Background
Methodology of the RFID literature review
A brief history of RFID technology
Date | Event |
---|---|
1886 | The idea of using Radio Frequency to reflect waves from objects was started from Frederick Hertz’s experiment. |
1930–1940 | American navy research laboratories developed a system known as IFF (Identify Friend or Foe). |
1940–1950 | The first application of RFID consisted of identifying allied or enemy planes during WW2 through the use of IFF system. |
1973 | Charles Walton, a former IBM researcher registered patent using RFID technology, a radio-operated door lock. |
1980–1990 | Many US and European companies started to manufacture RFID tags. |
2003 | The Auto-ID center for MIT became EPC global, an organization whose objective is to promote the use and adoption of RFID technology. |
2005 | Wal-Mart launched and RFID pilot. |
Research design for a systematic review
Key applied areas of RFID
Defense and security
Application | Author | Year | Case | Country |
---|---|---|---|---|
Army and Navy | Weinstein | US Navy embedded RFID into cargo container | US | |
Konsynski and Smith | US Army track containers of material | US | ||
Tien | US Army using RFID for tracking its army in Iraq | US | ||
Anon | 2002 | US Army piloted 4 projects using RFID | US | |
Airport and port Security | Werb and Sereiko | 2 RFID programs to prevent terrorist’s attack | US | |
Smith and Konsynski Zhang | New York city government project using RFID, CargoMate
| New York City, US | ||
Tsai and Huang | Kaohsiung port adopt RFID system for port security | Taiwan | ||
Prison management And Child protection | Kim | Calpatria prison issued RFID embedded bracelet to its inmates | US | |
Nicholas | 2008 | LA County prison management | US | |
Ema and Fujigaki | Let parents know the exact time of a child’s arrival and departure time | Japan | ||
Yonhap news | Child monitoring through RFID tag in beach | ROK |
Identification
Application | Paper | Year | Case | Country |
---|---|---|---|---|
e-passport | Meingast et al. | US Visit Visa Waiver Program(VWP) focusing on why US government adopted RFID based e-passport | US | |
Lorenc | History of e-passport | US | ||
Ramos et al. | 2009 | Disadvantage of using e-passport from privacy perspective | US | |
Kim | Pros and cons of ROK government using RFID embedded e-passport | ROK | ||
Hossain | How Australia adopt and implement e-passport | Australia | ||
e-ID | Ezovski & Watkins | 2007 | e-ID used in United Kingdom | UK |
Kovavisaruch & Suntahrasaj | 2007 | Brief history of Chinese e-ID card | China |
Environmental applications
Application | Paper | Year | Case | Country |
---|---|---|---|---|
Waste Management | Kang et al. | 2012 | Ministry of Environment in the ROK introduced RFID system in the medical waste management in 2006 | ROK |
Infotech | India adopted RFID technology in order to deal with rapid increase in volume and types of waste | India | ||
Ruan and Hu | Shanghai city government started RFID using waste management to prepare Shanghai expo 2011 | China | ||
WWICS | 2008 | How US government using RIFD in waste management | US | |
Schindler et al. | Cases of using RFID in waste management in EU member country | EU | ||
Ransford et al. | Waste management operating system broadly used within US | US | ||
Street tree Management | Kim et al. | 2006 | ROF government using RFID technology to manage street tree condition | ROK |
Transportation
Application | Paper | Year | Case | Country |
---|---|---|---|---|
Public Transportation | Ulatowski | Electronic toll collection | US | |
Kovavisaruch and Suntharasaj | 2007 | Well-known success smart card case in Hong Kong | Hong Kong | |
Kovavisaruch and Suntharasaj | 2007 | Largest smart card transport system in the world | China | |
Pransanth and Soman | 2009 | RFID based transportation system especially for railroad toll collection in India | India | |
Kim | Hypass case used in highway toll collection in ROK | ROK | ||
Managing Road condition | Prado et al. | 2013 | How Mexican government using data collected from RFID system in decision making | Mexico |
Hossain et al. | 2012 | Monitor and control the road system | Bangladesh |
Healthcare and welfare
Application | Author | Year | Case | Country |
---|---|---|---|---|
Managing Public Hospital | Kuo and Chen | Many hospitals are actively involved RFID system in managing hospital with the support of the government | Taiwan | |
Pharmacy | Wyld | U.S. government and FDA recommended that pharmaceutical industries move to implement RFID tag to prevent counterfeit dugs by 2007 | US | |
Thuemmler et al. | 2007 | |||
Romero and Lefebvre | 2013 | |||
Skinar | 2005 | Florida state government imposed fine to drug suppliers when they did not adopt RFID tags | Florida State | |
