You are on page 1of 9

RFID TECHNOLOGY

An Introduction to
RFID Technology

RFID is at a critical price point that could enable its large-scale adoption.
What strengths are pushing it forward? What technical challenges and
privacy concerns must we still address?

I
n recent years, radio frequency identifica- low-cost or provide enough added value for an
tion technology has moved from obscurity organization to recover the cost elsewhere. RFID
into mainstream applications that help isn’t as cheap as traditional labeling technologies,
speed the handling of manufactured goods but it does offer added value and is now at a crit-
and materials. RFID enables identification ical price point that could enable its large-scale
from a distance, and unlike earlier bar-code tech- adoption for managing consumer retail goods.
nology (see the sidebar), it does so without requir- Here I introduce the principles of RFID, discuss
ing a line of sight.1 RFID tags (see figure 1) sup- its primary technologies and applications, and
port a larger set of unique IDs than bar codes and review the challenges organizations will face in
can incorporate additional data deploying this technology.
Roy Want such as manufacturer, product
Intel Research type, and even measure envi- RFID principles
ronmental factors such as tem- Many types of RFID exist, but at the highest
perature. Furthermore, RFID level, we can divide RFID devices into two classes:
systems can discern many different tags located in active and passive. Active tags require a power
the same general area without human assistance. source—they’re either connected to a powered
In contrast, consider a supermarket checkout infrastructure or use energy stored in an inte-
counter, where you must orient each bar-coded grated battery. In the latter case, a tag’s lifetime is
item toward a reader before scanning it. limited by the stored energy, balanced against the
So why has it taken over 50 years for this tech- number of read operations the device must
nology to become mainstream? The primary rea- undergo. One example of an active tag is the
son is cost. For electronic identification tech- transponder attached to an aircraft that identi-
nologies to compete with the rock-bottom pricing fies its national origin. Another example is a
of printed symbols, they must either be equally LoJack device attached to a car, which incorpo-
rates cellular technology and a GPS to locate the
car if stolen.
However, batteries make the cost, size, and life-
About the Review Process time of active tags impractical for the retail trade.
Passive RFID is of interest because the tags don’t
This article was reviewed and accepted before Roy Want became IEEE require batteries or maintenance. The tags also
Pervasive Computing’s editor in chief. It went through our standard peer- have an indefinite operational life and are small
review process and was accepted 28 Nov. 2005. —M. Satyanarayanan enough to fit into a practical adhesive label. A pas-
sive tag consists of three parts: an antenna, a semi-

1536-1268/06/$20.00 © 2006 IEEE ■ Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25
RFID TECHNOLOGY

Figure 1. Three different RFID tags—they


come in all shapes and sizes.

and protects the antenna and chip from


environmental conditions or reagents.
The encapsulation could be a small glass
vial (see figure 2a) or a laminar plastic
substrate with adhesive on one side to
enable easy attachment to goods (see fig-
ure 2b).
Two fundamentally different RFID
design approaches exist for transferring
power from the reader to the tag: mag-
netic induction and electromagnetic
(EM) wave capture. These two designs
take advantage of the EM properties
associated with an RF antenna—the
near field and the far field. Both can
transfer enough power to a remote tag
to sustain its operation—typically
between 10 W and 1 mW, depending
on the tag type. (For comparison, the
nominal power an Intel XScale processor
consumes is approximately 500 mW,
conductor chip attached to the antenna, The tag antenna captures energy and and an Intel Pentium 4 consumes up to
and some form of encapsulation. transfers the tag’s ID (the tag’s chip 50 W.) Through various modulation
The tag reader is responsible for pow- coordinates this process). The encap- techniques, near- and far-field-based sig-
ering and communicating with a tag. sulation maintains the tag’s integrity nals can also transmit and receive data.1

RFID: From Obscurity to Wal-Mart

E ver since the advent of large-scale manufacturing, rapid iden-


tification techniques have helped speed the handling of
goods and materials. Historically, printed labels—a simple, cost-
control. It incorporated RFID tags into employee badges to auto-
matically identify people, limit access to secure areas, and make
it harder to forge the badges. Niche domains have also used
effective technology—have been the staple of the manufacturing RFID in various applications, such as to identify animals, label
industry. In the 1970s, labeling made a giant leap forward with airline luggage, time marathon runners, make toys interactive,
the introduction of Universal Product Code bar codes, which prevent theft, and locate lost items.
helped automate and standardize the identification process. Bar Regardless of these applications, RFID technology remained rel-
codes are also cheap to produce, but they have many limitations. atively obscure for many years. Now, however, three major organi-
They require a clear line of sight between the reader and tag, can zations are pioneering its large-scale adoption: Wal-Mart, Tesco,
be obscured by grease and nearby objects, and are hard to read in and the US Department of Defense. Each aims to offer more com-
sunlight or when printed on some substrates. RFID is an alternative petitive pricing by using RFID to lower operational costs by
labeling technology that has also been around for decades. streamlining the tracking of stock, sales, and orders. When used in
The British employed RFID principles in World War II to identify combination with computerized databases and inventory control,
their aircraft using the IFF (Identification Friend or Foe) system. In linked through digital communication networks across a global set
the 1960s, Los Alamos National Laboratory carried out work of locations, RFID can pinpoint individual items as they move
more closely related to modern RFID in its effort to explore access between factories, warehouses, vehicles, and stores.

26 PERVASIVE computing www.computer.org/pervasive


(a) (b)

Figure 2. RFID tags based on near-field coupling: (a) a 128 kHz Trovan tag, encapsulated in a small glass vial that’s approximately
1 cm long and (b) a 13.56 MHz Tiris tag (www.ti.com/rfid), which has a laminar plastic substrate (approximately 5  5 cm) with
adhesive for easy attachment to goods.

Near-field RFID and a tag. Thus, if the tag’s electronics reader coil. The magnetic field drops off
Faraday’s principle of magnetic induc- applies a load to its own antenna coil and at a factor of 1/r3, where r is the sepa-
tion is the basis of near-field coupling varies it over time, a signal can be encoded ration of the tag and reader, along a cen-
between a reader and tag. A reader passes as tiny variations in the magnetic field ter line perpendicular to the coil’s plane.
a large alternating current through a strength representing the tag’s ID. The So, as applications require more ID bits
reading coil, resulting in an alternating reader can then recover this signal by as well as discrimination between mul-
magnetic field in its locality. If you place monitoring the change in current through tiple tags in the same locality for a fixed
a tag that incorporates a smaller coil (see the reader coil. A variety of modulation read time, each tag requires a higher
figure 3) in this field, an alternating volt- encodings are possible depending on the data rate and thus a higher operating
age will appear across it. If this voltage is number of ID bits required, the data frequency. These design pressures have
rectified and coupled to a capacitor, a transfer rate, and additional redundancy led to new passive RFID designs based
reservoir of charge accumulates, which bits placed in the code to remove errors on far-field communication.
you can then use to power the tag chip. resulting from noise in the communica-
Tags that use near-field coupling send tion channel. Far-field RFID
data back to the reader using load mod- Near-field coupling is the most RFID tags based on far-field emissions
ulation. Because any current drawn from straightforward approach for imple- (see figure 4) capture EM waves propa-
the tag coil will give rise to its own small menting a passive RFID system. This is gating from a dipole antenna attached
magnetic field—which will oppose the why it was the first approach taken and to the reader. A smaller dipole antenna in
reader’s field—the reader coil can detect has resulted in many subsequent stan- the tag receives this energy as an alter-
this as a small increase in current flow- dards, such as ISO 15693 and 14443, nating potential difference that appears
ing through it. This current is propor- and a variety of proprietary solutions. across the arms of the dipole. A diode
tional to the load applied to the tag’s coil However, near-field communication has can rectify this potential and link it to a
(hence load modulation). some physical limitations. capacitor, which will result in an accu-
This is the same principle used in The range for which we can use mag- mulation of energy in order to power its
power transformers found in most homes netic induction approximates to c/2πf, electronics. However, unlike the induc-
today—although usually a transformer’s where c is a constant (the speed of light) tive designs, the tags are beyond the
primary and secondary coil are wound and f is the frequency. Thus, as the fre- range of the reader’s near field, and infor-
closely together to ensure efficient power quency of operation increases, the dis- mation can’t be transmitted back to the
transfer. However, as the magnetic field tance over which near-field coupling reader using load modulation.
extends beyond the primary coil, a sec- can operate decreases. A further limi- The technique designers use for com-
ondary coil can still acquire some of the tation is the energy available for induc- mercial far-field RFID tags is back scat-
energy at a distance, similar to a reader tion as a function of distance from the tering (see figure 5). If they design an

