RFID TECHNOLOGY, PRIVACY AND SECURITY

被引:0
|
作者
Stankovski, Stevan [1 ]
Ostojic, Gordana [1 ]
Lazarevic, Milovan [1 ]
Popovic, Bozidar [2 ]
Mijic, Danijel [2 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad, Serbia
[2] Univ East Sarajevo, Fac Elect Engn, Lukavica, Bosnia & Herceg
关键词
RFID Technology; RFID Tag; Privacy; Security;
D O I
暂无
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Every day, people interact directly with a Radio Frequency Identification (RFID) device (tag), buying a product or accessing some desired place. The tag can then be interrogated via radio waves by an RFID reader to return a small amount of information, such as an identification code or personal data. Also, the RFID technology is very useful for supplying chain management, item tracking and other areas. At the same time, the RFID technology raises privacy and security issues. For example, applying RFID tags to individual items raises the possibility that the movement of these items can be tracked, or that individuals can be scanned to learn what items they carry. Many other examples can be named to illustrate problems arising from undesired uses of the RFID data. This paper presents some issues that can be very helpful for overcoming the above mentioned problems.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [1] The Security and Privacy Protection in RFID
    Fu, Chunchang
    He, Weilin
    [J]. FRONTIERS OF ADVANCED MATERIALS AND ENGINEERING TECHNOLOGY, PTS 1-3, 2012, 430-432 : 1755 - 1758
  • [2] A Study on Security and Privacy in RFID
    Zarmehi, Sadegh
    Elyasi, Iman
    Kowsar, Zohreh
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 22 - 25
  • [3] Privacy and security problems in RFID
    Razaq, A.
    Luk, W. T.
    Cheng, L. M.
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 401 - +
  • [4] Security on RFID technology
    Kannouf, Nabil
    Douzi, Youssef
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 262 - 266
  • [5] A brief survey on RFID privacy and security
    Aragones-Vilella, J.
    Martinez-Balleste, A.
    Solanas, A.
    [J]. WORLD CONGRESS ON ENGINEERING 2007, VOLS 1 AND 2, 2007, : 1488 - +
  • [6] RFID security and privacy: A research survey
    Juels, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 381 - 394
  • [7] A platform for RFID security and privacy administration
    Rieback, Melanie R.
    Gaydadjiev, Georgi N.
    Crispo, Bruno
    Hofman, Rutger F. H.
    Tanenbaum, Andrew S.
    [J]. LISA 06: USENIX ASSOCIATION PROCEEDINGS OF THE 20TH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE, 2006, : 89 - +
  • [8] Price to provide RFID security and privacy?
    Good, Tim
    Benaissa, Mohammed
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 209 - 213
  • [9] An Exploration of RFID Information Security and Privacy
    Chen, Chih-Yung
    Kuo, Chien-Ping
    Chien, Fang-Yuan
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 65 - +
  • [10] Security and privacy in RFID and applications in telemedicine
    Xiao, Y
    Shen, XM
    Sun, B
    Cai, L
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (04) : 64 - 72