Service for the impaired | Murad et al. | RFID tag using service for visually impaired people was designed and implemented by Pakistan government | Pakistan | |
Infection Management | Nicholas | 2008 | Singapore government track visitors, patients and staff, to figure out who was the SARS virus bearer in 2003 | Singapore |
Kuo et al. | Taiwan hospital proceed RFID plans to track SARS patients | Taiwan |
Agriculture and livestock
Application | Paper | Year | Case | Country |
---|---|---|---|---|
Agricultural risk management | Nanseki et al. | Navigation system for Appropriate Pesticide Use was developed as a system for agricultural risk management | Japan | |
Sugahara | ||||
Livestock Management and Disease Tracking | Trevarthen and Michael | Cochrane Dairy Farm let their cows in herd have National Livestock Identification System | Australia | |
Hossain | 2009 | How Australian farms adopt and implement RFID technology | Australia | |
Wyld | US began National Animal Identification System in 2002 | US |
Public policy issues from RFID diffusion
Technological concerns
Issue | Paper | Year | Case | Country |
---|---|---|---|---|
Cryptography | Laurie | Cryptography is not a perfect technique for protecting information saved in RFID tag so it can be easily attacked by the hackers | US | |
Standard | Hossain et al. | 2009 | No internationally agreed frequencies for RFID operations | |
Storage Capacity | Reichenbach | There is shortage of capacity for source-separated waste in household | Europe | |
NicheSpace | Ema and Fujigaki | Informing children’s exact location cannot guarantee their actual safety | Japan | |
Vining | In port, the container can be drilled into and contents can be removed without disturbing the RFID tag | US | ||
Ezovski et al. | 2007 | Without any additional protections, the Faraday cage is not safe enough | US |
Uncertain cost-benefit effectiveness
Issue | Paper | Year | Case |
---|---|---|---|
Cost | Becker | RFID tag is much more expensive than barcode | |
Hidden Cost | Kuo and Chen | There is still hidden cost for highly qualified RFID system | |
Privacy | Jensen | Active tag, which is more safe for securing privacy than passive tag is more expensive than passive tag |
Dubious transparency and corruption
Issue | Paper | Year | Case | Country |
---|---|---|---|---|
Tag Corruption | Armknecht et al. | Tag corruption can be occurred at every stage of RFID implementation | ||
Jules | Dupyu staff attach cloned tags to counterfeit drugs | US | ||
Reader Corruption | Lee et al. | Although reader corruption can cause serious privacy attack, most of the scholars do not consider it as security problem. | ||
Cheating | Reichenbach | Waste being disposed of at work places | EU | |
Bilitewski | Burning waste or transferring it to outside | EU |
Privacy issues
Paper | Year | Category | Contents |
---|---|---|---|
Hwang et al. | Cloning | The attacker can read the tag and then clone the tag by writing all the obtained data into other | |
Eavesdropping | The attacker surreptitiously listens to all the communications between the reader and the tag | ||
Replay attack | The attacker repeats or delays the same message when valid data are transmitted | ||
Denial of Service | The attacker can send massive message to RFID system and attempt to crash the RFID system | ||
Forward Security | The attacker can compromise a tag and obtain its current relation date | ||
Tag tracing | The tag always broadcasts a fixed serial number to somewhere nearby the reader; therefore, the adversary can identify a fixed serial number of the tag from different locations or transaction records | ||
Individual data privacy | The hacker can know what items the consumer bought from the store or what books the consumer borrowed from the library | ||
Data forging | The attacker can modify the dates, items, and prices and then cause great loss if the tag can store extra data | ||
Numann and Hogben | 2008 | Skimming | The attacker opens a clan-destine connection to the chip and gains access to the data |
Eavesdropping | The attacker intercepts the communication between the chip and an authorized reader | ||
Location tracking | The attacker generates person or card-specific movement profiles. |
Unequal power and digital literacy
Issue | Paper | Year | Case | Country |
---|---|---|---|---|
Digital Literacy | Ketprom et al. | 2007 | RFID technology is widening the gap between poor and rich farmers | Thailand |
Hossain et al. | 2009 | Traffic policies are not interested in using RFID technology | Bangladesh | |
Power Distribution | Ruan and Hu | Price of construction waste transportation is set by government, so other stakeholders have no choice | China | |
Chen et al. | Consumer can get only limited information | Taiwan |