Security and Privacy in RFID Systems

Security and Privacy in RFID Systems

Joarder Kamruzzaman, A. K. M. Azad, Nemai Chandra Karmakar, Gour Karmakar, Bala Srinivasan
Copyright: © 2013 |Pages: 25
DOI: 10.4018/978-1-4666-2080-3.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security and privacy protection are very critical requirements for the widespread deployment of RFID technologies for commercial applications. In this chapter, the authors first present the security and privacy requirement of any commercial system, and then highlight the security and privacy threats that are unique to an RFID system. The security and privacy preserving protocols for RFID system proposed in literature are elaborately discussed, analyzing their strengths, vulnerabilities, and implementation issues. The open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications, are also presented.
Chapter Preview
Top

2. Rfid System

Figure 1 shows a three-layer architecture for an RFID system where the bottom RFID network layer manages one or more physical RFID networks consists of tags, readers and base stations, the top most application layer is for user applications and/or RFID based services, and the integration and interfaces between these two layers are done in the RFID middleware. In the following we briefly describe the components in the RFID network layer and middleware.

Figure 1.

Functional block diagram of RFID system

978-1-4666-2080-3.ch002.f01

Complete Chapter List

Search this Book:
Reset