Professional Documents
Culture Documents
RFID in India
“ Use of low power equipments in the frequency band 865-867 MHz for Radio Frequency
Identification Devices (RFID) with a maximum transmitter power of 1 Watt (4 Watts Effective
Radiated Power) with 200 KHz carrier band width has been delicenced” , G.S.R. 168(E), 11th
March 2005
Most activity in middleware development
Standards:
Standards are critical in RFID. Be it payment systems or tracking goods in open supply chains. A
great deal of work has been going on to develop standards for different RFID fequencies and
applications.
RFID standards deal with the following:-
• Air Interface Protocol - The way tags and readers communicate
• Data Content - Organizing of data
• Conformance - Tests that products meet the standard
• Applications - How applications are used
The ISO standards are:
• Animal identification
– ISO 11784 – code structure
– ISO 11785 – technical concept
– ISO 14223 – advanced transponders
• Contactless smart cards
– ISO 10536 – close coupling smart cards (4 parts)
– ISO 14443 – proximity coupling smart cards (4 parts)
– ISO 15693 – vicinity coupling smart cards (4 parts)
– ISO 10373 – test methods for smart cards
• Tools and clamping devices
– ISO 69873 – data carriers for tools and clamping device
• Container Identification
-- ISO 10374 – container Identification Item management
– ISO 15961 – RFID for item management: Host Interrogator
– ISO 15962 – RFID for item management: Data Syntax
– ISO 15963 – unique identification of RF tag and registration authority to manage
uniqueness.
– ISO 18000 – RFID for item management: air interface
Security Mechanism:
• RSA Blocker Tags: These tags are similar in size and appearance to RFID tags, helps in
maintaining the privacy of consumer by “spamming” any reader that attempts to scan tags
without the right authorization, thus confusing the reader to believe that there are many tags
in its proximity.
• Kill Switches: Newer RFID tags are being shipped with a “Kill Switch”, which will allow
the RFID tags to be disabled. Thus a consumer will be given an option of disabling the
RFID tag before leaving the store, thus avoiding the possibility of stealth tracking and
profiling.
• Hash-based access control : Lock a tag so that its read ID cannot be read but in this case
also tracking is possible
• Randomized access control can prevent tracking : Works when the set of valid tags is
known and is small in size
• Silent tree walking : Make use of the fact that an intruder cannot easily listen on the back
channel