WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 |

«Challenges to Privacy and Risk Oriented RFID System Implementation in Libraries Nitumika Gogoi Lecturer, Centre for Library & Information Science ...»

-- [ Page 1 ] --

ISSN(Online): 2320-9801

ISSN (Print): 2320-9798

International Journal of Innovative Research in Computer

and Communication Engineering

(An ISO 3297: 2007 Certified Organization)

Vol. 2, Issue 10, October 2014

Challenges to Privacy and Risk Oriented

RFID System Implementation in Libraries

Nitumika Gogoi

Lecturer, Centre for Library & Information Science Studies, Dibrugarh University, Assam, India

ABSTRACT: Library and information Professionals of the present decade have adopted and borrowed the characteristics those of the technologists and software professionals in the competition to conquer the sophistications of offline and online content providers as well as quest for existence in the digital milieu. This ultimately has enhanced their user service standards blended with auto service system on the part of the users. The users however are responding very well to this renovated image of the libraries and information centres (LICs). When viewed in this context of technological progress, Radio Frequency Identification (herein after RFID) implementation is hardly unique. The commercial deployment of RFID technology has captured every segment of the present market sector as well as specialized and security related applications. The LICs therefore are not lagging behind. They have started tagging every item in their possession with RFID tag, raising patron privacy concerns. As such in an item tagging regime, the ability to track tags raises the possibility of surveillance of library patrons and their reading habits. Through this paper, an attempt is made to investigate the privacy risks in the libraries’ use of RFID technology and methods for reducing such risks.

KEYWORDS: RFID, privacy, eavesdropping, collision avoidance, password management

I. INTRODUCTION

The best way of making a system secure is by knowing how it can be attacked. Therefore, an RFID compliant library is no exception with a large number of readers thronging in and out of it in need of books possessed by the library. The RFID technology is a pervasive technology because leakage of information is a major defect that occurs when data sent by tags reveal sensitive information about the labeled items. Information products labeled with insecure tags reveal their memory content when queried by readers. Usually readers are not authenticated while tags answer in a transparent and indiscriminate manner. The main purpose of RFID is automated identification of products and people. One of the biggest advantages of RFID over conventional systems such as bar codes isthat neither line of sight nor physical contact is required for an object with an RFID tag to be identified, as is the case with bar codes where line of sight is required and smart cards, where contact is required and it is hoped to replace all techniques of optical identification.

–  –  –

Dai Yu (2011) in his case study on the Turku City Library on implementing RFID Technology in Library Systems focused on the management aspect of a library particularly the self service support system for patrons by introducing RFID system. Based on a comparative study between the barcode and RFID applications, it is stressed on the many benefits of RFID. However, challenges are many and are pointed out as those of tracking and hot listing. Moreover, depending on the strength of the RFID reader it is possible to either greatly hinder or completely block the tag signal by wrapping an item, embedded with several layers of aluminum or tin foil. This combined with a weak gate sensor, makes risk of item getting stolen quite high.[11] Syed Md Shahid (2005) considers RFID applications in circulation, tracking, inventorying and security of library materials as well as discusses on the various components of the RFID system in details followed by its installation features. At the same time, he states that it is important to educate library staff and library users about RFID technology before implementing a program.[12] Serge Vaudenay (2001) deals in preparing a model based purely on the security and privacy of the RFID tags and assumes a powerful adversary who can control all communications mandating the use of some public key cryptography techniques while discussing on tag

–  –  –

corruptions and availability of side channels.[13] In a research project, David Alexander Molnar studies the security and privacy in deployments of RFID technology and propose novel mechanism for improving RFID privacy for library books and electronic passport and deals with private authentication. He also discuss broadly on the different eavesdropping ranges, repetitive stress injuries, streamline mechanism and RFID as an enabler for automatic sorting on book check-in.[14] Seema Vasistha (2009) aims at extending RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. Moreover it is considered important for controlling management problems such as increasing theft, monopolizing reading materials, poor inventory accuracy, inadequate security control.[15] A.

