Amity Business School SHRIKANT YADAV (D-38) CHAITANYA GANDHI (D-28) AKHIL SUNEJA (D-23) ANEESH BAJAJ (D-52) VAIBHAV SRIVASTAVA (D-59)
Amity Business School
SHRIKANT YADAV (D-38)CHAITANYA GANDHI (D-28)AKHIL SUNEJA (D-23)ANEESH BAJAJ (D-52)VAIBHAV SRIVASTAVA (D-59)
Amity Business SchoolIntroduction to RFIDIntroduction to RFID
Radio-frequency identification (RFID) is the use of an object (referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves.
Amity Business School
• Invented in 1948 by Harry Stockman.
• Initial application was during World War II-The United Kingdom used RFID devices to distinguish returning English airplanes from inbound German ones. RADAR was only able to signal the presence of a plane, not the kind of plane it was..
• Came into commercial use only in 1990s.
HISTORY OF RFIDHISTORY OF RFID
Amity Business School
RFID system contains three main components:
COMPONENTS OF RFID
Amity Business School
There are generally three types of RFID tags:
•Active RFID tags, which contain a battery and can transmit signals autonomously,
•Passive RFID tags, which have no battery and require an external source to provoke signal transmission, and
•Battery assisted passive (BAP) which require an external source to wake up but have significant higher forward link capability providing great read range.
TYPES OF RFID TAGS
Amity Business School
Amity Business SchoolREADER A device that is used to interrogate or read a Tag.
Basic components are: A scanning Antenna
A transceiver with a decoder to interpret data
Helps in personalizing data and sometimes even edit Tags as well.
Amity Business SchoolComponents of RFID(cont’d)Components of RFID(cont’d)
Amity Business SchoolRFID ARCHITECTURE
Tags Reader
Gateway
Database
Database
Application
User Interface
Backend
Fig.1. A General Overview of RFID Architecture
Scanned
Firstly items-tag are scanned by reader;
Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;
And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.
Amity Business School
Amity Business SchoolUses/Benefits of RFIDUses/Benefits of RFID
oTransportation paymentsoAsset Management,Warehousing
oProduct Tracking oReal-Time Location SystemsoSupply Chain Management(Inventory)
oVehicle IdentificationoPoint of Sale,RetailoCalculate the RACE timingoLibraries,School,Passport,Human implants
Amity Business School
• Benefits to retailers, manufactures etc.Reduced on-hand inventory and less use of “safety
stock”.Increased sales through reduced out-of- stocks.Increased stock visibility and availability.Reduced transportation cost and shipping volumes.More accurate forecasts and stock replenishment.Reduced shrink and theft in the supply chain.
• Benefits to customersBetter in-stock - product on the shelf when you want itImproved Product SelectionProduct Freshness for Dated GoodsEasier Identification on Recalls
Amity Business SchoolIssues / ConcernsIssues / Concerns
Amity Business SchoolIssues / ConcernsIssues / Concerns
Cost of RFID technology.Active RFID life – 2 to 4 years.Privacy concerns- consumer surveillance.Extreme weather.Security concerns-illicit tracking of RFID tags.Global standardization.Environmental concern- recycling.RFID systems are vulnerable to virus.
Amity Business SchoolRFID Vs Bar CodeRFID Vs Bar CodeRFID Barcode
Forging is difficult Forging is easy
Scanner not required. No need to bring the tag near the reader
Scanner needs to see the bar code to read it
RFID is comparatively fast Slow
Can read multiple tags Can read only one tag at a time
Relatively expensive as compared to Bar Codes
(Reader 250$, Tag 20 cents a piece)
Relatively Cheap and widely available
Can be reusable within factory premises
Cannot be reused
Amity Business SchoolVEHICLE IDENTIFICATION USING RFID
Amity Business School
• RFID Vehicle identification is mainly designed to track and manage vehicles in parking areas or toll plazas to allow for accurate vehicle tracking as well as easy in-and-out access for drivers.
• The setup includes passive UHF RFID windshield sticker tags attached to the windshields of vehicles, and readers (like DL910) installed on fixed overhead or roadside structures identifying cars in motion. With RFID, car information can be automatically gathered to enable efficient vehicle management, while maintaining high identification rate.
Amity Business School
• The RFID solution is supported by long range RFID readers with long read range of up to 15 meters depending on the tags, as well as smart card type tags or RFID labels used for drivers' licenses and access control tickets. And a unique identification code is established for each car via a tamper-resistant windshield sticker tag for the secure operation of the RFID vehicle tracking system.
• Hands-free, long-distance, reliable and highly secure, the RFID meets the requirement of parking lot and gated communities, with nearly no human intervention and low operation cost.
Amity Business SchoolSWOT ANALYSISSTRENGTHS WEAKNESSES 1.Tags are cheap and can be easily fitted in the car.2.Tags can’t be easily tampered.3.It helps in identifying the car from a distance, which is important from security point of view.4.Ease of use as there is no hassle of opening and closing the gates manually.5.Automatic toll collection.6.Tracking and monitoring of the car is easier.7.Prevents theft.8.Is reliable with optimum cost and performance.
1.Initial cost incurred is high.2.Readers have high electricity requirement.3.Skilled personnel are required to handle the backend of the System.4.Lack of standards.
Amity Business School
OPPORTUNITIES THREATS1. Market potential for the product is
good and is a new application in a developing technology.
2. RFID scanners can be used to ensure that proper key is used for starting the car.
3. Can be used by law enforcement to check that car is made of stolen or genuine parts.
4. License plates can be have embedded RFID tags.
5. Can be used on petrol pump to speed up the payment.
6. Tracking of rental cars can be done using satellite.
1. Other GPS applications are already present in market.
2. Bar codes are used extensively in market and have already dominated the market.
3. Security is always an issue, attacks like the one on Parliament can be easily replicated.
4. Privacy is a concern since one can be easily monitored or tracked.
Amity Business SchoolRFID OVER THE YEARS
Amity Business SchoolInitiatives in RFIDInitiatives in RFID
Patni Computer Systems Lab – Implemented Animal Tracking System
Wipro Technologies - Member of the Electronic Product Code (EPC)
- Setting up a lab to study RFID
- Working on pilot projects
Infosys Technologies – RFID consulting on logistics player in the RFID space.
TCS have tied up with Hyderabad university to produce RFID tagged mark sheets & degrees to deter use of fake degree.
Intellicon - pilot project for BEL Bangalore, tags installed on employee buses. Buses inside the BEL campus were tracked with the aim of gauging employee punctuality.
Amity Business School