{"title":"RFID: An appraisal of malevolent attacks on RFID security system and its resurgence","authors":"M. Pandian, R. Sukumar","doi":"10.1109/MITE.2013.6756297","DOIUrl":null,"url":null,"abstract":"Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their service for security. In this paper, we give a small study on RFID technology and its working of RFID system. A comparative study made on different attacks on RFID system and the recovery methods are described in detail. This article will suggest a direction for research to recover from the RFID Tag attacks and damage problem.","PeriodicalId":284844,"journal":{"name":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MITE.2013.6756297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their service for security. In this paper, we give a small study on RFID technology and its working of RFID system. A comparative study made on different attacks on RFID system and the recovery methods are described in detail. This article will suggest a direction for research to recover from the RFID Tag attacks and damage problem.