Paper
From RFID to NFC: How Wireless Identification Technology Revolutionizes Our Lives[1] Erwin (erwin.2012@sis.smu.edu.sg), 1st Year Student, Bachelor of Science (Information System Management), Class of 2016, School of Information System
Executive Summary
RFID and NFC are forms of wireless identification technology that has gathered international acceptance and pervasive usage in various sectors of human’s life. Such technology presents numerous possibilities in revolutionizing our lives and creating a more effective and efficient lifestyle for individuals and a more sophisticated business process for the corporate world. This paper explores the immense potentials of wireless identification technology that enables efficient process of exchanging information among users that could create a more intelligent and personalized living environment for mankind. In addition, there will also be discussions on the development of such technology from past to present with prediction of future implementation that could administer positive influence to the world.
Definition and Terminology
Radio Frequency Identification (RFID) refers to a technology of storing and fetching data with electronic devices that consist of a small chip (RFID tag) and an antenna connected to the chip. The chip is able to communicate an amount of approximately 2,000 bytes of data by converting radio-frequency queries from an RFID reader and send back information collected from the reader. On the other hand, the scanned information can also be processed with particular applications, such as Point-of-Sales (POS) system and other analytical tools to provide more substantial information to users. Such RFID device functions similarly to a bar code, which provides a unique identifier for that object. However, it is more superior compared to a bar code: “1) it is possible to scan tags in motion; and 2) since radio waves can pass through most solid objects, the tags don’t need to be in direct line of sight of the RFID reader.” (Fuhrer & Guirnard, 2007, p. 2).
In addition to the aforementioned capabilities, RFID provides an opportunity to create a network of identifiable objects through a standard architecture defined in the Electronic Product Code (EPC) Network that actualizes the development of “The Internet of Things[2]”. To uniquely identify an object, EPC provides information regarding: 1) the manufacturer, 2) stock keeping unit[3], and 3) serial number or unique identifier of a particular object (BusinessDictionary, n.d.). At the same time, Physical Markup Language (PML) enhances the security of information stored in RFID tag by encapsulating and encrypting those data after being captured by RFID reader (Wikipedia, 2012). Lastly, RFID technology is also complimented with Object Name Service (ONS), which utilizes Domain Name System (DNS) to uniquely identify information about a product or service from the EPC (Wikipedia, 2012). All in all, RFID delivers promising abilities to create seamless global networks of physical objects through the amalgamation of EPC, PML, and ONS technology, thus enabling the identification and communication of seemingly unrelated entities through the “Internet of Things”.
Near field communication, abbreviated as NFC, is a form of contactless communication between devices like smartphones or tablets. Contactless communication allows a user to wave the smartphone over a NFC compatible device to send information without needing to touch the devices together or go through multiple steps setting up a connection. Fast and convenient, NFC technology is popular in parts of Europe and Asia, and is quickly spreading throughout the United States.
Near field communication maintains interoperability between different wireless communication methods like Bluetooth and other NFC standards including FeliCa — popular in Japan — through the NFC Forum. Founded in 2004 by Sony, Nokia, and Philips, the forum enforces strict standards that manufacturers must meet when designing NFC compatible devices. This ensures that NFC is secure and remains easy-to-use with different versions of the technology. Compatibility is the key to the growth of NFC as a popular payment and data communication method. It must be able to communicate with other wireless technologies and be able to interact with different types of NFC transmissions.
The technology behind NFC allows a device, known as a reader, interrogator, or active device, to create a radio frequency current that communicates with another NFC compatible device or a small NFC tag holding the information the reader wants. Passive devices, such as the NFC tag in smart posters, store information and communicate with the reader but do not actively read other devices. Peer-to-peer communication through two active devices is also a possibility with NFC. This allows both devices to send and receive information.
Comparison between RFID and NFC Technology
Theoretically, NFC is the subset of RFID because both technologies utilize radio waves as the means for identification purposes. As such, NFC inherits the capability of RFID, which features smart tags with its read or write operation mode (DifferenceBetween, n.d.). However, in addition to those functionalities, there are two other execution modes in the realm of NFC: card emulation and peer-to-peer (P2P). Such features enable new possibilities of developing numerous augmented-reality applications for smartphone and other NFC-embedded devices.
Although both technologies are technically identical, there is a distinct difference between them: NFC is only able to communicate within a short distance (less than 0.2 meter), while RFID has a much longer range (up to 200 meter) (Wikipedia, 2013). Therefore, based on this specification, NFC is more commendable to be used for secure payment or sensitive information transaction that requires tighter security control. On the contrary, RFID is conventionally used for generating identification procedures, which are then used for recording and tracking inventories, as well as initiating workflows (to start a process, create an alert, etc) (Kinsella, 2011).
To put it briefly, NFC is a more secure version of RFID technology because it is similar to RFID in terms of transmitting information wirelessly, but at the same time, NFC has a substantially shorter communication range as compared to RFID, thus enabling a better security feature for information exchange. As a result, NFC is more prone to be used in application that needs security function, while RFID is more pervasively utilized on wireless-tracking technology.
The Origin of RFID Technology (Reaz et al., 2009)
The emergence of RFID technology could be traced back to the primitive implementation of electro-magnetism in the early 1600s. During that period, the utilization of electro-magnetism technology was constrained to the usage of loadstone as compass, as well as the traditional method of outdoor-signalling with the reflection of mirror. There had been no significant breakthrough of such technology until Michael Faraday proposed about light and radio waves as a form of electromagnetic energy. Subsequently, Scottish physicist, James Clerk Maxwell, published his theory on electro-magnetism, which was one major impetus for the development of radar in World War II.
The military usage of radar for targeting enemy’s position was the first modern application of wireless identification technology with electro-magnetism principle. Thereafter, commercial usage began to prevail in the 1960s onwards, especially after Richard Clench from Radio Corporation of America (RCA), developed an electronic identification system that was considered as a major breakthrough of the century. Afterward, in 1991, the world’s first highway electronic tolling system, which uses RFID readers, was proudly established in Oklahoma. The implementation of such device signalled the advancement of RFID research, which has expanded the functionality of RFID reader in the 20th century. Currently, RFID reader utilizes receiver design, transceiver design, integrated circuit design, and many other sophisticated technologies.
The Origin of NFC Technology (The NFC Forum, n.d.)
The success of RFID triggers the development of NFC technology, which uses the same principle as RFID, with a shorter communication range to enhance its security feature. In 2004, Nokia, Sony, Philips co-established the NFC Forum to advocate the standards of NFC and to educate business about such technology. The standards defined by the group must be strictly abided by manufacturers of NFC-compliant devices, so as to ensure the universal compatibility and usability for every NFC-powered device.
In 2004, the NFC Forum actualized the first set of specification for NFC tags, a small-chip, similar to a sticker that holds information, which can be read by any NFC compatible device. Soon after, in 2006, the NFC forum established the standard for “smart” posters containing NFC tag, so that it can be administered as an informative poster for leveraging interactivity with NFC-device users, who want to obtain additional insights of their interest. As an illustration, when museum-guests passed by a famous piece of artwork, they can scan a smart poster with the image of the artwork to obtain additional cognition about the relevant object.
Following the trend, Nokia introduced the first NFC-compatible cell phone (Nokia 6131) in 2006. Subsequently, the advancement of such technology encompasses various types of NFC-application from cashless payment method to interactive sharing of videos, games invites, and website link between smartphones and other NFC devices. Adding on to its success, Android, one of the major mobile-OS developers, launched its first NFC phone, the Samsung Nexus S, in 2010. Currently, NFC markets are most prominent in Asia, Europe, and Japan, followed by the United States, which is also experiencing accelerated growth in this area. With such immense growth of NFC adoption in the US, it is forecasted that the technology will soon progress into a prevailing form of cashless transaction and information exchange mechanism in the United States.
Current Situation: Applications of Wireless Identification Technology
Blood-tracking System in Hospital (Fuhrer and Guinard, 2006)
In most blood transfusion cases, misidentification of blood type is the most dominant cause of transfusion errors. According to report by Sun Microsystems Health Department, such errors are often committed during bedside check-up prior to the transfusion because hospital staffs manually interpret the medical information of patients with their bare eyes, thus inducing delinquency in the analysis process. Furthermore, the likelihood of committing errors is increased by the unconscious condition of patient that hinders them from specifying their medical information accurately during the process of operation.
To tackle such problem, several identification technologies can be used for automating the process of these check-ups. Barcode and RFID technology are two of the most pervasive systems that can be implemented to realize the check-up automation. It is not possible to utilize barcode technology because barcode readers require unhindered line-of-sight to accurately scan the barcode. As such, RFID is potentially the practical solution to the situation as the range of identification is significantly longer than barcode and it can be operated even with an obstructed line-of-sight between the tag and the scanner.
Several hospitals have administered RFID technology to increase the accuracy of blood transfusion process. RFID tags could be attached to each bag of blood that is distributed at the hospital. The smart RFID label could store identification number and blood type of each bag of blood, thus enabling a more secure method of increasing the consistency and accuracy of information for each blood-transfusion. The unique ID could be mapped into the hospital database containing the history of the blood, such as the blood donors, the designated purpose, and the recipient of the blood, once it is transfused.
During a blood-transfusion process, the medical staff will obtain a patient’s id by scanning the RFID-embedded wristband of the patient and compare it with the bag of blood’s identification number, to check whether the blood transfusion is designated to the correct patient. The information from the patient and the bag must be correctly mapped based on the information from the hospital database before it can be utilized. Therefore, such comprehensive process of conducting blood transfusion could assure a more effective, efficient, and accurate assignment of blood to each patient, thus minimizing the risk of patients receiving wrong type of blood.
Attraction Recommendation System in Theme Park (Chieh-Yuan and Shang-Hsuan, 2011)
Theme park, in general, has been facing strong competition from its substitute entertainment industries, such as zoo, national park, and other recreational venues. In order to address such issue, there must be a tremendous improvement in the quality of customer service that can cater to a wide range of customer demographics and preferences. Due to the advancement of RFID technology, one can develop sophisticated customer analysis system that aggregates the riding preferences and the relevant timestamps with RFID system and then store such information to the database of the theme park. Subsequently, this set of customer data will be categorized based on customer demographics, patterns and timeslots of visiting, thus creating an eligible customer segmentation that can be used to recommend relevant rides and attractions for different group of customers.
To realize the customer analysis and recommendation system, every customer visiting the theme park will be given an RFID-embedded wristband with a unique electronic product code (EPC) for identification and information-storing purpose. In addition, every entrance and exit of each ride will be connected with RFID readers, thus allowing an automated scanning of customer information, which will then be transferred to the Ride Information Server and the Route Database Server of the theme park. Furthermore, queue management process is enhanced with the implementation of such system as the number of customers in the queue of each ride is analyzed in real-time through the RFID technology, thus enabling a better crowd-control for customers in the theme park.
The effort to personalize the customer service of theme park is reinforced by the addition of public information booth with RFID readers at each location of rides, food courts, souvenir shops, and information centre, thus enabling dedicated route recommendations service for each customer. To obtain route suggestion, customers can scan their RFID-embedded wristband and input their preferred individual options at the booth. Afterward, there will be an automated transfer of the customer information, the booth location, current time and customer’s preference to the Route Recommendation System, the core component of customer analysis and recommendation system, which will generate relevant route recommendations to the customer based on the queue information retrieved from the Ride Information Server and the visiting sequences obtained from the Route Database Server. In the end of the process, the route recommendation will be redirected back to the public information booth, thus completing suggestion of rides and attraction for customers.
NFC Payment System in University (Miraz, Ruiz, and Gómez-Nieto, 2009)
One of the most noteworthy benefits of NFC system is the ability to facilitate cashless payment process with its identification features. Although NFC technology is able to provide unique identity for each NFC-enabled device, it still needs a middle-tier application for handling the business process, such as authentication and pin management of each transaction.
Figure 1. NFC Payment Process. Retrieved from “University of Things: Application of Near Field Communication Technology in University Environments” by Miraz, Ruiz, Gómez-Nieto (2009).
Figure 1 describes the process of a mobile NFC payment process that can be implemented in a university: 1) User scans its NFC reader (e.g. mobile phone) to the NFC payment writer to start the transaction; 2) The NFC payment writer directs payment information (e.g. total price, transaction date, etc) to the NFC reader; 3) Upon receiving the payment information, the middle-tier application on the NFC reader will perform vibration cue authentication, which prompts the user to input pin-value in a vibration-based security setting. Generally, the security features comprise of: i) pin management system that continually refreshes pin number through periodical renewal and randomization process, which prevents the leakage of pin value, ii) an authentication process that further ensures the legitimacy of pin value with vibration-based input setting, iii) the Database (DB) encryption method that conceals important personal information, such as pin number and payment information with advanced hashing algorithms, thus empowering the authentication procedures.
4) After the completion of authentication process, the payment information will be stored into the database/registry, where the information can be further analyzed for obtaining the insights of consumer buying behaviours. 5) At the end of the transaction, a message indicating the success of payment process will be sent to the user’s NFC reader. The aforementioned NFC payment process could be implemented in the context of university environment through the payment in: i) university cafes and restaurants, ii) vending machines and printing/photocopy services, iii) various stores in the campus, iv) shuttle bus service in university, v) Reservation of school facilities (e.g. gym, project room, sports facilities, etc).
The NFC-based application could be used as a payment method in the university environment is many and varied ways, such as 1) Payment in university cafes and restaurants, 2) Payment in photocopy services and vending machines, 3) Payment in stores located in the campus. 4) Payment in university transportation (bus, train, and bicycle). 5) Reservation and payment of sports facilities.
Security Concerns of Wireless Identification Technology (Haseslsteiner and Breitfuß, 2006)
Eavesdropping
Eavesdropping is committed when an external party taps into an NFC/RFID transaction of other users’. Due to the nature of NFC/RFID that uses wireless network interface as the means for exchanging information, eavesdropping is critical issue to be addressed. When two devices transfer data via NFC/RFID, they utilize RF frequency for identification purpose. To attack on a transaction, an external party can simply use an antenna or an NFC/RFID reader to receive the transmitted signals of the ongoing transaction. Through simple procedures, the attacker can retrieve the transmitted information out of the stolen RF signal. In addition, such type of security breach can be committed more easily because the required equipments are conveniently obtainable by the public.
To prevent such attack, one can establish a secure channel, in which the transmitted information is encrypted, so that only an authorized device can decode and acquire the information. In addition, the maximum range of the wireless technology should also be adjusted according to the sensitivity of information in the transaction. As an illustration, for a cashless payment process, an NFC system can only be detected in a maximum range of 10 cm, thus reducing the possibilities of eavesdropping attack.
Data Corruption
In addition to eavesdropping, an attacker can also distort the package of information, which is being transmitted on a transaction. Such attack occurs when an external party interferes with the communication of an ongoing transaction, so that the information will be corrupted when it reaches the receiver. To address this issue, some NFC/RFID devices are empowered with the ability to detect data corruption attacks and impede the attack before it strikes on a transaction. Additionally, secured channel of communication could also be established to authorize the transaction among the intended parties that should receive the information.
Interception and Man-in-the-Middle Attack
Figure 2. Man in the Middle Attack. Retrieved from “Security in Near Field Communication (NFC)” by Haseslsteiner and Breitfuß (2006).
In addition to data corruption attack, an interception or man- in-the-middle attack presents higher threats towards NFC/RFID system. As shown in figure 2, Eve acts as the “Man-in-the-Middle” of the information exchange between Alice and Bob. In a secure transaction, Alice and Bob will have to decide on an encryption key to be used for the transaction. However, because Eve is in the middle of the transaction, she is able to create another transaction key for both Alice and Bob, thus enabling her to eavesdrop on the communication, and also to modify the data being exchanged on the transaction. Although this type of security attack is more difficult to execute, it should also be prevented with active-passive pairing of the devices used on the communication. It means that one device becomes the receiver and the other becomes the sender, instead of both devices receive and send information concurrently, thus hindering the external party that manipulates data in the process of information transfer.
Future Consideration: Personalized and Intelligent Living Environment
The possibility to embed such technology into almost every object facilitates the creation of “the internet of things” that realizes a more personalized and intelligent living environment for mankind. The future of such technology in creating “the internet of things” could be observed in the fields of healthcare treatment, travel industry, and most importantly, in seamless connectivity of daily activities.
As illustrated by the video of Microsoft’s Health Future Vision (“Health Future Vision”, 2011), healthcare treatment becomes much more efficient through real-time exchange of information that is facilitated through the NFC/RFID system. Through a wireless internet connection, patients are able to transfer their recent health information to doctors by scanning their NFC/RFID reader on a health-diagnosis device that has an NFC/RFID tag. Subsequently, doctors are able to receive the patient’s information and give feedbacks accordingly through the same method of communication.
Travel industry could also benefit from NFC/RFID technology. The conventional way of using a physical bar-code/QR-code embedded boarding pass presents a significant risk if the card is lost before passengers pass through the checkpoint. Newer method of travel identification, which transfers a soft-copy of QR-code boarding-pass to passenger’s mobile-phone, also faces limitation if the mobile-phone runs out of battery. Those limitations could be resolved by integrating the authentication process into an NFC chip embedded on a mobile phone, thus allowing the mobile phone to act as identification method even when it runs out of power.
The most significant benefit of NFC/RFID could be seen in alleviating efficiency of daily activities, which include improving productivity and adding variety of services for entertainment purpose. By tapping NFC-enabled mobile-phone into a smart NFC-tag connected to a computer, a user can activate the pre-loaded workspace layout, thus improving the efficiency of work. In addition, mobile phone could also act as an electronic business card that could share information simultaneously by “bumping” it to another mobile phone.
On the other aspect, NFC-enabled mobile phone could act as an integrated “smart-key” that can give access to important utilities, such as fund-transfer, car or house key and electronic wallet. Additionally, it could also be used in marketing activities as shown by the emergence of “smart-poster” that can give promotion or additional information on a certain product or service. Eventually, NFC system could load a sequence of activities on a single-tap, thus allowing the decrease of time-consumption for daily activities (“A Day in the Life of NFC”, 2012). As an illustration, a user with NFC-enabled mobile phone could simply tap its mobile phone on a smart NFC-tag to switch on light, air-conditioner, smart-television, simultaneously. Therefore, wireless identification technology could present a personalized and intelligent living environment, in which productivity and entertainment activities are conducted in an effective and efficient manner.
Disruptive Innovation to Current Technology
With the convenience provided by wireless identification technology, one could foresee that syncing and exchanging of information would become more efficient and automated. By utilizing the technology, transaction among users could be done without manual process of authorization as what current technology requires the user to do. NFC chip embedded on mobile-phone could possibly create cashless payment system on-the-go as shown by the technology of Google Wallet (“Google Wallet Training Video”, 2011). Google Wallet is also able to store multiple credit cards or loyalty cards and other promotional information on a mobile phone, so that user does not need to carry along massive numbers of cash or cards on their physical wallet. As such, this type of application could disrupt the traditional method of cash and cashless payment (via credit card), and integrate all the payment information in a single NFC chip stored on a mobile phone.
In addition, it also offers efficient information exchange among different users and this information could be transferred via the cloud to create the “internet of things”, which seamlessly synchronize information from different tools, devices, or other resources. The internet of things is driven by the convergence of wireless technologies like RFID, GPS, NFC, and Wi-Fi, which is able to measure, report and monetize a growing number of transactions in the physical world. In the future, product delivery could be done automatically through a GPS-controlled vehicle (“Self-Driving Car Test: Steve Mahan”, 2012), which locates the delivery address through GPS and with NFC-enabled device. Therefore, further research on wireless identification technology could present disruptive threats to the current trend of information delivery and transaction execution process.
Wireless Identification Technology: Bringing Equality to the World
The relationship between equality and identification technology might seems far-fetched, but with more thought invested onto innovative application, the differences among human can be marginalized to create a more equal living environment. As capitalism becoming more prevalent in the modernized or even the developing nations, the multi-related roles of monetary-capital cannot be underestimated. Histories have shown how small countries with limited number of population could outperform stronger nation in the economic sector with the advancement of the nation’s economic system.
However, corruption possesses serious threats to global economic system by illegally using embezzling public funds for personal interests. Such disaster could be minimized with a more advanced technology on global economic system that could be realized with wireless identification technology. In the future, cash notes could be empowered with RFID chip that enables a more secured feature of transaction, and also creates possibilities of tracking global movement of assets and cash with wireless identification technology. Therefore, such innovation could deliver promising possibilities to decrease corruption rate by tracking on the international transaction of public funds, and thus it creates a more sustainable environment for helping the poor without major hindrance of corruption.
Conclusion
Although wireless identification technology creates numerous possibilities for human to develop beneficial tools and devices, there are still many untapped potentials that could be further implemented with the advancement and research in the relevant field of technology. With its ability to track, identify, and enable seamless exchange of information, RFID and NFC could revolutionize the way we do things by minimizing redundant authorization procedures or manual process that could hinder efficiency of a process. In addition, such technology could also generate a more equal living environment by tracking important assets that are potentially impactful to the global economic market through real-time integrated updates of information. All in all, this topical review paper revisits the promising benefits of wireless identification technology, which could revolutionize the lives of human by controlling and understanding the flow of information synchronized globally through the cloud, thus such technology could deliver a more personalized and intelligent living environment to the world.
References
A Day in the Life of NFC. (2012, September 25). YouTube. Retrieved 22, 2013, from http://www.youtube.com/watch?v=DZOJO0azPc4
Chieh-Yuan, T., & Shang-Hsuan, C. (2011). A personalized route recommendation service for theme parks using RFID information and tourist behavior. Decision Support Systems, 52514-527. doi:10.1016/j.dss.2011.10.013.
DifferenceBetween (n.d.). Difference Between RFID and NFC. DifferenceBetween.net. Retrieved March 13, 2013, from http://www.differencebetween.net/technology/difference-between-rfid-and-nfc/.
Fuhrer, P. and Guinard, D. (2006). Building a smart hospital using RFID technologies. Proceedings of ECEH06, Fribourg, Switzerland.
Haller, S. (2009, May 13). Internet of Things: An Integral Part of The Future Internet.European Future Internet Portal. Retrieved March 4, 2013, from http://services.future-internet.eu/images/1/16/A4_Things_Haller.pdf.
Haselsteiner, E. and Breitfuß, K. (2006). Security in Near Field Communication. Workshop on RFID Security.
Health Future Vision. (2011, October 24). YouTube. Retrieved March 24, 2013, from http://youtu.be/C4LbAUa4ZwY.
Kinsella, B. (2011, May 2). Is NFC a form of RFID? Quora. Retrieved March 13, 2013, from http://www.quora.com/RFID/Is-NFC-a-form-of-RFID.
Miraz, G. M. ; Ruiz, I. L. ; and Gómez-Nieto, M. Á. (2009), ‘University of Things: Applications of Near Field Communication Technology in University Environments,’ The Journal of E-working,3 (1), pp. 52-64.
Object Naming Service. (2012). In Wikipedia, the free encyclopedia. Retrieved March 5, 2013, from http://en.wikipedia.org/wiki/Object_Naming_Service.
Physical Markup Language. (2012). In Wikipedia. Retrieved March 5, 2013, from http://en.wikipedia.org/wiki/Physical_markup_language.
Reaz, M. I., Uddin, J. J., Hussain, S. S., Nordin, A. N., Ibrahimy, M. I., & Mohd Ytasin, F. F. (2009). RFID Reader Achitectures And Applications. Microwave Journal, 52(12), 24-34.
Self-Driving Car Test: Steve Mahan (2012, March 28). YouTube. Retrieved March 23, 2013, from http://www.youtube.com/watch?v=cdgQpa1pUUE.
The NFC Forum (n.d.). History of Near Field Communication. The NFC Forum. Retrieved March 13, 2013, from http://www.nearfieldcommunication.org/history-nfc.html.
Wikipedia (n.d.). Near field communication. In Wikipedia, the free encyclopedia. Retrieved March 13, 2013, from http://en.wikipedia.org/wiki/Near_field_communication.
What is Electronic Product Code (EPC)? definition and meaning. (n.d.). InBusinessDictionary.com – Online Business Dictionary. Retrieved March 5, 2013, from http://www.businessdictionary.com/definition/Electronic-Product-Code-EPC.html.
What is stock keeping unit (SKU) definition and meaning. (n.d.). In BusinessDictionary.com – Online Business Dictionary. Retrieved March 5, 2013, from http://www.businessdictionary.com/definition/stock-keeping-unit-SKU.html#ixzz2MaYfSCqD.
[1] This paper was reviewed by Zhang Yuxuan and Kieu Viet Anh
[2] The Internet of Things is a world where physical objects are seamlessly integrated into the information network, and where the physical objects can become active participants in business processes (Haller, 2009).
[3] Stock Keeping Unit refers to warehousing item that is unique because of some characteristics (such as brand, size, color, model) and must be stored and accounted for separate from other items (BusinessDictionary, n.d.).