Radio Frequency Identification (Rfid) Security Research Paper by write123

Radio Frequency Identification (Rfid) Security
A study on the limitations that presently exist with RFID technology.
# 106693 | 758 words | 4 sources | APA | 2008 | US
Published on Aug 12, 2008 in Physics (Mechanics) , Communication (General)


$19.95 Buy and instantly download this paper now

Description:

The paper presents a proposal for research of RFID security and relates how this technology might be improved upon. The paper further examines the latest developments in RFID technology including that of GEN 2. The paper states that identity management is a critical issue for RFID technology and until these issues are resolved, the need for better identity management will serve as a barrier for implementation of RFID technology. The paper concludes with recommendations for further research.

Outline:
Objective
Introduction
Literature review
Summary & Recommendations for Research

From the Paper:

"Noted as well in this report is the fact that percent of survey respondents held the number one priority to be national security. It was stated by 56 percent of those participating in the study, all of whom are government IT professionals that they had either "...seen or heard about someone violating their organization or agency's security protocols." (Security Products Magazine, 2008) Watson (2008) states in the work entitled: "Clear Vision: RFID Emerges as Powerful Security Tool" that while RFID security applications "...are easily categorized into tracking personnel and assets, companies are unlikely to find prepackaged RFID solutions from vendors. There is no off-the-shelf RFID..." and furthermore while RFID components have undergone standardization there is no guarantee of RFID component plug-and-play applications. (Watson, 2008; paraphrased) In fact, Ravi Pappu, co-founder and head of the advanced development group for Thing-Magic in Cambridge, Mass states that there is "some black magic that goes on to make an RFID system work."

Sample of Sources Used:

  • Survey: Majority of Government IT Professionals Believe Identity Management Importance Will Increase in the Next Five Years. Security Products. 5 Mar 2008. Online available at: http://www.secprodonline.com/articles/59229/
  • Roberts, Tegid (2004) Using Field-Programmable Analog to Build Adaptable RFID Readers" 1 Oct. 2004. RFDesign. Online available at: http://rfdesign.com/mag/radio_using_fieldprogrammable_analog/
  • Watson, Sharon J. (2008) Clear Vision: RFID Emerges As Powerful Security Tool. Security Products. 5 Feb. 2008. Online available at: http://www.secprodonline.com/articles/58081/
  • Ye, Terry (2007) RFID Hardware and Systems: Research Ideas, Opportunities and Collaborations. Session A. 2007. Briefing Session for LSCM Call-for-Proposals 9th January 2008. Online available at: http://64.233.167.104/search?q=cache:7gkAOSJXPncJ:www.lscm.hk/pages/files/events/83/Presentations-9Jan2008.pdf+current+RFID+security+and+needed+improvements&hl=en&ct=clnk&cd=18&gl=us

Cite this Research Paper:

APA Format

Radio Frequency Identification (Rfid) Security (2008, August 12) Retrieved October 18, 2019, from https://www.academon.com/research-paper/radio-frequency-identification-rfid-security-106693/

MLA Format

"Radio Frequency Identification (Rfid) Security" 12 August 2008. Web. 18 October. 2019. <https://www.academon.com/research-paper/radio-frequency-identification-rfid-security-106693/>

Comments