Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

RFID: Technology that Disrupts

By Priyanka Gouthaman
March 17, 2006
RFID applications evolve. For example, WORLDLABEL.COM just patented a process for embedding of RFID tags. The firm’s RFID paper label, 4 x 6 inch with thermal transfer facestock in roll form, can be printed with most popular thermal transfer printers. The labels can be embedded with UF and UHF tags with information or without. Tags can be embedded anywhere in the label according to end-user and security requirements.


Radio frequency identification or RFID will prove to be a disruptive technology for enterprises and their need to align security technology with their business goals.

Security applications including asset management and access control have been a traditional market for RFID technology. The early adoption of the technology enabled a significant evolution acclimatized to specific security applications. The percent of security applications in the total world RFID-based applications market is estimated at 33 percent according to Frost & Sullivan. The niche is expected to have a positive growth rate of 29.9 percent.

While the potential of the technology is quite evident, widespread adoption has been challenged by factors such as the cost of hardware, lack of standards, regional disparities of frequencies and investment, constant evolution of the technology and the need for upgrades. Apprehension centered on the security of tags represents a paradoxical situation since the fundamental rationale for RFID is to improve the efficiency of existing security applications. The challenge has, however, resulted in developmental efforts for in-built tag encryption and security features, thereby increasing end-user confidence.

High surveillance and security focused areas such as airports, embassies, military bases, laboratories, hospitals, museums, financial, educational and retail establishments represent high-demand RFID sectors. The basic feature of enhanced visibility and minimal human interaction extended by RFID systems complements the requirements of existing security markets.



Priyanka Gouthaman

Emphasis on homeland security

Homeland security concerns have been one of the biggest drivers for the growth of RFID. National security projects have driven widespread adoption and deployment in the wake of terrorist attacks in the United States and Western Europe. The largest RFID applications on the homeland security front center on aviation and documentation security.

The business case for RFID is compelled by significant aviation security challenges with respect to logistics checks and explosive detection systems. Document security includes securing passports, visas, driving licenses and national identification cards. Large RFID pilots such as the San Francisco International Airport and the Hong Kong International Airport reflect the gaining popularity of RFID. Government-backed projects such as the National ID project in China and the use of RFID tags for certain documents in the United States hold promise for the accelerated adoption of the technology. Biometrics-based recognition modules also impact RFID with implementation of nationwide programs across the United States, Canada and all major European Union countries.



Exploring opportunities

The constant evolution of RFID into niche applications includes securing of currency notes. The European Central Bank, for example, has been proactive in experimenting with RFID to counter counterfeiting of Euro notes.

There has already been an increasing trend of RFID for card access control applications. However, the cost of the technology is a significant impediment to widespread adoption among commercial security application markets. The trend of decreasing price levels is expected to phase out the challenge in the future. Price announcements towards the end of 2005 witnessed tag costs drop to approximately 10 to 15 cents for specific order sizes.

There is an increasing focus on integrating RFID with other data capture and wireless technologies to ensure a hybrid sensor-based network. Hybrid technology platforms increase the scope of existing security networks, enabling real-time track and trace applications. These security applications represent significant potential since there exists a stronger business case for item level tagging as compared to supply chain applications that are focused on the pallet and case levels. The interest evinced by major RFID participants such as Texas Instruments, Philips, Infineon, Transcore, Alien, Axalto, Gemplus and Savi Technologies mirrors such future potential.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Priyanka Gouthaman, with Frost & Sullivan, San Antonio, is a widely recognized expert in the automatic identification industry, with primary expertise in radio frequency identification.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Setting an RFID Paradigm

    See More
  • Just How Versatile is RFID Technology?

    See More
  • How RFID and NFC Technology Enhances the Enterprise

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing