the middleware and the matching operation are transported into ERP. When the products are shipped the information that was taken are updated in the…

    • 1017 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Tittle The use of SWOT analysis in the department of Home Affairs to identify a worthwhile project Contents Introduction 3 About the Department of Home Affairs 4 The Department of Home Affairs Vision 4 The Department of Home Affairs Mission 4 Strategic management 4 Weaknesses in the department of Home Affairs 4 eChannel Live Capture System Project 5 Benefit Realization 5 Improved Customer Service 6 Other Potential Savings 6 Electronic Banking 6 Security 6 Conclusion 6 Reference 7 Introduction The Department of Home Affairs (DHA) has introduced a new Smart Identity card (Smart ID) to replace the green bar-coded identity book.…

    • 1779 Words
    • 8 Pages
    Great Essays