RFID Technology Challenges: A Comprehensive Report and Analysis
VerifiedAdded on 2020/03/04
|6
|1335
|88
Report
AI Summary
This report provides a comprehensive overview of the challenges associated with Radio Frequency Identification (RFID) technology. It discusses several key issues, including difficulties with liquids and solids, the high costs of implementation and maintenance, the complexity of the technology leading to comprehension issues, and the potential for collisions between readers and tags. The report also explores the vulnerability of RFID systems to jamming, challenges related to international principles, and privacy concerns related to the ability to read tags without consent. Furthermore, it addresses the difficulty of removing tags, the potential for long-distance reading, and the possibility of linking unique serial numbers to personal credit card information. The report cites several sources to support its findings and provides a well-rounded analysis of the current challenges facing RFID technology and its practical applications.

RFID challenges: 1
RFID CHALLENGES
By Name
Course
Instructor
Institution
Location
Date
RFID CHALLENGES
By Name
Course
Instructor
Institution
Location
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

RFID challenges: 2
RFID is known as Radio – frequency identification in full, this can be used in storing
information electronically in tags, passive tags gather energy from a proximate RFID reader's
inquiring radio wave. This RFID encounters several challenges as illustrated below (Avanzi,
2012).
Challenges with liquids and solids:
RFID has a long tuff relationship with both liquids solids (metals) since both will make the RFID
more difficult to obtain an appropriate read on assets. For solid (metals), the challenge stems
from the radio waves which bounce all over the place. For liquid, it plays a hazard role with
RFID of the steep prices (Chen, 2011).
RFID can be more costly:
Whether the RFID used is hardware or software, RFID will need more resources which are very
expensive. This expensive equipment needs a periodic maintenance throughout the life of the
solution (Correll, 2011). Moreover, tags can wet a business back a way whether these RFID are
active, passive or semi- passive. Even if the prices have gone down with upgrade of RFID since
the year 1970s business are still doing well and taking a pass since there are steep prices
(Floerkemeier, 2012). To enable this realization of profit and to ensure an excellent in business
this expensive equipment must be put in place which in turn makes the whole setup very
expensive and costly.
Difficulty in grasping the technology:
Using RFID is very difficult for many people as it is very difficult to understand and comprehend
this RFID technology since it is very complex (Kiritsis, 2012). Fathoming the different
frequencies and tags as well as how to operate and use RFID technology for both in hardware
RFID is known as Radio – frequency identification in full, this can be used in storing
information electronically in tags, passive tags gather energy from a proximate RFID reader's
inquiring radio wave. This RFID encounters several challenges as illustrated below (Avanzi,
2012).
Challenges with liquids and solids:
RFID has a long tuff relationship with both liquids solids (metals) since both will make the RFID
more difficult to obtain an appropriate read on assets. For solid (metals), the challenge stems
from the radio waves which bounce all over the place. For liquid, it plays a hazard role with
RFID of the steep prices (Chen, 2011).
RFID can be more costly:
Whether the RFID used is hardware or software, RFID will need more resources which are very
expensive. This expensive equipment needs a periodic maintenance throughout the life of the
solution (Correll, 2011). Moreover, tags can wet a business back a way whether these RFID are
active, passive or semi- passive. Even if the prices have gone down with upgrade of RFID since
the year 1970s business are still doing well and taking a pass since there are steep prices
(Floerkemeier, 2012). To enable this realization of profit and to ensure an excellent in business
this expensive equipment must be put in place which in turn makes the whole setup very
expensive and costly.
Difficulty in grasping the technology:
Using RFID is very difficult for many people as it is very difficult to understand and comprehend
this RFID technology since it is very complex (Kiritsis, 2012). Fathoming the different
frequencies and tags as well as how to operate and use RFID technology for both in hardware

