Acta Informatica Pragensia 2019, 8(1), 4-17 | DOI: 10.18267/j.aip.1223646

Případová studie využití technologie RFID pro zabezpečení výpočetní techniky proti odcizení a tendence uživatelů obcházet zabezpečení

Dušan Brodani
Department of Information and Knowledge Engineering, Faculty of Informatics and Statistics, University of Economics, Prague, W. Churchill Sq. 4, 130 67 Prague 3, Czech Republic

Studie se zabývá testováním zabezpečení výpočetní techniky a příslušných periférií v korporátní organizaci na bázi technologie identifikace na rádiové frekvenci (RFID). Potenciál RFID technologie je dále využit i k získání statistických dat z provozu v reálném čase. Na základě porovnání RFID technologie postavené na krátkých a ultra krátkých vlnách (vysoké a velmi vysoké frekvenční pásmo) byla vybrána vhodná varianta pro provoz, vybraná zařízení byla označena RFID tagy a v testovacím i ostrém provozu byla monitorována úspěšnost jejich detekce. Po třech měsících provozu proběhlo vyhodnocení nákladů na zavedení zabezpečení a přínosů v podobě snížení počtu pokusů o odcizení zabezpečených zařízení. Dalším výstupem je stanovení hranice celkové hodnoty zabezpečené výpočetní techniky oproti ztrátám způsobeným odcizením, aby se společnosti vyplatilo investovat do zabezpečení pomocí RFID. Potvrdilo se, že nasazení tohoto typu zabezpečení se organizaci jen na zamezení přímých ztrát vrátí za čtyři roky. Tendence uživatelů obcházet zabezpečení byly minimální. Na vyhodnocení výsledků pak navazuje další možné využití potenciálu RFID do budoucna i nad rámec samotného zabezpečení, například pro optimalizaci skladových zásob a sledování pohybu jednotlivých položek mezi uživateli. Jedná se zejména o zefektivnění využití pracovního času u pracovníků IT oddělení, zamezení nedostupnosti položek výpočetní techniky a zvýšení úrovně IT služeb poskytovaných uživatelům.

Keywords: RFID, zabezpečení, výpočetní technika, krátké vlny, ultra krátké vlny

A Case Study of RFID Technology Application for Protection of Computing Technology Against Theft and Users’ Tendency to Bypass the Protection

The study focuses on testing the protection of computing technology and peripheral devices based on radio-frequency identification (RFID) technology in a selected corporate organization. The potential of RFID technology is also employed to obtain statistical data about real-time use of the devices. Based on the comparison of high and ultra high frequency of RFID technology, the appropriate variant was selected for operation, selected devices were tagged with RFID tags, and the success of their detection was monitored both in the test period and in real operation. After three months’ operation, the cost connected with protection implementation and its benefits was assessed. The main benefit is reducing the number of stolen devices. Users’ tendency to bypass the protection was minimal. A further result of this study is determining the overall value of computing technology and peripheral devices to be protected against loss caused by theft that would make the investment in RFID technology pay off for the corporation. It was confirmed that deploying this type of protection pays off for the organization in four years thanks to the prevention of direct losses. After the assessment of the results, a possible future use of RFID potential beyond the protection itself is considered, that would optimize a corporation's inventory and track the movement of individual devices among users. These considerations include, in particular, the efficiency of use of IT staff working time, the prevention of unavailability of devices and the increase of the level of IT service provided to users.

Keywords: RFID, Protection, Computing technology, High frequency, Ultra high frequency

Received: December 6, 2018; Accepted: May 17, 2019; Prepublished online: May 22, 2019; Published: July 10, 2019  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Brodani, D. (2019). A Case Study of RFID Technology Application for Protection of Computing Technology Against Theft and Users’ Tendency to Bypass the Protection. Acta Informatica Pragensia8(1), 4-17. doi: 10.18267/j.aip.122
Download citation

References

  1. Afrooz, M., & Ygal, B. (2017). Improving logistics processes of surgical instruments: case of RFID technology. Business Process Management Journal, 23(2), 448-466. doi: 10.1108/BPMJ-06-2016-0127 Go to original source...
  2. Ayre, L. B. (2012). RFID Standards. Library Technology Reports, 48(5), 20-26.
  3. Benamara, M., Grzeskowiak, M., Salhi, M., Lissorgues, G., Diet, A., & Le Bihan, Y. (2016). Improvement of HF RFID Detection for Small and Misaligned Tag. In Proceedings of the 22nd International conference on applied electromagnetics and communications. New York: IEEE. doi: 10.1109/ICECom.2016.7843885 Go to original source...
  4. Bilgic, M. & Yeğin, K. (2016). An HF/UHF dual mode RFID transponder antenna and HF range extension using UHF wireless power transmission. Turkish Journal of Electrical Engineering & Computer Sciences, 24, 3949-3960. doi: 10.3906/elk-1412-169 Go to original source...
  5. Bunker, R., & Elsherbeni, A. (2017). A modular integrated RFID system for inventory control applications. Electronics, 6(1), no. 2. doi: 10.3390/electronics6010009 Go to original source...
  6. Ching, S. H., & Tai, A. (2009). HF RFID versus UHF RFID - Technology for Library Service Transformation at City University of Hong Kong. Journal of Academic Librarianship, 35(4), 347-359. Go to original source...
  7. Coresonant. (2018). RFID Tags. Retrieved December 10, 2018, from http://coresonant.appspot.com/html/Tags.html
  8. Goyal, S., Hardgrave, B. C., Aloysius, J. A., & DeHoratius, N. (2016). The effectiveness of RFID in backroom and sales floor inventory management. International Journal of Logistics Management, 27(3), 795-815. doi: 10.1108/IJLM-03-2015-0051 Go to original source...
  9. Hutter, M., Plos, T., & Feldhofer, M. (2010). On the security of RFID devices against implementation attacks. International Journal of Security and Networks, 5(2-3), 106-118. Go to original source...
  10. Kamaludin, H., Mahdin, H., & Abawajy, J. H. (2018). Clone tag detection in distributed RFID systems. PLoS One, 13(3), e0193951. doi: 10.1371/journal.pone.0193951 Go to original source...
  11. Koski, K., Koski, E., Virtanen, J., Björninen, T., Sydänheimo, L., Ukkonen, L., & Elsherbeni, A. Z. (2012). Inkjet-printed passive UHF RFID tags: review and performance evaluation. International Journal of Advanced Manufacturing Technology, 62(1-4), 167-182. doi: 10.1007/s00170-011-3782-8 Go to original source...
  12. Li, L., Guo, C., Liu, Y., Zhang, L., Qi, X., Ren, Y., Liu, B., & Chen, F. (2018). Accurate Device-Free Tracking Using Inexpensive RFIDs. Sensors, 18(9), no. 2816. doi: 10.3390/s18092816 Go to original source...
  13. Pane, S. F., Awangga, R. M., & Azhari, B. R. (2018). Qualitative evaluation of RFID implementation on warehouse management system. Telkomnika, 16(3), 1303-1308. doi: 10.12928/TELKOMNIKA.v16i3.8400 Go to original source...
  14. Rajaraman, V. (2017). Radio Frequency Identification. Resonance. 22(6), 549-575. Go to original source...
  15. RFID4u. (2018). HF and NFC Tags. Retrieved December 10, 2018, from https://rfid4ustore.com/rfid-tags-labels/rfid-hf-nfc-tags/
  16. Yin, K., R. (2014). Case Study Research Design and Methods. Thousand Oaks, CA: Sage.
  17. Yong, W., Qing, L., Lei, W., & Hao, S. (2018). Improvement of RFID locating algorithm in warehouse security system. In Proceedings of IEEE 13th International Conference on Electronic Measurement and Instruments (pp. 190-195). New York: IEEE. doi: 10.1109/ICEMI.2017.8265762 Go to original source...
  18. Wang, L., Norman, B. A., & Rajgopal, J. (2017). Maximizing read accuracy by optimally locating RFID interrogators. In RFID Handbook: Applications, Technology, Security, and Privacy (pp. 181-198). Boca Raton: CRC Press. doi: 10.1201/9781420055009 Go to original source...
  19. Zajíček P., & Rýzek J. (2013). Standardy a pravidla pro technologii RFID. Informačné technológie a knižnice, 2013(2). Retrieved December 10, 2018, from http://itlib.cvtisr.sk/archiv/2013/2/standardy-a-pravidla-pro-technologii-rfid.html?page_id=2461
  20. Zhang, Y., Chen, S., Zhou, Y., & Odegbile, O. (2018). Missing-tag detection with presence of unknown tags. In Proceedings of the 15th Annual IEEE International Conference on Sensing, Communication, and Networking. New York: IEEE. doi: 10.1109/SAHCN.2018.8397133 Go to original source...
  21. Zhang, L., Alharbe, N., & Atkins, A. S. (2017a). An IoT Application for Inventory Management with a Self-Adaptive Decision Model. In Proceedings of the IEEE International Conference on Internet of Things (pp. 317-322). New York: IEEE. doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.77 Go to original source...
  22. Zhang, H., Feng, X., & Wen, J. (2017b). Research on storage location technology based on RFID. In: Advanced Graphic Communications and Media Technologies (pp. 673-681). Singapore: Springer. doi: 10.1007/978-981-10-3530-2_84 Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.