{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":null,"url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2005.246071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained