RFID TECHNOLOGY, PRIVACY AND SECURITY

被引:0
|
作者
Stankovski, Stevan [1 ]
Ostojic, Gordana [1 ]
Lazarevic, Milovan [1 ]
Popovic, Bozidar [2 ]
Mijic, Danijel [2 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad, Serbia
[2] Univ East Sarajevo, Fac Elect Engn, Lukavica, Bosnia & Herceg
关键词
RFID Technology; RFID Tag; Privacy; Security;
D O I
暂无
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Every day, people interact directly with a Radio Frequency Identification (RFID) device (tag), buying a product or accessing some desired place. The tag can then be interrogated via radio waves by an RFID reader to return a small amount of information, such as an identification code or personal data. Also, the RFID technology is very useful for supplying chain management, item tracking and other areas. At the same time, the RFID technology raises privacy and security issues. For example, applying RFID tags to individual items raises the possibility that the movement of these items can be tracked, or that individuals can be scanned to learn what items they carry. Many other examples can be named to illustrate problems arising from undesired uses of the RFID data. This paper presents some issues that can be very helpful for overcoming the above mentioned problems.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [31] PUF-enhanced offline RFID security and privacy
    Kardas, Suleyman
    Celik, Serkan
    Yildiz, Muhammet
    Levi, Albert
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 2059 - 2067
  • [32] An approach to security and privacy of RFID system for supply chain
    Gao, XX
    Xiang, Z
    Wang, H
    Shen, J
    Huang, J
    Song, S
    [J]. PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, 2004, : 164 - 168
  • [33] A holistic approach examining RFID design for security and privacy
    Good, Tim
    Benaissa, Mohammed
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 64 (03): : 664 - 684
  • [34] Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
    Arslan, Atakan
    Kardas, Suleyman
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1355 - 1375
  • [35] A New Security and Privacy Framework for RFID In Cloud Computing
    Kardas, Suleyman
    Celik, Serkan
    Bingol, Muhammed Ali
    Levi, Albert
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 171 - 176
  • [36] Privacy and RFID Technology: A Review of Regulatory Efforts
    Turri, Anna M.
    Smith, Ronn J.
    Kopp, Steven W.
    [J]. JOURNAL OF CONSUMER AFFAIRS, 2017, 51 (02) : 329 - 354
  • [37] Integrating RFID technology to protect privacy in library
    Duan, Li
    [J]. INTERNATIONAL JOURNAL OF RF TECHNOLOGIES-RESEARCH AND APPLICATIONS, 2020, 11 (01) : 15 - 29
  • [38] Enhancing Privacy and Security in RFID-Enabled Banknotes
    Yang, Ching-Nung
    Chen, Jie-Ru
    Chiu, Chih-Yang
    Wu, Gen-Chin
    Wu, Chih-Cheng
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 439 - 444
  • [39] eRIPP-FS: Enforcing privacy and security in RFID
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Spognardi, Angelo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 58 - 70
  • [40] Roadmap to solving security and privacy concerns in RFID systems
    University of the South Pacific, Fiji
    [J]. Comput Law Secur Rep, 2007, 6 (555-561):