{"title":"射频识别:对射频识别安全系统的恶意攻击及其复苏的评估","authors":"M. Pandian, R. Sukumar","doi":"10.1109/MITE.2013.6756297","DOIUrl":null,"url":null,"abstract":"Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their service for security. In this paper, we give a small study on RFID technology and its working of RFID system. A comparative study made on different attacks on RFID system and the recovery methods are described in detail. This article will suggest a direction for research to recover from the RFID Tag attacks and damage problem.","PeriodicalId":284844,"journal":{"name":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"RFID: An appraisal of malevolent attacks on RFID security system and its resurgence\",\"authors\":\"M. Pandian, R. Sukumar\",\"doi\":\"10.1109/MITE.2013.6756297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their service for security. In this paper, we give a small study on RFID technology and its working of RFID system. A comparative study made on different attacks on RFID system and the recovery methods are described in detail. This article will suggest a direction for research to recover from the RFID Tag attacks and damage problem.\",\"PeriodicalId\":284844,\"journal\":{\"name\":\"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MITE.2013.6756297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MITE.2013.6756297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RFID: An appraisal of malevolent attacks on RFID security system and its resurgence
Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their service for security. In this paper, we give a small study on RFID technology and its working of RFID system. A comparative study made on different attacks on RFID system and the recovery methods are described in detail. This article will suggest a direction for research to recover from the RFID Tag attacks and damage problem.