Business report on RFID Wristband Technology for Tracking Children
Table of Content
Introduction1
Discussion1
Radio Frequency Identification (RFID) Technology2
Components of RFID4
RFID Tags4
RFID Readers5
RFID Antennas5
RFID based Object Localization5
Active RFID based Localization system5
Passive RFID based Localization system5
Hybrid RFID based localization system5
RFID advantages6
Standardization8
RFID applications8
Retail, Inventory Management, and Supply Chain9
Access Control and Physical Security10
Human Identification10
Cashless Payment at Point of Sale10
Medical Industry11
Sports Industry11
Automation: The Ultimate Driver of RFID Growth12
Security and Privacy in RFID Infrastructures12
RFID for Tracking and Monitoring Children15
Conclusion16
Business report on RFID Wristband Technology for Tracking Children
Introduction
RFID technology stem from the Second World War and developed since the early '60s as a branch of the military for civilian radio frequency identification friend or foe, but its spread has occurred mainly from the 90s onwards. The procedure for automatic recognition (Auto ID) has subsequently developed in other sectors: industrial, automotive, medical, e-Government (see passports, identity cards, etc.), commerce (e-money as transport tickets, etc.) Other examples include the purchase and distribution of logistics services to industrial, manufacturing, engineering, home automation. RFID technology is considered for its potential application to a technology of general purpose (such as electricity, the wheel) and has a high level of the pervasiveness, that once you find an application in a chain, and application the benefits quickly propagate upstream and downstream (Henrici 2004, 219).
With RFID, thanks to the development of information technology and the Internet, one can create a network of objects and large-scale adoption in many applications in the coming decades. The possible interconnection of the data obtained in one large global network has given rise to the expression of the things the Internet.
Currently, the most widespread technology for the identification of objects is that of the bar code. However, they have some disadvantages, such as a limited amount of data can be stored and the impossibility of being reprogrammed. The improvement was devised the origin of RFID technology, where silicon chips could transfer stored data to the reader without physical contact, equivalently infrared readers used to read bar codes (Floerkemeier 2004, 188).
Discussion
The first known application of RFID was the "friend or foe" identification system used in fighter planes in World War II (Samba, Lefebvre and Lefebvre 2006, p. 281). After a few decades, RFID technology gains the attention because of its inherent capability of being used as a replacement for bar codes in supply chain and inventory management. Nowadays, because of its low cost and ease of use, RFID technology has become widespread, including in point of sale applications, product tracking in supply chain management, automated fare collection in public transportation , animal tracking to child supervision, healthcare applications (Samba, Lefebvre and Lefebvre 2006, p. 281).
The expansion of RFID technology is limited because it gives rise to serious security and privacy concerns, such as eavesdropping, cloning, impersonations, and tracking of end users (Streit, Bock, Pirk and Tautz 2003, p. 169). Since a reader and a tag communicate via a wireless radio communication channels, their interactions are susceptible to eavesdropping and/or manipulation (Streit, Bock, Pirk and Tautz 2003, ...