RFID enabled cards skimming: enhanced technology

J. Kaur, N. Kehar
{"title":"RFID enabled cards skimming: enhanced technology","authors":"J. Kaur, N. Kehar","doi":"10.1145/2007052.2007083","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification (RFID) is an emerging technology to enhance the Bar- code technology. This technology enables the electronic and wireless labelling and identification of objects, humans and animals. The technology can be used for many powerful applications including automatic item tracking, smart home appliances etc. The key idea is to attach each and every item with an RFID tag which can be read by RFID readers via radio communication. RFID technology uses wireless communication in radio frequency bands to transmit data from tags to readers. A reader scans the tag for data and sends the information to a database, which stores the data contained on the tag. RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. It is not a new technology and has been in the public domain for at least 10 years.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"196 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Advances in Computing and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2007052.2007083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Radio Frequency Identification (RFID) is an emerging technology to enhance the Bar- code technology. This technology enables the electronic and wireless labelling and identification of objects, humans and animals. The technology can be used for many powerful applications including automatic item tracking, smart home appliances etc. The key idea is to attach each and every item with an RFID tag which can be read by RFID readers via radio communication. RFID technology uses wireless communication in radio frequency bands to transmit data from tags to readers. A reader scans the tag for data and sends the information to a database, which stores the data contained on the tag. RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. It is not a new technology and has been in the public domain for at least 10 years.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
RFID刷卡:增强技术
射频识别(RFID)是在条形码技术的基础上发展起来的一项新兴技术。这项技术可以对物体、人类和动物进行电子和无线标签和识别。该技术可用于许多强大的应用,包括自动物品跟踪,智能家电等。关键的想法是在每件物品上都贴上RFID标签,RFID阅读器可以通过无线电通信读取标签。RFID技术使用无线电频段的无线通信将数据从标签传输到读取器。阅读器扫描标签以获取数据,并将信息发送到数据库,数据库存储标签中包含的数据。RFID网络正在快速部署,并已大规模进入公共空间:公共交通卡,生物识别护照,办公室ID令牌,客户忠诚度卡等。尽管RFID技术为顾客和零售商提供了有趣的服务,但它也可能危及最终用户的隐私。缺乏保护机制可能会导致个人数据的隐私泄露。这不是一项新技术,至少在10年前就已经进入了公共领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Secured routing over MANET with power management A comparative study of UML tools Automated taxi/cab system using A* algorithm Ontology based semantic similarly ranking of documents Security policy implementation using connection and event log to achieve network access control
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1