Security and Privacy in RFID Systems

Security and Privacy in RFID Systems

Joarder Kamruzzaman (Monash University, Australia), A. K. M. Azad (Monash University, Australia), Nemai Chandra Karmakar (Monash University, Australia), Gour Karmakar (Monash University, Australia) and Bala Srinivasan (Monash University, Australia)
Copyright: © 2013 |Pages: 25
DOI: 10.4018/978-1-4666-2080-3.ch002
OnDemand PDF Download:
$37.50

Abstract

Security and privacy protection are very critical requirements for the widespread deployment of RFID technologies for commercial applications. In this chapter, the authors first present the security and privacy requirement of any commercial system, and then highlight the security and privacy threats that are unique to an RFID system. The security and privacy preserving protocols for RFID system proposed in literature are elaborately discussed, analyzing their strengths, vulnerabilities, and implementation issues. The open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications, are also presented.
Chapter Preview
Top

2. Rfid System

Figure 1 shows a three-layer architecture for an RFID system where the bottom RFID network layer manages one or more physical RFID networks consists of tags, readers and base stations, the top most application layer is for user applications and/or RFID based services, and the integration and interfaces between these two layers are done in the RFID middleware. In the following we briefly describe the components in the RFID network layer and middleware.

Figure 1.

Functional block diagram of RFID system

Complete Chapter List

Search this Book:
Reset