A Survey of RFID Deployment and Security Issues

Amit Grover and Hal Berghel
Volume: 7, No: 4, Page: 561 ~ 580, Year: 2011
10.3745/JIPS.2011.7.4.561
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Full Text:

Abstract
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Amit Grover and Hal Berghel, "A Survey of RFID Deployment and Security Issues," Journal of Information Processing Systems, vol. 7, no. 4, pp. 561~580, 2011. DOI: 10.3745/JIPS.2011.7.4.561.

ACM Style
Amit Grover and Hal Berghel, "A Survey of RFID Deployment and Security Issues," Journal of Information Processing Systems, 7, 4, (2011), 561~580. DOI: 10.3745/JIPS.2011.7.4.561.