Narayanan et al. particularly studies the technical and scientific aspects of RFID system with in depth discussion on microchips, anti-collisions as well as tag classes that can be applied in library oriented RFID system and giving importance on its implementation in retrospective conversion and reader usage.[10] Dhanalaxmi M and Uppala Mamatha (2009) describes the different RFID modules that provide integration with Library Management System along with the positioning of the tags on the document that gives 100% readability of tags thus reducing time consumption. [9]





III. THE RFID SYSTEM IN A NUTSHELL

More generally, RFID system can be considered a non-contact method of using radio frequency electromagnetic (herein after RFE) waves with frequencies up to 2.5GHz, for communication between two remote entities. Data is stored in devices called RFID tags or transponders (each with a unique identification number), and is retrieved by readers or transceivers. The main purpose of RFID system is the automated identification of people and products.

While the biggest stumbling blocks in the use of RFID system are the numerous and complex security threats that as well as privacy issues involved with RFID system.[1]  An RFID system basically consists of three components:

1. The RFID tag or transponder (derived from transmitter/responder). It bears the information that identifies the person or object, and is carried or implanted. The information is usually in the form of an alphanumeric word. This information is called an identifier, and that of each tag is unique. Tags vary in size, and their size mainly depends on the size of the antenna on the tag.

2. The RFID reader or transceiver (derived from transmitter/receiver). It supplies energy to the tag in the form of RF electromagnetic waves. It then receives the signal from the tag. It usually contains an interface that allows it to communicate with a data processing system.

3. The back-end infrastructure or data processing system. This receives the information from the reader, and processes it by using the tag ID number of a product to identify it. The RFID reader and the back-end infrastructure are together called the reader system.

–  –  –

Whenever a tag comes into the vicinity of a reader, it receives a signal from the reader and transmits its unique key, enabling identification of the object or person carrying the tag. Clearly then the reader must be able to handle multiple tags at once. There are some cases, however where there is only one tag for a particular reader. Thus RFID systems are of two types – one to one and many to one.

 RFID tags can be classified into 3 types depending on their power consumption: passive, semi-passive and active.

 Passive tags have no internal energy source. The electrical energy required for the tag current is derived from the radio waves emitted by the reader. These tags are the smallest and cheapest, and thus are the most widely used.

They also have a virtually unlimited lifespan.

 Semi-passive tags are similar to passive tags in that the energy required for transmitting the signal is still derived from the reader. However, these tags have a small battery for internal computations.

 Active tags do not require external power. They have an internal battery that is used for transmission of data as well as for transmission of the signal. As a result of the increased power, they can transmit data over a much larger range compared to passive tags. However, their relatively high cost means widespread use is not possible.

The tag which is most likely seen in the present libraries is the passive tag that replaces the barcode application in libraries because of their chip size.

 As for the concerned frequency of operation, RFID systems operate in several frequency bands. The low frequency (LF) band is 124-135 KHz. High frequency (HF) ranges from 3 MHz to 30 MHz, with 13.56 MHz being the typical frequency used for HF. Ultra HF ranges from 300 MHz to 1 GHz. Microwave frequency ranges upward from 1 GHz. A typical microwave RFID system operates either at 2.45 GHz or 5.8 GHz, although the former is more common.

[2]  Read range i.e. the maximum radius around a reader in which, if a tag is brought, the reader system can

successfully read its identifier. Range depends on factors such as:

 Frequency of operation: Range increases with frequency. However, metal acts as a barrier to radio wave propagation, and reduces the range at higher frequencies.

 Transmitter power of the reader.

 Antenna size of reader and tags.

 Transmitter power of tags: This is applicable only for active tags.

Often, vendors of RFID readers are required to quote a range. They either quote it for standard tags e.g. tags manufactured according to ISO standard, or specify the tag particulars. The electromagnetic spectrum on which RFID resides is regulated by local governmental bodies. Global standards define it as the most efficient platform on which an industry can operate and advance. The International Organization for Standardization (ISO) and EPCglobal have been very active in developing RFID standards. The AutoID Center and its commercial offshoot, EPCglobal, have also defined specifications and standards. Most commercial applications, including library applications, today use the HF standards. RFID tags with the ISO Standard 15693 are the most common ones for library applications.[3]

–  –  –

However, no library RFID products using the new standard are currently available. Libraries implementing RFID system today are using tags unsuited for item- level tagging. As such, privacy concerns associated with it poses an important impediment to libraries’ use of RFID tags that contain static information that can be relatively easily read by unauthorized tag readers, allowing intervention of privacy issues described as “tracking” and “hot listing.” Tracking refers to the ability to follow the movement of a book (or person carrying the book) by “correlating multiple observations of the book’s bar code” or RFID tag. Hot listing refers to the process of building a database of books and their associated tag numbers (the hotlist) and then using an unauthorized reader to determine who is checking out items on the hotlist.

On the other hand, most RFID readers in libraries can read tags up to 16 inches away. Readers in library RFID systems

are used in the following eight ways:

1. Conversion station where library data is written to the tags 2. Staff workstation at circulation used to check in and checkout materials.

3. Patron self-checkout station used to check out books without staff assistance.

4. Exit sensors verify that all books leaving the library have been checked out.

5. Patron self-check-in station used to check in books without staff assistance.

6. Book-drop reader checks in books when patrons drop them in the book-drop.

7. Sorter which is an automated system for returning books to proper area of library.

8. Portable reader which is a handheld reader for inventorying and verifying that items are shelved correctly.

Figure2: Library RFID Management System (Lib.Best. 2007-2010)

V. LIBRARY PROBLEMS ADDRESSED BY RFID

 Libraries are suffering from budget shortfalls as never before. With cuts to state and local governments, it is difficult for libraries to remain staffed and open. RFID is seen as a way to address the staff shortages by increasing the number of circulations that can be processed with less staff.

 Self-check systems have become very popular with both patrons and staff. RFID self-check systems allow patrons to check in or check out several books at a time. Self-check systems reduce the number of staff needed at the circulation desk.

 With RFID-enabled tools, inventory-related tasks can be done in a fraction of the time that it takes with bar code readers. A whole shelf of books can be read with one sweep of the portable reader, which then reports which books are missing or mis-shelved. For archives handling sensitive materials, the ability to inventory items without handling them is an additional benefit.

 Sorting can be accomplished automatically with RFID. For a book that is dropped into the book drop, the reader reads the tag and uses the automatic sorting system to return the book to the shelves, the stacks, or the hold area.

 Reduction of repetitive stress injuries (RSIs) among staff is another reason libraries are converting to RFID system. The repetitive motion associated with checking out books using optical scanners is believed to be more problematic than with RFID enabled scanners. It is still too early to determine whether RFID systems reduce the incidences of RSI injuries.

–  –  –



Pages:   || 2 |


Similar works:

«Sermon #3299 Metropolitan Tabernacle Pulpit 1 HO! HO! NO. 3299 A SERMON PUBLISHED ON THURSDAY, APRIL 25, 1912, DELIVERED BY C. H. SPURGEON, AT THE METROPOLITAN TABERNACLE, NEWINGTON. “Ho, everyone who thirsts, come to the waters.” Isaiah 55:1. THERE is a thirst which is peculiar to the believer. He can say with David, “As the hart pants after the water brooks, so pants my soul after You, O God.” Delightful thirst! Would God we had more of it! May we be longing and panting after our God...»

«The Impact of Minimum Wages on Labour Market Transitions Pierre Brochu∗and David A. Green† October 2012‡ Abstract We investigate differences in labour market transition rates in high versus low minimum wage regimes using Canadian data spanning 1979 to 2008. The data include consistent questions on job tenure and reason for job separation for the whole period. Over the same time frame, there were over 140 minimum wage changes in Canada. We find that higher minimum wages are associated...»

«Christmas In Ritual and Tradition, Christian and Pagan by Clement A. Miles Published by T. Fisher Unwin 1912 THE ADORATION OF THE MAGI (DETAIL). GENTILE DA FABRIANO (Florence: Accademia) 1 PREFACE In this volume I have tried to show how Christmas is or has been kept in various lands and ages, and to trace as far as possible the origin of the pagan elements that have mingled with the Church’s feast of the Nativity. In Part I. I have dealt with the festival on its distinctively Christian side....»

«Inspiring Women: The launch of a na onal campaign Hosted by Nick Clegg, Deputy Prime Minister & Miriam González Durántez, Partner, Dechert LLP ‘Career Speed Networking’ followed by evening recep on Lancaster House, St James’s, SW1 17 October 2013 4.30pm 7.45pm www.inspiringthefuture.org #launchinspiringwomen FOREWORD by Miriam González Durántez Inspiring the Future: Inspiring Women I am delighted to launch the Inspiring the Future: Inspiring Women campaign that will reach out to...»

«DOCUMENTOS DE LICITACIÓN PROGRAMA DE INVERSIONES MUNICIPALES CONTRATO DE PRESTAMO BID N° 2929/OC-AR LPN No: 11/2015 “Nueva Terminal de Omnibus – Municipio de Fernández – Provincia de Santiago del Estero” Unidad Ejecutora Central Unidad de Coordinación de Programas y Proyectos con Financiamiento Externo Ministerio de Planificación Federal, Inversión Pública y Servicios Argentina Emitido: Septiembre 2015 ii MEMORIA DESCRIPTIVA OBJETIVOS DEL PROYECTO La necesidad de dotar a la...»

«The Journal of Applied Management and Entrepreneurship, 2013, Vol. 18, No. 4 i Volume 18, Number 4 Printed ISSN: 1077-1158 PDF ISSN: 2326-3709 Journal of Applied Management and Entrepreneurship Jane W. Gibson, Editor Nova Southeastern University The Journal of Applied Management and Entrepreneurship is owned and published by Nova Southeastern University. Editorial content is controlled by Nova Southeastern University, a private, not-for-profit University in Fort Lauderdale, Florida. The Journal...»

«      KRITIKE VOLUME TWO NUMBER TWO (DECEMBER 2008) 112-130   Article Mistaking Judgments of the Agreeable and Judgments of Taste Francis Raven 1 Introduction1 I n the Critique of the Power of Judgment, Kant develops a rigorous formulation of aesthetic judgments, in which he makes a sharp distinction between judgments of taste and judgments of the agreeable (both of which are, I claim, types of aesthetic judgments) if only to dismiss judgments of the agreeable as worthy objects of study....»

«The exhibition The Terracotta Army and the First Emperor of China the most complete reproduction of the Terracotta Army and the necropolis that houses this magnificent spectacle in Xian China. Warriors objects and weapons reproduced to the smallest detail SUMMARY Terracotta Army and the First Emperor of China 3 Over 300 reproductions of Terracotta Warriors and Objects 5 Overview of Some key objects in the exhibition 6 Characteristics and elements of the exhibition 8 Typical itinerary of the...»

«DAILY COLLECTION OF MARITIME PRESS CLIPPINGS 2015 – 071 Number 071 *** COLLECTION OF MARITIME PRESS CLIPPINGS *** Wednesday 11-03-2015 News reports received from readers and Internet News articles copied from various news sites. The SMIT BUFFALO at LOT3 Suez Canal Photo : Paul Stift © Distribution : daily to 32.350+ active addresses 11-03-2015 Page 1 DAILY COLLECTION OF MARITIME PRESS CLIPPINGS 2015 – 071 Your feedback is important to me so please drop me an email if you have any photos or...»

«Last modified July 10, 2015 Bear-Resistant Products Testing Program CERTIFIED BEAR-RESISTANT PRODUCTS Methods for Complying with Food Storage Regulations on Public Lands In order to keep attractants unavailable to bears and reduce human/bear conflicts, regulations pertaining to proper food and attractant storage are likely to be present on public lands within grizzly bear habitat. Use of IGBC-certified bear-resistant containers is one of the methods available to comply with many of these food...»

«Wearable Technology Richard Poate TÜV SÜD Product Service TÜV SÜD Product Service 15-07-21 Customer Day 2015 Slide 1 Who am I? Name Richard Poate Title: Senior Manager Employer: TÜV SÜD Product Service Experience: 21 Years experience in product testing and approval History: Worked for MoD, NHS, Industry, TÜV SÜD Product Service Telephone: +44 (0)1489 558 215 E-mail: richard.poate@tuv-sud.co.uk TÜV SÜD Product Service 15-07-21 Customer Day 2015 Slide 2 Content 1 What is wearable...»

«Biochemic Tissue Remedies Copyright: Shalini Kagal, Ohm Communications Website: http://ohmtalk.com Email: shalini.kagal@gmail.com Biochemic Tissue Remedies Table of Contents Biochemic Or Tissue Remedies: Balance In The Body The Twelve Tissue Remedies Calc Fluor Calc Phos Calc Sulph Ferr Phos Kali Mur Kali Phos Kali Sulph Mag Phos Nat Mur Nat Phos Nat Sulph Silicea Biochemic Salts And Dosages Biochemic Remedies And Their Strengths Or Potencies Biochemic Salts And The Sun Signs Copyright: Shalini...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.