RFID for Identification of Stolen/Lost Items

RFID for Identification of Stolen/Lost Items

John Ayoade (American University of Nigeria, Nigeria) and Judith Symonds (Auckland University of Technology, New Zealand)
Copyright: © 2009 |Pages: 15
DOI: 10.4018/978-1-60566-298-5.ch003
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Standards organisations such as EPC Global work to provide global compatibility between RFID readers and tags (EPCGlobal, 2007). This is essential to ensure that product identification numbers can be accessed along a supply chain by a range of producers, manufacturers and retailers. If all that is stored on the RFID tag is a universal product code, then public access is appropriate. However, where the tag might store more information than just the product identification details, and this data might be private, there is a need to protect such information. The objective of this chapter is to test a security framework designed to authenticate RFID readers before allowing them to access private data stored on RFID tags.
Chapter Preview
Top

Authentication

Authentication is one of the best methods to deter the growing concerns of unauthorized readers from accessing the RFID tag information which could result into the violations of information stored in the tag (Ayoade, 2005). Ayoade et al developed (Ayoade, 2005) a framework that makes it compulsory for the readers to authenticate themselves with the APF (Authentication Processing Framework) database prior to having access to registered tags information.

In this chapter our objective is to develop a system that will demonstrate the RFID Authentication framework in action. The system will be used to identify stolen high cost items recovered by the police. This is an interesting application on which to test the RFID Authentication Framework because, in the hands of the wrong people, the private information stored on the RFID tags could work against the authorities. Our system will read RFID tags attached to expensive items like laptops, PDAs, mobile computer systems, cars, and other expensive equipments and to identify such items by a specific (authentic) reader. For security purposes, the system will make sure that only authentic readers authorized to access specific tags embedded in the items can have access to those tags.The business benefits expected from this system are:

  • i.

    It will be a means of protecting items in various departments in the universities, or industries.

  • ii.

    It will enhance police effort in locating and recovering stolen items.

  • iii.

    It will help police to determine the rightful owner of the recovered item.

Most times it is very difficult for the police to identify recovered stolen items. However, with the help of this system, once the stolen item is within the range of the RFID reader in the hand of the police officers, it will be possible for the police to identify the item embedded with the RFID tag quickly and accurately. This technology would be a great benefit to police officers as the process of identifying and returning recovered equipment to its owners is a very difficult and painstaking process that uses up precious time and resources. In a nutshell, this research work will be of great benefit to the community which deploys it.

Complete Chapter List

Search this Book:
Reset