Abstract
Radio Frequency Identification (RFID) is a technology that uses electronic tags to store data which in turn can be accessed in real time wirelessly. There is great potential for RFID technology in our society. RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation. Standards in the RFID industry are examined with an emphasis place on global standardizing bodies. With the growing use of RFID devices in supply chain management and global shipping, several shipping standards including EPC and ASN are examined. Security has become a major concern with several threats to RFID technology recently exposed. Several solutions are presented for firms wishing to implement RFID technology and minimize the risk to sensitive information and company systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Asahi, T., Yamato, J.: MIT Auto-ID Center Advances the Standardization of RFID Tags. Global Standardization Activities 1, 95–97 (2003)
Baard, M.: RFID: Sign of the (End) Times? (2006), http://www.wired.com/science/discoveries/news/2006/06/70308
Bhatt, H., Glover, B.: RFID Essentials. O’Reilly Media, Inc., Sebastopol (2006)
Brown, M., Sabella, R., Zeisel, E.: RFID + Exam Cram. Que Publishing, Indiana (2006)
Campbell, A., Das, A., Haines, B., Kleinschmidt, J., Thornton, F.: RFID Security. Syngress Publishing, Canada (2006)
CDT Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, http://www.cdt.org/privacy/20060501rfid-best-practices.php
EPCglobal Inc. - The EPCglobal Architecture Framework (2007), http://www.epcglobalinc.org/standards/architecture/architecture_1_2-framework-20070910.pdf
Gralla, P.: How Personal & Internet Security Work. Que Publishing, Indiana (2006)
Grunwald, L.: What is RFDump (2002), http://www.rf-dump.org/about.shtml
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Kim, J.: RFID Technology and Private Issues. KSEA Letters 36(2), 45–51 (2008)
Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report 9, 39–49 (2004)
Passports (n.d), http://travel.state.gov/passport/passport_1738.html
Phillips, T., Karygiannis, T., Huhn, R.: Security Standards for the RFID Market. IEEE Security and Privacy 3, 85–89 (2005)
So, S.C.K., Lui, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Security Journal: A Global Perspective 15(4), 43–50 (2006)
Radio-frequency identification (n.d), http://en.wikipedia.org/wiki/RFID
Radio Frequency Identification (RFID) Systems, http://epic.org/privacy/rfid/
RFID Business Applications, http://www.rfidjournal.com/article/articleview/1334/1/129/
RFID Consumer Applications and Benefits, http://www.rfidjournal.com/article/articleview/1332/1/129/
Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. Pervasive Computing 5(1), 62–69 (2006)
Reiback, M., Crispo, B., Tanenbaum, A.: The Evolution of RFID Security. IEEE Pervasive Computing 5, 62–69 (2006)
Reiback, M., Crispo, B., Tanenbaum, A.: RFID Malware: Truth vs. Myth. IEEE Security and Privacy 4, 70–72 (2006)
The Basics of RFID Technology, http://www.rfidjournal.com/article/articleview/1337/1/129/
The History of RFID Technology, http://www.rfidjournal.com/article/articleview/1338/2/129/
RFID: Improved Patient Safety, http://clearcount.com/rfid-improved-patient-safety
Fuqua, M.: Is RFID Getting Primed To Change Digital Marketing?, http://fifthgearanalytics.com/2010/11/is-rfid-getting-primed-to-change-digital-marketing/
Cho, N.: New US High Tech E-passport, http://www.mydigitallife.info/new-us-high-tech-e-passport/
Jukes, I.: Phones, Paper ‘Chips’ May Fight Disease, http://www.committedsardine.com/blogpost.cfm?blogID=914
Phillips, T., Karygiannis, T., Kuhn, R.: Security Standards for the RFID Market. IEEE Security & Privacy 3(6) (November/December 2005)
Grunwald, L.: RFDump can hack RFID tags, http://www.rfidgazette.org/2004/07/lukas_grunwalds.html
So, S.C.K., Liu, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Systems Security, 43–50 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, Y.B., Oh, T.H., Chouta, R. (2011). RFID Implementation and Security Issues. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)