International Business Management

Year: 2010
Volume: 4
Issue: 1
Page No. 28 - 34

Advantages and Risks of RFID in Business Applications

Authors : Vladimir Modrak, Peter Knuth and Jozef Novak-Marcinein

Abstract: Radio Frequency Identification (RFID) technology in business and industry is rapidly starting to show its growing potential in comparison with other identification technologies. With RFID's expanding role in business applications questions concerning not only gains but also risks are arising. The purpose of this study is to highlight selected areas of this technology that may be critical for its further exploitation in business applications. A comprehensive review approach was used to guide the research process. The relevant literature findings were gathered and sorted into the categories as advantages, disadvantages, readability and privacy security. Differences between RFID and barcode technologies, especially in terms of their use in information management are also discussed in this study. Further, selected critical aspects of RFID development and applications are described. Finally, summative inferences and anticipated expectations of future RFID deployment in business and enterprises are outlined.

How to cite this article:

Vladimir Modrak, Peter Knuth and Jozef Novak-Marcinein, 2010. Advantages and Risks of RFID in Business Applications. International Business Management, 4: 28-34.

INTRODUCTION

RFID (Radio Frequency Identification) technology can be expressed in the most universal manner as wireless identification method, which doesn’t need the line of sight to be read or written. It improves communication capabilities of electronic information to be associated with physical items. RFID technology can be basically used in business applications that previously required a bar code or label. The RFID tags are primordially used for identification purposes, such as for employee id/access badges to monitor everyone's whereabouts and credit card account identification. The advantage of RFID tags is that they are small in size and can contain more information than a bar code, which is limited to a single sequence of numbers. On the other hand RFID and barcode technology complement each other because both of them are beneficial in different situations and can be used together in many applications.

RFID devices can be divided into two classes, active and passive. Active tags require a power source, usually a small battery. Passive RFID relies on RF energy transferred from the reader to the tag to generate its own quick response. A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna and some form of encapsulation. The main difference between bar code and RFID technologies as stated by Want (2006) is that RFID tags support a larger set of unique IDs than bar codes and can incorporate additional data such as manufacturer, product type and even measure environmental factors such as temperature. Moreover, RFID systems are able to perceive many different tags located in the same area without human assistance. Due to the fact that advantages and risks of RFID are still discussed, this study treats about selected aspects of this technology that may be critical for its further development and applications.

RFID technology advancement: Principles of RFID technology are based on the fundamentals of electromagnetic energy, radio broadcast technology and radar technology. The first active Identification Friend or Foe (IFF) system was developed by the British during world war II. It was radio frequency identification technology for identification of friendly aircrafts. As it has been described by Landt (2001), each aircraft carried a transmitter, which began to broadcast signal back after receiving signals from radar stations on the ground. As further important milestone can be considered the patent on RFID. In the same year, Charles Walton invented access control system based on RFID. The first widespread RFID tag was 1-bit tag (the bit is either on or off) as a part of Electronic Article Surveillance (EAS). EAS could only detect the presence or absence of the tag. In other words if someone doesn’t pay, the tag remains on and the readers at the door detects the tag and the alarm sounds to alert un authorized removal. The U.S. government was also supporting research and development of RFID systems. Los Alamos National Laboratory in New Mexico soon became a leading center for R&D of this technology, as mentioned by Shepard (2005). In this laboratory automated toll payment systems and passive RFID tag to track cows was developed. Both are still using all around the world. Further development lead to use higher frequencies that allowed greater and faster data transfer rates. In 1999 Uniform Code Council, EAN International, Procter and Gamble and Gillette founded an Auto-ID Center project at Massachusetts Institute of Technology for development of RFID standards. The main result of this research was Electronic Product Code (EPC). To other results can be countered air interface protocols (Class 1 and Class 0) and network architecture scheme by linking objects to the internet through the tag. After that Uniform Code Council and EAN International created joint venture EPC global Inc to commercialize EPC technology.

Safety of RFID technology is equally explored as mentioned aspects in its development. To corroborate it by facts the following events can be mentioned. In January 2005 students at John Hopkins University broke encryption of Speed Pass electronic payment and RFID Point of Sale (POS) system. In February 2006 Adi Shamir reported that he could monitor power levels in RFID tag which can be used to compromise Secure Hashing Algorithm-1 (SHA-1) used in some RFID tags (Thornton et al., 2006). However, it is not the reason for a resignation, as a level of risks depends in generally but also in the specific area, on preventive actions. The example supporting this statement offers the situation in privacy protection. In contrast to barcode technology, RFID technology has greater implications on individuals’ privacy because RFID tags used in personal identification cards can be read from an abundant distance without that person’s knowledge or consent. Therefore, blockers for passport RFID tags in a form of passport jackets containing physical barrier and other countermeasures as unique identifier numbers, encryption and mutual authentication technology has been developed. On the other hand, the more sophisticated protections bring opportunities for potential failures.

MATERIALS AND METHODS

A comprehensive review methodology was used to allow comparisons of advantages and risks of RFID technology across business and industrial applications. Focus of this methodology is based on literature review. Conducted literature research was based on a broad range of sources including journal papers, conference proceedings, industry reports, whitepapers, standards, press releases and books. Selected explored areas are further verbally analyzed and finally picked aspects are briefly described in the form of the table by focusing on advantages, disadvantages, readability and privacy security of RFID technology.

Critical aspects of RFID development and application: Most practitioners are rather skeptical about the actual utilization of RFID technology taking under considerations more reasons. According to Modrak and Knuth (2009), tag reliability today is considered relatively high by early adopters, at the start of using the tags there was a significant amount of faulty tags. According to the research of the Economist Intelligence Unit by Jacoby and Lofthouse (2006), failure rates in the first generation of RFID tags have been up to 30%. Such relatively high failure rate could not be acceptable, if 100% read rate is essential for successful implementation. Another problem arises due to the fact that tags are read automatically without human interaction. Therefore, theoretically malfunctioned or unreadable tags are not identified by system. This becomes a serious issue for business applications built around RFID if 100% read rates are implicit as part of the core business application design, states (Shutzberg, 2004). Dignan and Nash emphasizes that one of the big reasons why practitioners are less than enthusiastic about these RFID systems is the lack of standards. Standards bodies and academic institutions should harmonize hardware and software standards globally. Until now, most of the standards work has been focused on the US market. China may to be pursuing other standards entirely. Edward Zeng, a member of the China Auto-ID working group, points out that the vast majority of mobile phones in China operate on a GSM standard because Nokia and Ericsson shared their technology more openly than their US-based competitors.

In a research study by Hingley et al. (2007) has been uncover that in area of supply chain and production management RFID users need to develop not only standardized but also flexible RFID system solutions since they might take into account the context of supply chain power imbalance. This problem comes up when RFID system tracks both ISO tags and EPC tags of varying encoding formats. Then tag decoding tasks can involve significant research. To accomplish this task correctly, developers might work with fairly complex specifications often for multiple tag formats within their application, all of which can add up to a significant amount of new code. Thus, Teskey (2006) thinks that the decoding efforts involved in building a flexible RFID system can be reduced by adopting an RFID middleware platform to perform the decoding tasks automatically, exposing decoded, meaningful data to applications and business logic through easy-to-use interfaces and development options.

The enormous amount of potentially sensitive data collected by RFID technology makes security a critical aspect in its applications. Therefore, to prevent this risk, the administrative interface, at the lowest level it must be protected by authentication and authorization mechanism. As authentication and authorization protocol can be used so called Secure Socket Layer (SSL) that creates a secure connection between a client and a server, over which any amount of data can be sent securely. However, this protocol is not very commonly used in middleware solutions. Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP), which is designed to transmit individual messages securely.

According to Thiesse (2006), the highest ranked risk by far is the risk of using RFID in order to spy on RFID equipped goods and their owners. In such case consumer privacy is endangered, purchasing anonymity is reduced or eliminated and civil liberties are threatened. Data security of RFID technology depends also on the class and generation of RFID tags. RFID tags are more difficult to replicate, their electronics is more complex than barcodes and barcodes electronics. It was developed new security method uses the concept of random numbers, which are applied to encrypt data sent by the tags so that each message transmitted is unique (Holcomb et al., 2007). Ruefulness, the small sized RFID tag isn't built for that function. Creating smart borders is another application of improving home security together with increasing the security of international shipping containers. According to Adams et al. (2006), the contactless IC chip and other RFID technologies are central to the vision of the revolution in border security. RFID attacks can be in general classified into denial of service or relay attacks, sniffing, tracking and spoofing. Techniques like trusted RFID readers or access control mechanism that are located either on a tag like hash locks (Weis et al., 2004), pseudonyms (Juels, 2005) or off the tag are used in order to prevent unauthorized threats and attacks. Off the tag RFID access control mechanisms are for example, Rieback et al. (2006) RFID Guardian, RFID Enhancer Proxy (Juels et al., 2005). The Blocker Tag (Juels et al., 2003) and Foe Bud Data privatizer. According to Karjoth and Moskowitz (2005), the easiest way still remains deactivating RFID tag permanently through frying, clipping or as states by Spiekermann and Berthold (2005), killing or temporarily using sleep/wake modes or Faraday cage. In the field of cryptography new low-power algorithms like stream ciphers (Finkenzeller, 2003), block ciphers (Feldhofer et al., 2004), lightweight protocols for authentication (Vajda and Buttyan, 2003) and public key cryptographic primitives have been created.

Risks associated with RFID include also harmful electromagnetic radiation. But according to Wyld (2005), there are no concerns about the risks of the health aspect. One can never be sure but this is scientifically proved. For example frequencies 13.56, 915 MHz and 2.45 GHz have been used for many years without any known problems if levels are <1 watt or 4 watt at frequency 13.56 MHz. Overall, most relevant critical aspects are summarized into Table 1.

