A Survey of RFID Deployment and Security Issues


Amit Grover, Hal Berghel, Journal of Information Processing Systems Vol. 7, No. 4, pp. 561-580, Aug. 2011  

10.3745/JIPS.2011.7.4.561
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Fulltext:

Abstract

This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Amit Grover and Hal Berghel (2011). A Survey of RFID Deployment and Security Issues. Journal of Information Processing Systems, 7(4), 561-580. DOI: 10.3745/JIPS.2011.7.4.561.

[IEEE Style]
A. Grover and H. Berghel, "A Survey of RFID Deployment and Security Issues," Journal of Information Processing Systems, vol. 7, no. 4, pp. 561-580, 2011. DOI: 10.3745/JIPS.2011.7.4.561.

[ACM Style]
Amit Grover and Hal Berghel. 2011. A Survey of RFID Deployment and Security Issues. Journal of Information Processing Systems, 7, 4, (2011), 561-580. DOI: 10.3745/JIPS.2011.7.4.561.