Reference Hub4
Radio Frequency Identification Systems Security Challenges in Supply Chain Management

Radio Frequency Identification Systems Security Challenges in Supply Chain Management

Copyright: © 2019 |Pages: 23
ISBN13: 9781522578116|ISBN10: 1522578110|EISBN13: 9781522578123
DOI: 10.4018/978-1-5225-7811-6.ch010
Cite Chapter Cite Chapter

MLA

Pal, Kamalendu. "Radio Frequency Identification Systems Security Challenges in Supply Chain Management." Smart Devices, Applications, and Protocols for the IoT, edited by Joel J. P. C. Rodrigues, et al., IGI Global, 2019, pp. 220-242. https://doi.org/10.4018/978-1-5225-7811-6.ch010

APA

Pal, K. (2019). Radio Frequency Identification Systems Security Challenges in Supply Chain Management. In J. Rodrigues, A. Gawanmeh, K. Saleem, & S. Parvin (Eds.), Smart Devices, Applications, and Protocols for the IoT (pp. 220-242). IGI Global. https://doi.org/10.4018/978-1-5225-7811-6.ch010

Chicago

Pal, Kamalendu. "Radio Frequency Identification Systems Security Challenges in Supply Chain Management." In Smart Devices, Applications, and Protocols for the IoT, edited by Joel J. P. C. Rodrigues, et al., 220-242. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7811-6.ch010

Export Reference

Mendeley
Favorite

Abstract

The radio frequency idtentification (RFID) is a wireless technology that enable automatic identification and extraction of stored information from any tagged object within a supply chain environment. A simple RFID system uses radio waves to collect and transfer data from a tag attached to an object linked to an RFID reader for identifying, tracking, and data capturing. However, RFID-based systems have numerous security- and privacy-related threats for the deployment of such technology in supply chain automation purpose. This chapter explains the technical fundamentals of RFID systems and its security threats. It also classifies the existing security and privacy threats into those which target the RFID components such as the tag, the communication channel, and the overall system threats. Finally, the chapter discusses the open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications in supply chain management (SCM).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.