Skip to Main Content
Wireless Security: Know It All
book

Wireless Security: Know It All

by Praphul Chandra, Frank Thornton, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
April 2011
Intermediate to advanced content levelIntermediate to advanced
744 pages
21h 41m
English
Newnes
Content preview from Wireless Security: Know It All

Chapter 24. RFID Security

24.1. Introduction

In a broad context, radio transmissions containing some type of identifying information are considered Radio Frequency Identification (RFID).This can be a cab driver using his unit number over the air, or the call sign of a radio station. This chapter discusses the tools, applications, and security of RFID.

RFID is about devices and technology that use radio signals to exchange identifying data. In the usual context, this implies a small tag or label that identifies a specific object. The action receives a radio signal, interprets it, and then returns a number or other identifying information. (e.g., “What are you?” answered with “I am Inventory Item Number 12345”).

Alternatively, it can be as complex ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
802.11 Security

802.11 Security

Bob Fleck, Bruce Potter
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781856175296