JANUARY–MARCH 2006 PERVASIVE computing 27


RFID TECHNOLOGY

Using induction for power coupling from reader to tag and


load modulation to transfer data from tag to reader

Magnetic field
affected by tag data

Data via
Power and data changes
in field
strength
(if tag supports RFID
write) tag

RFID
reader Binary tag ID

Glass or plastic
encapsulation

Coil

c/2πƒ
Near-field region Far-field region
Propagating electromagnetic
Alternating magnetic field in
waves
the near-field region

Figure 3. Near-field power/communication mechanism for RFID tags operating at less than 100 MHz.

antenna with precise dimensions, it can which can then detect the energy using a antenna for this purpose by placing a
be tuned to a particular frequency and sensitive radio receiver. By changing the transistor across its dipole and then turn-
absorb most of the energy that reaches it antenna’s impedance over time, the tag ing it partially on and off. As a rough
at that frequency. However, if an imped- can reflect back more or less of the design guide, tags that use far-field prin-
ance mismatch occurs at this frequency, incoming signal in a pattern that encodes ciples operate at greater than 100 MHz
the antenna will reflect back some of the the tag’s ID. typically in the ultra high-frequency
energy (as tiny waves) toward the reader, In practice, you can detune a tag’s (UHF) band (such as 2.45 GHz); below

Figure 4. RFID tags based on far-field coupling: (a) a 900-MHz Alien tag (16  1 cm) and (b) a 2.45-GHz Alien tag (8  5 cm).

(a) (b)

28 PERVASIVE computing www.computer.org/pervasive


Using electromagnetic (EM) wave capture to transfer power from reader to tag
and EM backscatter to transfer data from tag to reader

Data modulated
on signal reflected
by tag

Power RFID tag

RFID
reader
Binary tag ID
Glass or plastic
Data (if tag supports data write) encapsulation

Antenna dipole Propagating electromagnetic waves


(typically UHF)

Near-field region Far-field region

Figure 5. Far-field power/communication mechanism for RFID tags operating at greater than 100 MHz.

this frequency is the domain of RFID improved sensitivity so they can now product codes. This isn’t necessary for
based on near-field coupling. detect signals, for a reasonable cost, with basic inventory control, but it has impli-
A far-field system’s range is limited by power levels on the order of –100 dBm cations for tracing manufacturing faults
the amount of energy that reaches the in the 2.4-GHz band. A typical far-field and stolen goods and for detecting
tag from the reader and by how sensi- reader can successfully interrogate tags forgery. It also offers the more contro-
tive the reader’s radio receiver is to the 3 m away, and some RFID companies versial post-sale marketing opportuni-
reflected signal. The actual return signal claim their products have read ranges of ties, enabling direct marketing based on
is very small, because it’s the result of up to 6 m. prior purchases. (I discuss the related pri-
two attenuations, each based on an EPCglobal’s work was key to pro- vacy concerns later on.)
inverse square law—the first attenuation moting the design of UHF tags (see
occurs as EM waves radiate from the www.epcglobalinc.org), which has been Adopting a standard: The
reader to the tag, and the second when the basis of RFID trials at both Wal- Near-Field Communication
reflected waves travel back from the tag Mart and Tesco (see the sidebar for more Forum
to the reader. Thus the returning energy information about the trials). EPCglobal An important recent development
is 1/r4 (again, r is the separation of the was originally the MIT Auto-ID Center, opens up new possibilities for more
tag and reader). a nonprofit organization set up by the widespread RFID applications. Since
Fortunately, thanks to Moore’s law MIT Media Lab. The center later divided 2002, Philips has pioneered an open
and the shrinking feature size of semi- into Auto-ID labs, still part of MIT, and standard through EMCA International,
conductor manufacturing, the energy EPCglobal, a commercial company. This resulting in the Near-Field Communi-
required to power a tag at a given fre- company has defined an extensible range cation Forum (www.nfc-forum.org). The
quency continues to decrease (currently of tag standards, but its Class-1 Gener- forum sets out to integrate active signal-
as low as a few microwatts). So, with ation-1 96-bit tag is the one receiving the ing between mobile devices using near-
modern semiconductors, we can design most attention of late. This tag can label field coupling, and it uses an approach
tags that can be read at increasingly over 50 quadrillion (50  1015) items, that is compatible with reading existing
greater distances than were possible a making it possible to uniquely label passive RFID products. The new NFC
few years ago. Furthermore, inexpensive every manufactured item for the fore- standard aims to provide a mechanism
radio receivers have been developed with seeable future—not just using generic by which wireless mobile devices can

