Chapter 15. RFID Security: Attacking the Backend

Introduction

Radio Frequency Identification (RFID) technology has come a long way. From hardware standards (frequency, air link protocols, tag format, and so on) to data collection and device management, RDID technology has stabilized. Data collection, data management, and data analysis is the core of the value from RFID. The middleware collects and filters data in real time. Tracking mechanisms are based on data. The backend determines what to do with ...

Get How to Cheat at Deploying and Securing RFID now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.