RFID privacy and authentication protocols
RFID is a promising technology that can revolutionize the way we lead our lives. However, before this becomes a reality, certain security issues like consumer privacy protection and fraud prevention and detection must be addressed. This chapter covers only a minimum amount of protocols used within RFID technology to establish the current security that protects this field. Before RFID officially overtakes the use of barcodes, extensive research must continue to ensure an efficient speed and protection of the individual tags. However, it still is believed that not every system using passive RFID tags will encase the same approach, but rather a number of security protocols will become the standard by EPC regulations for each separate RFID system. There is an ample scope in the field of RFID security to improve and innovate in order to allow RFID technology to be incorporated into our daily lives.
RFID privacy and authentication protocols, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch9-1.gif /docserver/preview/fulltext/books/ce/pbce112e/PBCE112E_ch9-2.gif