Chapter 12

RFID Security

Chunming Rong*, Gansen Zhao, Liang Yan*, Erdal Cayirci* and Hongbing Cheng*,    *University of Stavanger, Norway,    Sun Yat-sen University, China

Radio frequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support the handling of business transactions. Like any information technology (IT), radio frequency identification (RFID) presents security and privacy risks that must be carefully mitigated through management, operational, and technical controls in order to realize the numerous benefits ...

Get Network and System Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.