RFID challenges: 3
and software which is actually a great challenge. Managers of most firms which deal with RFID
needs an update on the technology to help them train their workers on the outs and ins of RFID
and a current flow of work (Ruiz, 2013). The use of this RFID will require the manager to train
their new employees for a long period of time since this technology takes the time to be
understood.
The RFID collision course:
The employees come across reader tags while they are dealing with the RFID technology. With
the reader collision, an employee might come an across interloping with another reader in the
field. The tag collision is a slightly different, therefore employees and readers happenstance
problems in reading an abundance of the tags at a single time. This occurs when over and above
a single tag replicates a signal and it puzzles the reader (Wang, 2011).
RFID system can easily be disputed:
Since the RFID system employs the application of the electromagnetic spectrum for instance
WiFi systems, they are quite simple to jam by the help of energy at an appropriate energy. Even
though this would only be an untimeliness for customers in the store –longer time is taken at the
checkout. This is catastrophic in another environment where RFID is highly employed for
examples in hospitals and military (Wiley, 2014). Moreover, active RFID tags - those which
employ the application of a battery to upturn the variety of the system. This is attained by
recurrently interviewed to costume the battery down and also to disturb the system.
Challenges with RFID Principles:
This RFID has been executed in diverse means by several producers; international principles are
being operated on up to date. It worth noting that some RFID equipment should not leave their
and software which is actually a great challenge. Managers of most firms which deal with RFID
needs an update on the technology to help them train their workers on the outs and ins of RFID
and a current flow of work (Ruiz, 2013). The use of this RFID will require the manager to train
their new employees for a long period of time since this technology takes the time to be
understood.
The RFID collision course:
The employees come across reader tags while they are dealing with the RFID technology. With
the reader collision, an employee might come an across interloping with another reader in the
field. The tag collision is a slightly different, therefore employees and readers happenstance
problems in reading an abundance of the tags at a single time. This occurs when over and above
a single tag replicates a signal and it puzzles the reader (Wang, 2011).
RFID system can easily be disputed:
Since the RFID system employs the application of the electromagnetic spectrum for instance
WiFi systems, they are quite simple to jam by the help of energy at an appropriate energy. Even
though this would only be an untimeliness for customers in the store –longer time is taken at the
checkout. This is catastrophic in another environment where RFID is highly employed for
examples in hospitals and military (Wiley, 2014). Moreover, active RFID tags - those which
employ the application of a battery to upturn the variety of the system. This is attained by
recurrently interviewed to costume the battery down and also to disturb the system.
Challenges with RFID Principles:
This RFID has been executed in diverse means by several producers; international principles are
being operated on up to date. It worth noting that some RFID equipment should not leave their
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

RFID challenges: 4
networks (as for the occasion of the RFID tags employed for catalog control in a firm). This
impact and causes difficulties for the company (Wiley, 2014). The client or the costumes will as
well be faced with the complications with RFID principles, for examples, ExxonMobil’s
SpeedPass system is a trademarked RFID scheme. Whenever alternative firm needs to apply the
convenient SpeedPass, for instance at the drive-in window of one's suitable profligate food
restaurant he will need to pay to obtain it which seems as an uncommon situation. And if every
firm had their personal `` SpeedPass`` scheme, another client would require containing several
devices with them (Floerkemeier, 2012).
RFID tags is able be read minus ones information
Because it is possible to read the tags without being swiped or scanned obviously, for instance
for the bar codes or magnetic strips, anybody with a RFID tag reader is able to read the
embedded tags in one's cloth or even in other customer’s goods without anyone’s knowledge.
For instance, one could be scanned before he or she enters the store, and this is done just to
check what one is carrying (Chen, 2011). Any individual might approach by a clerk who
understands what an individual might be carrying in his or her purse or backpack and can
propose accessories or even other items.
RFID tags are not easy to remove:
RFID tags in most occasions are difficult for the client to eliminate where most are very minor
of about a half- millimeter square and also sheet of paper thin. Some might be concealed or even
sometimes embedded esoteric a good where the buyer is not able to see it. This new technology
permits RFID tags to get `` printed`` safely on the commodity and might not be capable to be
removed by any means (Wang, 2011).
networks (as for the occasion of the RFID tags employed for catalog control in a firm). This
impact and causes difficulties for the company (Wiley, 2014). The client or the costumes will as
well be faced with the complications with RFID principles, for examples, ExxonMobil’s
SpeedPass system is a trademarked RFID scheme. Whenever alternative firm needs to apply the
convenient SpeedPass, for instance at the drive-in window of one's suitable profligate food
restaurant he will need to pay to obtain it which seems as an uncommon situation. And if every
firm had their personal `` SpeedPass`` scheme, another client would require containing several
devices with them (Floerkemeier, 2012).
RFID tags is able be read minus ones information
Because it is possible to read the tags without being swiped or scanned obviously, for instance
for the bar codes or magnetic strips, anybody with a RFID tag reader is able to read the
embedded tags in one's cloth or even in other customer’s goods without anyone’s knowledge.
For instance, one could be scanned before he or she enters the store, and this is done just to
check what one is carrying (Chen, 2011). Any individual might approach by a clerk who
understands what an individual might be carrying in his or her purse or backpack and can
propose accessories or even other items.
RFID tags are not easy to remove:
RFID tags in most occasions are difficult for the client to eliminate where most are very minor
of about a half- millimeter square and also sheet of paper thin. Some might be concealed or even
sometimes embedded esoteric a good where the buyer is not able to see it. This new technology
permits RFID tags to get `` printed`` safely on the commodity and might not be capable to be
removed by any means (Wang, 2011).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

