Radio Frequency Identification: The Current and Future Solutions for Privacy and Security

PDF Version Also Available for Download.

Description

Paper discusses standards, protocols, security, and privacy concerns related to Radio Frequency Identification (RFID).

Physical Description

25 p.: ill.

Creation Information

Jain, Vivek 2007.

Context

This article is part of the collection entitled: The Eagle Feather and was provided by the UNT Libraries to the UNT Digital Library, a digital repository hosted by the UNT Libraries. It has been viewed 18 times. More information about this article can be viewed below.

Who

People and organizations associated with either the creation of this article or its content.

Author

Sponsor

Publisher

Provided By

UNT Libraries

The UNT Libraries serve the university and community by providing access to physical and online collections, fostering information literacy, supporting academic research, and much, much more.

Contact Us

What

Descriptive information to help identify this article. Follow the links below to find similar items on the Digital Library.

Degree Information

Description

Paper discusses standards, protocols, security, and privacy concerns related to Radio Frequency Identification (RFID).

Physical Description

25 p.: ill.

Notes

Abstract: There has been a lot of interest expressed by the public and media at large about the security and privacy issues involved in the adoption of a rapidly growing, relatively new identification technology: Radio Frequency Identification (RFID). Although most interest has been generated by the unique advantages this technology brings with it, substantial and mostly valid concerns have been raised at various public policy and academic fora. RFID, just like any other wireless technology, is open to ‘rogue’ interceptions. However, distinct challenges arise in this new technology because of the inherent ease and low cost of the methods that can be used to access and manipulate data stored in the RFID media. Like any new technology, however, there is a mismatch between the nonprofessional’s perception and technical realities concerning both the advantages and concerns of RFID. This paper, therefore, explores the plethora of standards, protocols, ‘attack models,’ and security algorithms and collates them for use as a compendium for RFID students and practitioners alike.

Source

  • Eagle Feather, Issue 4, University of North Texas Honors College: Denton, Texas. 2007

Language

Item Type

Identifier

Unique identifying numbers for this article in the Digital Library or other systems.

Publication Information

  • Publication Title: Eagle Feather
  • Volume: 4
  • Issue: 2007
  • Peer Reviewed: Yes

Collections

This article is part of the following collections of related materials.

The Eagle Feather

Launched in 2004 by UNT's Honors College, The Eagle Feather was an interdisciplinary undergraduate research journal that promoted the work of students and their faculty mentors. The Eagle Feather was published annually until 2017 when it transitioned into the North Texas Journal of Undergraduate Research.

UNT Undergraduate Student Works

This collection presents scholarly and artistic content created by undergraduate students. All materials have been previously accepted by a professional organization or approved by a faculty mentor. Most classroom assignments are not eligible for inclusion. The collection includes, but is not limited to Honors College theses, thesis supplemental files, professional presentations, articles, and posters. Some items in this collection are restricted to use by the UNT community.

What responsibilities do I have when using this article?

When

Dates and time periods associated with this article.

Creation Date

  • 2007

Added to The UNT Digital Library

  • March 22, 2020, 10:07 a.m.

Description Last Updated

  • April 15, 2020, 11:12 a.m.

Usage Statistics

When was this article last used?

Yesterday: 0
Past 30 days: 0
Total Uses: 18

Interact With This Article

Here are some suggestions for what to do next.

Start Reading

PDF Version Also Available for Download.

International Image Interoperability Framework

IIF Logo

We support the IIIF Presentation API

Jain, Vivek. Radio Frequency Identification: The Current and Future Solutions for Privacy and Security, article, 2007; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc1633173/: accessed May 28, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .

Back to Top of Screen