Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Access This Premium Content

Options To Access This Article:

What Subscribers Are Saying

  • "Probably the best investment I've ever made."
    Steve Meizlish, President & CEO, MeizCorp Services, Inc.
  • "I have found that RFID Journal provides an objective viewpoint of RFID. It you are looking for a resource that provides insights as to the application and implications of deploying RFID, RFID Journal will meet your needs, It gives you a broad perspective of RFID, beyond the retail supply chain."
    Mike O'Shea, Director of Corporate AutoID/RFID Strategies & Technologies, Kimberly-Clark Corp.
  • "No other source provides the consistent value-added insight that Mark Robert and his staff do. In a world dominated by press release after press release, RFID Journal is developing as the one place to go to make the most sense out of the present and future of RFID in commerce."
    Bob Hurley, Project Leader for RFID, Bayer HealthCare's Consumer Care Division
  • "RFID Journal is the one go-to source for information on the latest in RFID technology."
    Bruce Keim, Director, Hewlett-Packard
  • "RFID Journal is the only source I need to keep up to the minute with the happenings in the RFID world."
    Blair Hawley, VP of Supply Chain, Remington Products Company

RFID Detects Intruders

In the post-9/11 world, security is a huge concern for many businesses and government agencies. RFID could help.
By Mark Roberti
Dec 01, 2010—Detecting when an individual or a group illegally enters a chemical factory, oil refinery, nuclear power plant or military facility is critical. Conventional perimeter intrusion-detection devices typically consist of cables, attached to fences, that sense vibrations, cuts or acoustic changes. But terrorists can get around these systems by building bridges over them or digging under them. Radio frequency identification just might be a better bet.

Inventor Kenneth Cecil has patented an RFID detection system comprising ultrahigh-frequency (UHF) RFID transponders placed on a wall or fence about two feet apart at varying heights. UHF readers are positioned 30 feet (10 meters) apart, 10 to 20 feet from the tagged wall, and set to ping the tags 20 times per second.

Photo: Pavel Burian, Dreamstime.com
The system also includes controllers designed to reside in the field and connect with up to 30 RFID readers. A central monitoring controller, at a remote location such as a guard station, continually polls all field controllers. When a transponder fails to respond, the field controller reports the transponder's unique identification code to the central monitoring controller, which has a database of tag IDs linked to specific locations, to determine where the breach occurred. The central monitoring controller also manages the alerts.

The body of someone attempting to scale a wall or tunnel under it absorbs the RF energy between a tag and a reader, briefly blocking the signal and preventing the tag from responding to the reader with its unique ID. The field controller relays the tag's unique ID to the central monitoring controller. You can also set the system to send an SMS (short message service) text message to a security guard's phone, point a closed-circuit TV in the direction of the intrusion, sound an alarm or all of the above.

"I developed a prototype and tested it," Cecil says. "The system is very simple but very effective. We will start production soon." Integrated Security, of Walled Lake, Mich., will distribute the product in the United States, he notes.

Cecil has also developed a tunnel-detection system that involves burying RFID tags and readers in plastic pipes and monitoring interruptions between signal and tag. If the solution catches on, maybe we'll all sleep more soundly at night.
To continue reading this article, please log in or choose a purchase option.

Option 1: Become a Premium Member.

One-year subscription, unlimited access to Premium Content: $189

Gain access to all of our premium content and receive 10% off RFID Reports and RFID Events!

Option 2: Purchase access to this specific article.

This article contains 372 words and 1 page. Purchase Price: $19.99

Upgrade now, and you'll get immediate access to:

  • Case Studies

    Our in-dept case-study articles show you, step by step, how early adopters assessed the business case for an application, piloted it and rolled out the technology.

    Free Sample: How Cognizant Cut Costs by Deploying RFID to Track IT Assets

  • Best Practices

    The best way to avoid pitfalls is to know what best practices early adopters have already established. Our best practices have helped hundreds of companies do just that.

  • How-To Articles

    Don’t waste time trying to figure out how to RFID-enable a forklift, or deciding whether to use fixed or mobile readers. Our how-to articles provide practical advice and reliable answers to many implementation questions.

  • Features

    These informative articles focus on adoption issues, standards and other important trends in the RFID industry.

    Free Sample: Europe Is Rolling Out RFID

  • Magazine Articles

    All RFID Journal Premium Subscribers receive our bimonthly RFID Journal print magazine at no extra cost, and also have access to the complete online archive of magazine articles from past years.

Become a member today!

RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations