Radio Frequency Identification (RFID)

Good Essays
Radio Frequency Identification (RFID)
Radio-Frequency Identification (RFID) is a wireless technology that uses radio waves to read and capture information stored on a tag. A RFID reader can read the tag from upto several feet away. However unlike barcode, it does not need to be within direct line-of-sight of the reader to be scanned. There are two different type of tags: one is passive tag which collects energy from a nearby RFID reader 's radio waves; and another one is active tag that has a battery and may operate at longer distance than the passive tags. RFID tags can be attached to mostly any physical object like clothes, cars, cash, etc. Even, it can be implanted in pets as well as humans (Kabachinski, 2005).
A human microchip implant
…show more content…
RFID Implants and RFID tags in consumer items has raised ethical issue for privacy of people and their information. A person with RFID chip under his skin could be tracked wherever he is, and his information could be gathered by a RFID reader at certain frequencies. A chip used for medical purposes contains person’s personal information like name, address, etc. as well as his medical information that is excessively private for anyone. Once a malicious person knows that a person living in a particular house has RFID chip implanted, he can scan the house from nearby distance to check if a person is present in the house or not. This would give an invader an opportunity to break in. RFID chips are also used for tracking pets by implanting it in them. The RFID chip contains the information that would help a pet be returned to its owner. However, the information about the pet-owner could be used to assist in identity theft or …show more content…
The beneficial features of RFID come at the cost of a lack of security. A primary RFID security concern is the unlawful tracking of RFID tags. They are insecure since anyone with a tuned reader can retrieve the information stored on them. As earlier mentioned, tags are very small, so it would be possible that a consumer do not even know it is there. Furthermore, the reading range is expected to increase from its existing shorter distance. Besides the information stored on it, RFID also stores a serial number ‘electronic product code (EPC)’ which uniquely identifies a specific item (Cochran, Tatikonda, & Magid,

Related Documents

  • Decent Essays

    NFC and RFID Radio Frequency Identification (RFID) is a wireless use of electromagnetic fields to transfer data, aiming to automatically identifying and tracking tags attached to objects. Near Field Communication (NFC) is one specific type of RFID, and shares many physical properties with it. The differences between NFC and RFID is that many extra properties were developed for NFC to enable secure mobile payments. 1.1. Radio Frequency Identification (RFID) RFID was first patented in 1983 and is the precursor to NFC.…

    • 1929 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    The innovation of the RFID chip or the Radio Frequency Identification has been a critical piece of technology that has been around since the 1950’s.. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip known as identity chip. A microchip implant could be used as a virtual barricade, to limit movement, and even to act as a tag for prisoners. In the realm of medicine, it could be used to save medical records for patients, records that could be pulled up anywhere in case of an emergency. It could also be used to monitor people with Alzheimer’s disease.…

    • 958 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Some people might say that testing on humans is not an option, so they test on animals instead, however research shows that before a product is released for sale it is tested on a human. There are micro brains that scientists have developed that can also be used for the purpose to retrieve results. “The organs have potential to help model neural problems in their earliest form to test the safety of drugs” (Verger 2013). The micro brains are used to test on drugs meaning it’s another way to test if certain drugs are safe, they test drugs such as tobacco, and vaccines on animals which can be prevented if they use micro brains more often. Human tissue, once developed and integrated, researchers can use these models to predict whether a candidate drug, vaccine or biologic agent is safe or toxic in humans in a faster and more cost-effective way than current methods.…

    • 1568 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Radio-frequency identification also known as RFID is the use of wireless technology that uses electromagnetic fields to transfer data, for the purpose of automatically identifying and tracking RFID tags that are attached to objects. The RFID tags will have information that is electronically stored. Some of the tags will be powered by an electromagnetic induction from magnetic fields that are produced near the readers. Certain RFID tags will collect energy from the reader’s radio waves and will respond like a passive responder. Different types of RFID tags will have batteries built into them and which will power the tags.…

    • 808 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Also, avoid making the bed every morning, and if you cannot afford a home security system, you can also light up your house to keep the burglars guessing about where your valuables might be. Small actions can keep a burglar from trying to get into your home. Criminals are often searching for the easiest target because they do not want to get caught in the process. In particular, be on the lookout if you have a door knob that can be rubber banded in the same way that happened to Kim. Had she opened that door, the burglar could have burst through, and she would have been the victim of a burglary.…

    • 500 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    It should also have an Uninterruptable Power Source (UPS) to protect against power outages and power surges. Decide if you want a monitored system or not. A video security system is only one part of securing your home. What would happen if a criminal decided to enter your home when you are not home? The video cameras will capture that person entering the premises.…

    • 755 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Sensor-network nodes include sensors to measure and report on properties (such as temperature and movement) of their environments (Borriello, 2005). It’s possible to utilize RFID eventually to monitor individuals for health issues and their location. While this is certainly possible, again one has to consider how much information they want to available, taking into account privacy concerns and intrusive governments. Who would want “Big Brother” knowing their location at all times? Borriello goes on to say one can imagine a world where there is an RFID tag in every manufactured object and even non-manufactured objects such as people, animals, and natural…

    • 1464 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cell phones, for example, use radio waves too, but in a different way. Cell phones work by using cell towers, which are usually far away. Bluetooth…

    • 746 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    It has yet been changed to adapt to the new influx of electronic devices. This leaves the integrity policies vulnerable to more advanced cheating methods using electronic devices. As long as the outdated rules and regulations are still in effect, it can not efficiently prevent cheating. Rather as it encourages cheating since it has become easier [1]. The main problem with cheating or exploitation is not so much the individual, but rather the rules and regulations themselves.…

    • 1245 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Visible Light Communication – Tomorrow’s Technology YASHODHA J K NITHYASHREE N Weir EnSci, Bengaluru Weir EnSci, Bengaluru yashodhajk@gmail.com Nithyashree0292@gmail.com Abstract-The Visible Light Communication (VLC) is an emerging technology, which provides distinct facilities such as fast data communication, secure data communication, high data rate wireless communication, etc. Instead of radio frequency, VLC uses light, to transfer data. The visible light spectrum is unlicensed and 10,000 times larger than the range of radio frequencies. It can be used as an alternate to the existing radio based wireless communication technologies or in hybrid. Moreover, Integrated VLC resolves issue of load balancing in existing wireless…

    • 1659 Words
    • 7 Pages
    Decent Essays