Chapter 21

Radio Frequency Identification Security

Chunming Rong1, Gansen Zhao2, Liang Yan1, Erdal Cayirci1, and Hongbing Cheng1     1University of Stavanger, Stavanger, Norway     2Sun Yat-sen University, Guangzhou, P.R. China


Radio frequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support handling business transactions. Like any information technology, RFID presents security and privacy risks that must be carefully mitigated through management, operational, and technical controls to realize the numerous benefits ...

Get Computer and Information Security Handbook, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.