Reference Hub5
Critical Evaluation of RFID Security Protocols

Critical Evaluation of RFID Security Protocols

Azam Zavvari, Ahmed Patel
Copyright: © 2012 |Volume: 6 |Issue: 3 |Pages: 19
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466612679|DOI: 10.4018/jisp.2012070103
Cite Article Cite Article

MLA

Zavvari, Azam, and Ahmed Patel. "Critical Evaluation of RFID Security Protocols." IJISP vol.6, no.3 2012: pp.56-74. http://doi.org/10.4018/jisp.2012070103

APA

Zavvari, A. & Patel, A. (2012). Critical Evaluation of RFID Security Protocols. International Journal of Information Security and Privacy (IJISP), 6(3), 56-74. http://doi.org/10.4018/jisp.2012070103

Chicago

Zavvari, Azam, and Ahmed Patel. "Critical Evaluation of RFID Security Protocols," International Journal of Information Security and Privacy (IJISP) 6, no.3: 56-74. http://doi.org/10.4018/jisp.2012070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.