RFID challenges: 5
RFID tags is able to read more distance with a great gain antenna
For several aims, RFID tags or readers systems are made such that distance in between the
reader and the tag is held in reserve to smallest. Nonetheless, a thin- gain aerial may be applied
to enable reading of the tags for more distance away resulting to confidentiality difficulties
(Kiritsis, 2012).
RFID tags with unique serial numbers are able be associated to an specific credit card
number
Currently, the Universal Product Code (UPC) executed with barcodes offers each good sold in a
stock to have distinctive numbers which will identify the good. If the commodity is glance over
or scanned for procurement and is remunerated for it, the RFID tag number for a specific item
can be allied with a credit number (Wiley, 2014).
RFID tags is able to read more distance with a great gain antenna
For several aims, RFID tags or readers systems are made such that distance in between the
reader and the tag is held in reserve to smallest. Nonetheless, a thin- gain aerial may be applied
to enable reading of the tags for more distance away resulting to confidentiality difficulties
(Kiritsis, 2012).
RFID tags with unique serial numbers are able be associated to an specific credit card
number
Currently, the Universal Product Code (UPC) executed with barcodes offers each good sold in a
stock to have distinctive numbers which will identify the good. If the commodity is glance over
or scanned for procurement and is remunerated for it, the RFID tag number for a specific item
can be allied with a credit number (Wiley, 2014).

RFID challenges: 6
Bibliography
Avanzi, R., 2012. Selected Areas in Cryptography: 15th Annual International Workshop. 4th ed. Colorado:
Springer.
Chen, J., 2011. RFID challanges. 1st ed. Manchester : Manchester press .
Correll, K., 2011. Thinking About Invention Patenting. 5th ed. Hull: BookBaby.
Floerkemeier, C., 2012. The Internet of Things: First International Conference. 2nd ed. Amsterdam: Dutch
press.
Kiritsis, D., 2012. Engineering Asset Management: Proceedings of the Fourth World Congress on
Engineering Asset Management. 1st ed. Manchester: Springer Science.
Ruiz, P. M., 2013. RFID. 3rd ed. Manchester: Springer.
Wang, J., 2011. Innovations in Supply Chain Management for Information Systems: Novel Approaches:
Novel Approaches. 2nd ed. Chicago: IGI Global.
Wiley, J., 2014. RFID Systems: Research Trends and Challenges. 2nd ed. New York: Miodrag sons press.
Bibliography
Avanzi, R., 2012. Selected Areas in Cryptography: 15th Annual International Workshop. 4th ed. Colorado:
Springer.
Chen, J., 2011. RFID challanges. 1st ed. Manchester : Manchester press .
Correll, K., 2011. Thinking About Invention Patenting. 5th ed. Hull: BookBaby.
Floerkemeier, C., 2012. The Internet of Things: First International Conference. 2nd ed. Amsterdam: Dutch
press.
Kiritsis, D., 2012. Engineering Asset Management: Proceedings of the Fourth World Congress on
Engineering Asset Management. 1st ed. Manchester: Springer Science.
Ruiz, P. M., 2013. RFID. 3rd ed. Manchester: Springer.
Wang, J., 2011. Innovations in Supply Chain Management for Information Systems: Novel Approaches:
Novel Approaches. 2nd ed. Chicago: IGI Global.
Wiley, J., 2014. RFID Systems: Research Trends and Challenges. 2nd ed. New York: Miodrag sons press.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.


