Security concerns or practices associated with the RFID system
Radio frequency identification technology is a reliable application in the supply chains and has tremendous benefits. However, its implementation in various industries faces significant setbacks due the security concerns raised. The automated supply chains mandate the necessity for data privacy, identity, and non-refutability. Thus, organizations require to ensure that the RFID technology they adopt supports the security requirements. Companies require being aware of the security risks like profiling, eavesdropping, denial of service and inventory jamming associated with the use of RFID systems. There is a push for consolidation of the RFID technology. Many standards and developers seek to gain the upper hand in own intellectual property and also business adopt the technology during its ripening period. Thus, there are severalissuessurrounding the security of the RFID technology. Companies require querying tags securely without the trace of the unauthorized parties (Suprina, 2015).
The privacy debate is also a majorfactor of consideration in the usage of RFID. The likelihood of a business losing control of theprivacy of its information is a major risk associated with RFID. The risks exist in the form of tag sniffing of a running production line its parking lot. The wireless tag communications are subject to capture and analysis just like the Ethernet networks. The tags are subject to successful brute-force cracking using the networked computing resources thereby posing a security threat. The information kept in the RFID tags is vulnerable to alteration, corruption, and deletion. The determination of tag security lies in its processing speed and the amount of time taken to identify a secure channel of communication with the tag. The developers compromise the security techniques used to reduce tag complexity and the cost (Suprina, 2015).
In the RFID systems, tag readers are the communications crossroads and communicate in two directions including back-end, and front end communication. The front end RFID security threats include unauthorized access to the tags, rogue, and clone tags, as well as side channel attacks. Several of the front-end threats to RFID security entail deception, manipulation, or misuse of the RF communication between tag and readers. All types of tags share a critical vulnerability to the rogue RFID readers. The rogue reader can read a tag, and record the confidential information. It can write new and damaging information to the tag. The rogue reader behaves like the authorized reader and hence the tags tend to respond to it normally. Other threats occur in the form of side channel attacks in which the rogue devices listens and get the password or data across the RF communications between the authorized tags and readers.
RFID technology and the related systems is a major boost to the transportation and the logistics industry due to its effect of improving efficiency. The technology is an effective approach to replacing the conventional barcodes that have several limitations. The implementation of the technology in the transportation and the logistics industry leads to several changes and also impacts the business operations. The implementation of the technology leads to increased visibility of the supply chain (Sarac, Absi & Dauzère-Pérès, 2010). Thus, the company can easily manage and adjust the supply chain accordingly. It also results in a reduction in the time required to process orders for the delivery of vehicles to the clients and customers. The overall work throughput is high, and the company can plan for its operations with reduced chances of losses. The cost of operation reduces due to automation in yard management and vehicle tracking. As such, the implementation of the RFID technology results in enhanced customer satisfaction.
The process of implementing the RFID technology in the transportation and logistics industry is involving and cost-intensive. The administration team requires conducting a feasibility study of the impact of the technology in the industry. It involves a consideration of the business processes and the return on investment. The administration should get the go ahead after satisfaction that the technology will benefit the industry accordingly. Other procedures involve the preparation of the support infrastructure for the systems and acquiring as well as installing the technology.
The automation of many of the processes in the transportation and logistics industry has an impact on the human processes. The manual activities turn to automated in which the personnel working on them tend to change roles or exempted from service. There are reduced tasks for the human effort since identification and monitoring of process is automatic by use of the RFID tags. Most of the tasks involved in the supply chain are real-time and requires less human intervention.
Every industry has a set of policies that act as the blueprints for all the operations. The implementation of the RFID technologies changes many of the processes hence requiring a change of policies. Some policies may hold, but have modifications to suit the nature of the business operations. The policy making the team for the industry has to establish new policies on the mode of operations, safety, security, accessibility, and maintenance of the system. Besides the change of policies, staff training on the mode of operations and usage of the technology is also a requirement. The staff requires an insight on the effective use of the technology to improve efficiency in the general industry processes.
RFID is an essential technology for use in the transportation and logistics industry. At present, RFID is a proven technology that provides far-reaching benefits for the transportation and logistics organizations. Many of such businesses used RFID for asset management, warehouse, and yard management. However, the potential of RFID goes beyond the internal processes. The future of RFID in the transportation and logistics industry will involve the use of RFID tags in every link in the supply chain. The implementation of the technology faces a challenge of high cost and security issues. However, the benefits of increased efficiency due to visibility in the supply chain and the tracking of items make it a viable technology to use in the transportation and logistics industry.
Bolic, M., Simplot-Ryl, D., & Stojmenovic, I. (Eds.). (2010). RFID systems: research trends and challenges. John Wiley & Sons.
Brown C. (2011) Advantages of RFID in Transportation and Logistics, Zebra Technologies
Kaur, M., Sandhu, M., Mohan, N., & Sandhu, P. S. (2011). RFID technology principles, advantages, limitations & its applications: International Journal of Computer and Electrical Engineering, 3(1), 151-157.
Oliveira, R. R., Cardoso, I. M., Barbosa, J. L., da Costa, C. A., & Prado, M. P. (2015). An intelligentmodelfor logistics management based on geo-fencing algorithms and RFID technology; Expert Systems With Applications, 42(15/16), 6082-6097.
Sarac, A., Absi, N., & Dauzère-Pérès, S. (2010). Aliteraturereview on theimpact of RFID technologies on supplychainmanagement: International Journal of Production Economics, 128(1), 77-95.
Suprina D. (2015) Security Risks With RFID: IT and Infrastructure, RFID Journal.
Yong-Dong S., Yuan-Yuan P. & Wei-Min L. (2009) The RFID Application in Logistics and Supply Chain Management, Research Journal of Applied Sciences; Volume: 4 (1): 57-61
Ustundag A, Tanyas M. (2009) The Impacts of Radio Frequency Identification (RFID) technology on supply chain costs. Transportation Research Part E.; 45(1):29-38.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in College Essay Writing Service if you need a similar paper you can place your order from cheap essay help online.