You are not logged in.

Security risks/vulnerability in a RFID system and possible defenses

Chowdhury, Morshed U. and Ray, Biplob R. 2013, Security risks/vulnerability in a RFID system and possible defenses. In Karmakar, Nemai Chandra (ed), Advanced RFID systems, security, and applications, Information Science Reference, Hershey, Pa., pp.1-15, doi: 10.4018/978-1-4666-2080-3.ch001.

Attached Files
Name Description MIMEType Size Downloads

Title Security risks/vulnerability in a RFID system and possible defenses
Author(s) Chowdhury, Morshed U.ORCID iD for Chowdhury, Morshed U.
Ray, Biplob R.
Title of book Advanced RFID systems, security, and applications
Editor(s) Karmakar, Nemai Chandra
Publication date 2013
Chapter number 1
Total chapters 14
Start page 1
End page 15
Total pages 15
Publisher Information Science Reference
Place of Publication Hershey, Pa.
Summary Remote technologies are changing our way of life. The radio frequency identification (RFJD) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a 5ystem that hasfraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID 5ystems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID 5ystems.
ISBN 1466620803
Language eng
DOI 10.4018/978-1-4666-2080-3.ch001
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
Persistent URL

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 9 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 207 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 18 Mar 2013, 09:12:33 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact