RFID Security
Chunming Rong, University of Stavanger
Erdal Cayirci, University of Stavanger
Radiofrequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support the handling of business transactions.
1. RFID Introduction
Generally, an RFID system consists of three basic components: RFID tags, RFID readers, and a back-end database.
• RFID tags or RFID transponders. These are the data carriers attached to objects. A typical RFID tag contains information about the attached object, such as an identifier (ID) of the object ...
Get Computer and Information Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.