Security considerations for RFID technology adoption

Park Joo-Sang, Kim Young-il, Lee Yong-Joon
{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":null,"url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2005.246071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
采用RFID技术的安全考虑
RFID技术有望取代条形码或其他识别方案。但它还没有被广泛使用。RFID技术使用方便,具有AIDC自动识别和数据捕获的优点,但也存在严重的安全问题。RFID的主要目标是供应链管理,其中可能包含客户和公司的重要信息。然而,安全威胁成为RFID技术推广的障碍。本文首先阐述了RFID技术的安全问题。说明了RFID的安全方法和必要的标签存储结构
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new serial interference cancellation algorithm based on joint multiple timeslots processing Energy-aware packet forwarding algorithm for wireless sensor networks Improvement of TCP throughput with the snoop+/spl alpha/ protocol Intrusion alert normalization method using AWK scripts and attack name database A novel multi-layer architecture for wireless sensor networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1