Article | REF: H5325 V1

RFID systems: technology, risks, and security solutions

Authors: Ethmane EL MOUSTAINE, Maryline LAURENT

Publication date: November 10, 2012

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

ABSTRACT

This article focuses on RFID (Radio Frequency Identification) technology that is poised to prevail in many industrial applications and in everyday life. RFID technology, the architecture, the EPC Global standard, the possible usages, the risks to our private lives, the technological obstacles to be overcome, and the families of recommended security solutions are addressed.

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHORS

  • Ethmane EL MOUSTAINE: Doctoral student at Institut Mines-Télécom/Télécom SudParis, CNRS Samovar UMR 5157 laboratory

  • Maryline LAURENT: Professor at Institut Mines-Télécom/Télécom SudParis, CNRS Samovar UMR 5157 laboratory

 INTRODUCTION

Contactless RFID (Radio Frequency IDentification) technology is designed to identify and scan objects without the need for physical or visual contact. A simple RFID tag affixed to any object enables that object to reveal its ID and movements to any RFID reader in the vicinity. Of course, only active tags can respond to reader requests.

Its advantages as a replacement for barcodes are obvious to any company operating in the logistics sector. It enables faster inventory-taking in lorries, warehouses...

But it also helps to improve product traceability, to better combat counterfeiting and theft from warehouses, for example...

However, many other uses are promising, and could transform our society by automating certain tasks in our daily lives, by better adapting our environment to our personal needs...

This article looks at RFIDs from a technological angle, but also :

  • the network architecture in which they operate;

  • of the EPCGlobal standard;

  • possible uses;

  • the risks to our privacy;

  • technological barriers to be overcome ;

  • of today's recommended security solution families.

Glossary

Abbreviations

Meaning

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Control and systems engineering

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
RFID systems and techniques