Wednesday, May 6, 2020

Application of RFID on Jewellary Company-Free-Samples for Students

Question: Discuss about the Application of RFID on Jewellary Company. Answer: Introduction Jewellery is considered to be one of the most valuable possessions of people and so there lies a potential threat to the jewellery companies in terms of security and policy breaches. A stringent jewellery management system can be regarded as the need of an hour. This gives rise to the incorporation a more upgraded and advanced technology in the jewellery management industry. RFID (Radio Frequency Identification Devices) technology is one such advanced technology that can be helpful in creating a more secure and simpler solution for jewellery management (Ahson and Ilyas 2017). In this report, the applications of RFID in the jewellery companies are elaborated in detail also the report draw a strong light on the various security issues and the possible solutions to these problems. Discussion Application of RFID in jewellery management In the present date, the jewellery industry is prone to number of hurdles. Some of the situations that can arise in the jewellery company are the misplacement of the valuables, risk of theft, more time consuming and possibility of erroneous outputs, slow tracking of inventory leading to huge lose. Incorporation of RFID technology in the jewellery industry can serve as a possible solution of these issues. Implementation of RFID technology in jewellery tracking will results in an efficient multi-scanning and faster stock update, which in turn can enhance the companys productivity. The real-time monitoring system with the help of the RFID technology helps in tracking of the goods in regular basis tightening the security process (Nikparvar, Sadeghi-Niaraki and Azari 2014). Other applications of RFID in the jewellery industry includes less manpower resulting in zero error, easy auditing of the in-store goods, easy tracking of the valuables, providing better service, detection of illegal m ovements of the precious items. Security issues Although the RFID technology is considered to be superior compared to the other identifications methods or devices but it is vulnerable to various types of attacks. The possible security issues of the RFID technology in the jewelley industry can be addressed as the attacks affecting the hardware part of the RFID, attacks affecting the communication part of RFID and the attacks which can affect the data support system of RFID (Fan et al. 2015). This in turn can hamper the integrity and availability of the company also the confidential information of the companies can be at risk. RFID hardware part The tag and the reader are the two main edge hardware parts of RFID system. These physical parts of the RFID are prone to certain vulnerabilities due to the security weakness in these hardware parts. RFID communication part The communication part of the RFID is responsible for swapping of the information. Attackers can hack the radio links and this can pose risk to the confidential information. After hacking the attacker can modify the signal giving away erroneous or wrong information (Fan et al. 2014). RFID data support part The data support part is an essential for ensuring connection between the RFID reader and the database. This part is equally prone to the attacks. Security breaches According to the scholars, in RFID applications a security breach can lead to the leakage of confidential information about the company to unauthorized agencies or parties (Kitsos, 2016). As the RFID technology is based on the extracting of information from the RFID reader, there lies a possibility of security breach in the process. Taking into consideration the supply chain management system such security breach can pose a huge risk. Possible information regarding the inventory levels, trading partners, future business plans can be gathered by the unauthorized sources. It is also observed that in certain situations sharing of the RFID information within the buyers and the suppliers but even this may lead to security breach (Dominguez-Pry, Ageron, and Neubert 2013). Possible solutions to the security issues and security breaches of RFID technology The following are some of the possible solutions that address the problems related to the security issues of the RFID technology in jewellery management: Destroying the tag Each tag is assigned with a unique code. In case a tag is suspected a threat, the tag can be deactivated which will reduce the risk. Cryptographic methods This method can be incorporated to make the RFID system more encrypted. Cryptographic algorithms in the form of primary key and symmetric key can make the system more secure (Ray, Abawajy and Chowdhury 2014). Isolation of the tag In case of a suspected threat the tag can be isolated from the EM waves. Protocols such as ALOHA are applied in this approach (Sari 2014). Strategies such as using protocols that can make the outputs unrecognizable to the attackers, making tags indistinguishable can be adopted. Conclusion In conclusion it can be said that RFID technology can provide with large number of benefits in the jewellery industries such as enhancing the productivity, security, streamlining the supply chain management process of the Jewellery industry but there also lies loopholes in the RFID technology. Although the RFID technology is one of the most sought after technological solution in the present date but still there lies potential threat to the security. If all the possible threats can be addressed with proper solution RFID technology can prove to be success. References Ahson, S.A. and Ilyas, M., 2017.RFID handbook: applications, technology, security, and privacy. CRC press. Dominguez-Pry, C., Ageron, B. and Neubert, G., 2013. A service science framework to enhance value creation in service innovation projects. An RFID case study.International Journal of Production Economics,141(2), pp.440-451. Fan, T., Tao, F., Deng, S. and Li, S., 2015. Impact of RFID technology on supply chain decisions with inventory inaccuracies.International Journal of Production Economics,159, pp.117-125. Fan, T.J., Chang, X.Y., Gu, C.H., Yi, J.J. and Deng, S., 2014. Benefits of RFID technology for reducing inventory shrinkage.International Journal of Production Economics,147, pp.659-665. Kitsos, P. ed., 2016.Security in RFID and sensor networks. CRC Press. Nikparvar, B., Sadeghi-Niaraki, A. and Azari, P., 2014. Ubiquitous Indoor Geolocation: a Case Study of Jewellery Management System.The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences,40(2), p.215. Ray, B.R., Abawajy, J. and Chowdhury, M., 2014. Scalable RFID security framework and protocol supporting Internet of Things.Computer Networks,67, pp.89-103. Sari, A., 2014. Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks.Transactions on Networks and Communications,2(5), pp.01-06.

No comments:

Post a Comment