JANUARY–MARCH 2006 PERVASIVE computing 29


RFID TECHNOLOGY

communicate with peer devices in the beginning of the interrogation signal and
immediate locality (up to 20 cm), rather the tag’s response. But a collision might
than rely on the discovery mechanisms still occur, so the reader must initiate sev-
of popular short-range radio standards. eral rounds of interrogation until it hears
These standards, such as Bluetooth and all the tags in that area with high prob-
Wi-Fi, have unpredictable propagation ability. The number of rounds used,
characteristics and might form associa- number of tags present, and duration of
tions with devices that aren’t local. each tag reply can be used to calculate
The NFC standard aims to streamline the probability of all tags being detected.
the discovery process by passing wire- By modifying the number of rounds, we
less Media Access Control addresses and can adjust the probability to suit typical
channel-encryption keys between radios Figure 6. The Nokia 3200 cell phone operation conditions. We can further
through a near-field coupling side chan- features a Near Field Communications enhance this protocol by preventing tags
nel, which, when limited to 20 cm, lets reader. From the front, it looks like an that have already been heard by the
users enforce their own physical security ordinary cell phone, but on the back, you reader from responding on the next
for encryption key exchange. The forum can see the reader coil molded into the round until the current interrogation
deliberately designed the NFC standard housing. (figure courtesy of Nokia) cycle ends.
to be compatible with ISO 15693 RFID Using another anticollision approach,
tags operating in the 13.56-MHz band. the EPCglobal class-1 standard imple-
It also allows mobile devices to read this field communication techniques, work- ments an algorithm based on a Query
already popular tag standard and to be ing at UHF frequencies. Unfortunately, Tree protocol. The reader starts an inter-
compatible with the FeliCa and Mifare NFC and EPCglobal standards are fun- rogation cycle by asking which of the
smart card standards, widely used in damentally incompatible. ID space’s top branches (modeled as a
Japan. binary tree) contain tags. The algorithm
In 2004, Nokia announced the 3200 Reading colocated tags recursively repeats for each subtree
GSM cell phone, which incorporates an One commercial objective of RFID branch, but if a particular subtree doesn’t
NFC reader (see figure 6). Although the systems is to read, and charge for, all generate a reply, the reader won’t con-
company hasn’t published an extensive tagged goods in a standard supermarket sider any of its branches and subtrees in
list of potential applications, the phone shopping cart as it is pushed through an the remaining search space. In other
can make electronic payments (similar instrumented checkout aisle. Such a sys- words, that branch is pruned from the
to a smart card) and place calls based on tem would speed up the checkout binary tree. After a short time, all tags
the RFID tags it encounters. For exam- process and reduce operational costs. present will respond to the reader in
ple, you could place your phone near an Even if the RF reading environment for depth-first-search order. EPCglobal sys-
RFID tag attached to a taxi-stand sign, an RFID tag is ideal, it’s still an engi- tems using this anticollision algorithm
and your phone would call the taxi com- neering challenge to support multiple can potentially read 500 colocated tags
pany’s coordinator to request a taxi at colocated tags. Consider two tags situ- per second.
that location.2 This model offers a close ated next to each other and equidistant
link between the virtual representations from the reader. On hearing the reader’s Enabling a distributed memory
within a computer’s memory, such as the signal, both would acquire enough power revolution
positions of taxis being tracked by the to turn on and transmit a response back Another distinguishing feature of
dispatch computer, and the physical to the reader, resulting in a collision. The modern RFID is that tags can contain far
world, such as signs and people with cell data from both tags would be superim- more information than a simple ID.
phones. Furthermore, it is a key enabling posed and garbled. They can incorporate additional read-
technology for implementing Mark In CSMA (carrier sense multiple only or read-write memory, which a
Weiser’s vision of ubiquitous and perva- access)-based communication networks, reader can then further interact with.
sive computing.3 such as Ethernet, this is an old probl- Read-only memory might contain
A complication for broad adoption of em that an anticollision protocol can additional product details that don’t
the NFC standard is that state-of-the-art resolve. In its simplest form, the protocol need to be read every time a tag is inter-
EPCglobal RFID tags are based on far- inserts a random delay between the rogated but are available when required.

30 PERVASIVE computing www.computer.org/pervasive


For example, the tag memory might con- time of the second write, the first write purpose (see www.ksw-microtec.de/www/
tain a batch code, so if some products at least constrains when the forgery has startseite_en.php).
are found to be faulty, the code can help occurred to after the first time stamp. Antitamper product packaging is
find other items with the same defects. Unfortunately, passive RFID doesn’t another application domain for RFID
Tag memory can also be used to have the continuous power needed to sensing. Most modern consumable prod-
enable tags to store self-describing infor- support an onboard clock, so time ucts are protected by a packaging tech-
mation. Although a tag’s unique ID can stamps couldn’t be derived from the tag nology that clearly shows customers if the
be used to recover its records in an online itself. However, the readers—powered product has been tampered with. A sim-
database, communication with the data- from the infrastructure or from batter- ple binary switch (sensor) can be incor-
base might not always be possible. For
example, if a package is misdirected dur- Another application of RFID sensing is in relation
ing transportation, the receiving organi-
zation might not be able to determine its to perishable goods. An RFID temperature
correct destination. Additional destina-
tion information written into the tag sensor could both identify goods and ensure
would obviate the need and cost of a
fully networked tracking system. they remain within a safe temperature range.
Other RFID applications take advan-
tage of read-write memory available in ies in a handheld unit—could contain porated into an RFID tag, perhaps a thin
some tag types. Although the size of these an electronic clock and write time loop of wire extending from the tag
memories is currently small—typically stamps alongside other data written into through the packaging and back to the
200 to 8,000 bits—it’s likely to grow in the tag. tag. If tampering occurs, the wire breaks
the future and be used in creative ways. and shows up as a tamper bit when the
These tags could lead to a distributed RFID that incorporates sensing tag is read during checkout. In this way,
memory capability embedded in our sur- One of the most intriguing aspects of a store can ensure that it only purveys
roundings. If locations in a city were modern RFID tags is that they can con- tamper-free items. Furthermore, at each
tagged with RFID,4 a reader could write vey information that extends beyond point in the supply chain, you can check
messages directly into the tag. This might data stored in an internal memory and individual products for tamper activity,
be used for historical data or for updates include data that onboard sensors cre- making it easier to find the culprits.
about nearby services. ated dynamically.5 Commercial versions
Additionally, tags in commercial prod- of RFID technology can already ensure Privacy concerns
ucts could contain ownership history. For that critical environmental parameters RFID has received much attention in
example, a tag attached to secondhand haven’t been exceeded. For example, if recent years as journalists, technolo-
consumer goods might tell you about the you drop a package on the floor, the gists, and privacy advocates have
previous owners and when and where the impact might have damaged the enclosed debated the ethics of its use. Privacy
product changed hands. This is similar product. A passive force sensor can sup- advocates are concerned that even
to the providence documentation that ply a single bit of information that can though many of the corporations con-
often accompanies antiques of value; be returned along with an RFID tag’s ID, sidering RFID use for inventory track-
using RFID to extend this kind of track- alerting the system about the problem. ing have honorable intentions, without
ing to everyday items could provide con- Another application of RFID sensing is due care, the technology might be
sumers with greater confidence in their in relation to perishable goods. Typically, unwittingly used to create undesirable
secondhand purchases. items such as meat, fruit, and dairy prod- outcomes for many customers.
Time stamps can also be stored in an ucts shouldn’t exceed a critical tempera- The inherent problem is that radio-
RFID memory alongside other data that ture during transportation or they won’t based technologies interact through
has been written there. For example, if be safe for consumption. An RFID tem- invisible communication channels, so we
two writes occur sequentially but sepa- perature sensor could both identify goods don’t know when communication is
rated in time, the second write must and ensure they remain within a safe occurring. Consider a clothing store that
have occurred after the first write. If a temperature range. The KSW TempSens labels its garments with RFID tags. From
reader were trying to forge the writing RFID tag was designed explicitly for this the store’s perspective, this improves

JANUARY–MARCH 2006 PERVASIVE computing 31


RFID TECHNOLOGY

inventory stock checks, because employ- advocates argued that covert readers alientechnology.com) could supply RFID
ees can quickly catalog the contents of might steal the information, enabling tags for 12.9 cents each in quantities of
various racks and bins, even when cus- identity theft.7 The passport scheme is 1 million.)
tomers have mixed up the clothes. Also, still going forward, but the government Market analysts can’t agree on the
employees can perform fast periodic is modifying its implementation to price tipping point—will it be a 10-cent,
stock checks to detect thefts, which isn’t address public concerns. 5-cent, or 1-cent tag? Consider a 50-cent
usually an easy task. EPCglobal has addressed some of candy bar—if you replace a bar code
However, if the store fails to remove a these concerns by designing a kill switch (which costs nothing because you can
tag at the point of purchase, it’s possible in their tags that lets vendors perma- print it on the wrapper) with a 10-cent
to track customers every time they wear nently disable a tag at the point of sale. RFID tag, then you might not have any
remaining profit. Consequently, RFID
The press and civil libertarians have raised some tags are likely to have their first deploy-
ments with high-profit items. Of course,
genuine concerns, so it’s important that we when adoption does take hold, it could
rapidly accelerate as mass production
proceed cautiously to incorporate safeguards drives down prices.
Another important issue is design. We
that address the potential for RFID misuse. still need to engineer tags and readers so
that they guarantee highly reliable iden-
the tagged clothing. Vendors—including Vendors then wouldn’t have to remove tification. The solutions must be resilient
vendors other than the original seller— the tag itself, which might be woven into to all tag orientations, packaging mate-
could learn where the customer shops to a garment and (deliberately) difficult to rials, and checkout configurations found
better target the person with direct-mar- remove. Of course, concerns still exist in typical stores. Improved tag antenna
keting techniques. Even more troubling, that vendors might become complacent design can solve some of these issues. Tag
a criminal might track consumers, judg- and that not all stores would be vigilant readers can also be designed to exhibit
ing their wealth based on purchases, pos- about disabling the tags. An insidious antenna diversity by multiplexing their
sibly targeting them for theft. number of tags could still become part signals between several antenna modules
Although the potential for RFID mis- of our daily activities, which could later mounted in orthogonal orientations, or
use is high, undesirable scenarios can be be exploited for criminal purposes. by coordinating multiple readers. In the
turned into potentially useful ones. For RSA’s proposed solution is the concept latter case, we must avoid the reader col-
example, if clothes were tagged, wash- of a blocker tag8—a modified RFID tag lision problem,9 as interrogation signals
ing machine manufacturers could inte- that takes advantage of EPCglobal’s anti- will interfere with each other. A strict
grate RFID readers into the doors of collision protocol. The blocker tag time division scheme would allow mul-
their machines, making them aware of responds to each interrogation such that tiple readers to be deployed.
all items selected for washing. The it appears that all possible tag IDs are The final issue is acceptance. The press
machines could then choose the appro- present, so the reader has no idea what and civil libertarians have raised some
priate washing cycle and possibly warn tags are actually nearby. Perhaps having genuine concerns, so it’s important that
you about incompatible garments that simple countermeasures to prevent tag we proceed cautiously to incorporate safe-
might result in color runs. misuse is exactly what we need to over- guards that address the potential for RFID
The current focus, however, remains come privacy concerns. misuse. In 2003, Simson Garfinkel pro-
on the potential for misuse. A growing posed “An RFID Bill of Rights,”10 which
cloud of public and media concern forced Remaining challenges laid down a set of guidelines that retail-
Benetton, a well-known clothing store, Three main issues are holding back ers should adhere to in order to protect
to hastily retreat after it announced plans RFID’s widespread adoption, the first of citizens’ rights. Currently, no laws regu-
to use RFID tags in its stores.6 Concern which is cost. Although RFID tags are late tag use, and legislation might be
also surfaced when the US government now potentially available at prices as low required to assure the public. In the mean-
announced plans to put RFID tags into as 13 cents each, this is still much more time, early adopters such as Wal-Mart
passports to make them easier to check at expensive than printed labels. (As of Sep- and Tesco could help defuse concerns by
borders and harder to forge. Privacy tember 2005, Alien Technologies (www. publicly adopting a similar proposal.

