Chapter 21

Radio Frequency Identification Security

Chunming Rong1, Gansen Zhao2, Liang Yan1, Erdal Cayirci1, and Hongbing Cheng1     1University of Stavanger, Stavanger, Norway     2Sun Yat-sen University, Guangzhou, P.R. China

Abstract

Radio frequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support handling business transactions. Like any information technology, RFID presents security and privacy risks that must be carefully mitigated through management, operational, and technical controls to realize the numerous benefits ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.