RFID Technical Tutorial and Threat Modeling

نویسنده

  • Neeraj Chaudhry
چکیده

Radio frequency identification (RFID) uses radio frequency signals to automatically identify objects. RFID is used to pay for gas without going into the store, in automobile immobilizer systems to prevent theft, in toll road systems to automatically pay tolls without stopping, in animal identification, in secure entry cards, and in the supply chain to manage the flow of pallets, cases, and items. Most media accounts of RFID are actually about one form of RFID, the electronic product code (EPC) system used by retailers to manage the supply chain. EPC has standardized chip designs and protocols that have enabled the mass production of low-cost passive RFID tags. EPC provides identification of the product to which the EPC tag is attached like a barcode, except that it can be read at a distance and does not require line-of-sight aiming. This technical tutorial is divided into three parts. Part I describes the RFID technology using EPC as an example. Part II discusses EPCglobal and retail RFID technology because the mass production of EPC tags is creating the largest RFID system that will have a long-term impact on society. The final part categorizes the different security threats to EPC and challenges to overcome.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A tutorial on Quasi-experimental designs

A main step in answering a scientific hypothesis in an epidemiological study is deciding which type of study is suitable to be undertaken, considering methodology, practical considerations and budget and time limitations

متن کامل

Reviewing the drivers and challenges in RFID implementation in the pharmaceutical supply chain

Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-an...

متن کامل

RFID security

Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats ...

متن کامل

مدل اپیدمی یک مفهوم در رده های موضوعی پروانه‌های ثبت اختراع: مطالعه موردی اصطلاح RFID

The current research aims at studying the epidemic model of the term RFID within the classes of patents. Methodology: The research is descriptive and has been conducted based on the mathematical models of diseases. Research population consists of 35,627 granted patents from the USPTO database those which the terms RFID or Radio Frequency Identification occur in their titles or abstracts. Data a...

متن کامل

Cryptographic Approach to “Privacy-Friendly” Tags

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to everyday items, they may be used to support various useful services. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. There are several important technical points whe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005