32 PERVASIVE computing www.computer.org/pervasive


the AUTHOR

D
espite these challenges, RFID Roy Want is a principal engineer at Intel Research in Santa Clara, California, and
continues to make inroads leader of the Ubiquity Strategic Research Project. His research interests include
proactive computing, ubiquitous computing, wireless protocols, hardware design,
into inventory control sys- embedded systems, distributed systems, automatic identification, and micro-
tems, and it’s only a matter of electromechanical systems. He received his PhD for his work on “reliable manage-
time before the component costs fall low ment of voice in a distributed system” from Cambridge University. He is a Fellow of
the IEEE and ACM. Contact him at Intel Corp., 2200 Mission College Blvd., Santa
enough to make RFID an attractive eco- Clara, CA 95052; roy.want@intel.com.
nomic proposition. Furthermore, exten-
sive engineering efforts are under way to
wired.com/news/wireless/0,1382,58385, 9. D.W. Engels and S.E. Sarma, “The Reader
overcome current technical limitations 00.html. Collision Problem,” white paper MIT-
and to build accurate and reliable tag- AUTOID-WH-007, Auto-ID Center, Nov.
reading systems. We might also start to 7. R. Singel, “American Passports to Get 2001.
Chipped,” Wired News, 19 Oct. 2004;
see economic pressure from the larger www.wired.com/news/privacy/0,1848, 10. S. Garfinkel, “An RFID Bill of Rights,”
distributors to modify product packag- 65412,00.html. Technology Rev., Oct. 2002, p. 35.
ing and its associated materials to more
8. A. Juels, R.L. Rivest, and M. Szydlo, “The
effectively integrate RFID. Finally, at this Blocker Tag: Selective Blocking of RFID
delicate stage, while major corporations Tags for Consumer Privacy,” Proc. 8th For more information on this or any other comput-
are trialing the technology, media reac- ACM Conf. Computer and Comm. Secu- ing topic, please visit our Digital Library at www.
rity, ACM Press, 2003, pp. 103–111. computer.org/publications/dlib.
tion and outspoken privacy groups can
influence the rules by which we use the
technology. Given that legislation is now
in place among most of the developed
countries to protect our personal infor- D O N’T R U N T H E R I S K .
mation held in computers at banks and
other organizations, there is no reason
why RFID data management can’t
acquire a similar code of conduct.
RFID’s potential benefits are large,
BE SECURE.
and we’re sure to see many novel appli-
cations in the future—some of which we
can’t even begin to imagine.

REFERENCES
1. K. Finkelzeller, The RFID Handbook, 2nd Ensure that your networks operate safely
ed., John Wiley & Sons, 2003. and provide critical services even in the face
of attacks. Develop lasting security solutions,
2. R. Want et al., “Bridging Real and Virtual with this peer-reviewed publication.
Worlds with Electronic Tags,” Proc. ACM
SIGCHI, ACM Press, 1999, pp. 370–377.
Top security professionals in the field share
3. M. Weiser, “The Computer for the 21st information you can rely on:
Century,” Scientific Am., vol. 265, no. 3,
1991, pp. 94–104.
Wireless Security • Securing the Enterprise • Designing
4. T. Kindberg et al., “People, Places, and
Things: Web Presence of the Real World,” for Security Infrastructure Security • Privacy Issues
ACM Mobile Networks & Applications J., • Legal Issues • Cybercrime • Digital Rights Management •
2002, pp. 365–376. Intellectual Property Protection and Piracy • The Security
Profession • Education
5. R. Want, “Enabling Ubiquitous Sensing
with RFID,” Computer, vol. 37, no. 4,
2004, pp. 84–86. Order your subscription today.

6. E. Batista, “‘Step Back’ for Wireless ID


www.computer.org/security/
Tech?” Wired News, 8 Apr. 2003; www.

JANUARY–MARCH 2006 PERVASIVE computing 33

You might also like