RESULTS AND DISCUSSION

It is evident that the most RFID applications have been installed in the fields of supply-chain management systems, transport and logistics. Other RFID applications that already have been successfully deployed are shown in Fig. 1. Especially, as perspective area of RFID application appears to be product life cycle traceability, where the generated product data can be read automatically and forwarded to different information systems.

In the supply chain, the biggest advantage that RFID has over bar code is the ability to automatically read large groups of tags eliminating the labor needed to manually scan the large volumes involved in the supply chain.


Fig. 1:

RFID successful projects by application areas (European research on RFID tags)

Table 1:

Picked aspects of RFID in business applications

Improving visibility in the supply chain systems gives managers better visibility, which enables identification of bottlenecks and elimination of loss in unplanned operations. Potential benefits of RFID implementation in the supply chain management are counterfeit and fraud reduction, improved efficiency, labor cost reduction, stock shrinkage, stocking management improvements and improved customer satisfaction.

Talking about reliability of automatic identification technology, an attention might be focused on the ability of readers to identify codes from tags at the first time. The possible interferences of bar codes make optical barriers such as objects placed between bar code and reader or dirt. Also, they are unreadable under extreme atmospheric conditions such as steam or when vertical damage occurs. Bar code readers are sensitive to dirt, dust or other foreign object obstructing the lens too. But 2-D bar codes can be read even if part of the tag is destroyed. Passive RFID tags can interference with environments or fields and various materials such as liquids and metals that affect transmission of radio frequency. Active tags are less susceptible to interference. Despite this, they can be read under extremer weather conditions than bar codes. On the other hand bar codes that could not be read and easily entered manually.

Understandably, there is no universal solution for implementation of RFID at all. It is always necessary to fit RFID system to meet company needs. And because there are numerous types of RFID tags the selection of proper RFID tag system is essential. It is better to start with smaller project and obviously in detail defined problem rather than to fail. But there are a lot of similar solutions that have a typed character. For instance, in income logistics it is often difficult to know what good are on which truck without first unloading the truck. It makes it impossible to direct the truck to the right drop off or parking yard location.

RFID tags can be placed on truck trailers and RFID readers placed at entry and exit points of yards allowing information systems to log the incoming and outgoing data in real-time. Then the incoming trucks can be directed to the most efficient unloading location. The same approach can be applied to forklift drivers at warehouses. The effective RFID-based warehouses management systems have significantly reduced number of pallets and eliminated trucks waiting to the minimum.

Opportunities enabled by RFID are expected apart from abovementioned effects in simplification of business processes. Many manufacturing organizations have processes, where a product, asset, document or even a person is touched by many different people at different times.

It causes limited view of information that can introduce inefficiencies in the overall process when information about other steps is needed to execute the current step. Accordingly, common MES/ERP systems can not have an access to detailed information and they have no idea of what is really happening to material flow on the shop floor. When all data that information systems operate with are fed to them by intermediary subject, information on material flow is time dependent so it is already outdated when inserted into the information system by human operator according to Modrak and Moskvie (2006).

Application of RFID technology for tracking and traceability of material flow will impact the whole performance of information systems in terms of information validity and practically eliminate time dependence of amount and quality of information available for ERP/MES systems.

CONCLUSION

A major problem of today’s RFID is a lack of greater motivation to adopt this technology in business application more widely, than in the present. It is mainly resulted from the global crisis and also from the lack of information and feeling that one can not see the code stored in the chip, which makes bar-code technology more human friendly, as noticed by Modrak and Knuth (2009). Mentioned future development of RFID technology will allow better management of in-house and supply chain processes with greater accuracy and provide unprecedented visibility to the material flows.

As regards to readability of RFID tags it is difficult to attain perfect read accuracy in business and other applications. Each of specific objects of identification can influence the readability of the RFID tag in a different way. Kawakita et al. (2005) state that in cases where RFID tags must be carried by individuals, some improvement in readability rates might be gained by using signs instructing people to keep electronic devices away from their RFID tags as they pass through the gate readers. They add that even then it would be difficult to reach a readability rate of 100%.

Security and privacy related to RFID technology become increasingly important. According to Maghiros et al. (2007), exploration in Europe showed that by respondent’s view, RFID breeds relevant privacy threats. Data security of RFID technology depends equally on technical and legislative aspects. In spite of a progress in improving of protection methods, privacy security that is related to RFID presents serious concern of people everywhere.

If RFID technology is to succeed in today’s competition, it must be economically passable. Although, RFID already found its place in many industry and business fields it is arguable if its short-term return of investment justifies initial cost of implementation. There are more studies on this issue with positive results (Moskvie and Modrak, 2007).

It is beyond doubt that RFID technology brings asignificant shift to the business workplace. Adoption of RFID in both consumer and business markets will drive greater business volumes thanks to fulfillment customer needs on higher level. The impact that RFID will have on business operations and support infrastructure definitely calls attention to IT specialist to start aggressively planning for RFID. Customer’s application development will need further targeted communication to increase awareness and balanced view on RFID technology.

ACKNOWLEDGEMENT

This research was supported by Ministry of Education of the Slovak Republic, VEGA number 1/4153/07.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved