Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/40275
Citations
Scopus Web of Science® Altmetric
?
?
Type: Book chapter
Title: RFID tag vulnerabilities in RFID systems
Author: Jamali, B.
Cole, P.
Engels, D.
Citation: Networked RFID systems and lightweight cryptography: raising barriers to product counterfeiting, 2008 / Cole, P., Ranasinghe, D. (ed./s), pp.147-156
Publisher: Springer
Publisher Place: Australia
Issue Date: 2008
ISBN: 3540716408
9783540716402
Editor: Cole, P.
Ranasinghe, D.
Statement of
Responsibility: 
Behnam Jamali, Peter H. Cole and Daniel Engels
Abstract: More than half a century after its inception, radiofrequency identification (RFID) technologies are finally living up to their long promised capabilities. They are being rewarded with pervasive deployments in closed loop applications and the initial deployments in the even more pervasive open loop supply chain management applications. By providing accurate, real-time, human out-of-the loop asset and product monitoring throughout the world’s supply chains, RFID technologies are beginning to improve the efficiency and security of these chains. The use of RFID technologies in these open loop supply chains is still in its infancy with all of the learning and growing pains that the introduction of a new technology entails. Security is of paramount importance in the deployment of RFID systems, particularly when they are being deployed, in part, to enhance the security of the supply chains. It is therefore appropriate that we examine now the potential security vulnerabilities inherent in the RFID systems currently being deployed in the supply chains of the world. Instead of covering the expansive RFID security landscape in this paper, we focus on the security vulnerabilities in the use of the data retrieved from an RFID tag. We conclude that the data stored on an RFID tag provides no more a security vulnerability to a system than any other manner of importing data into that system. Furthermore, the limited and highly structured nature of the data stored on the license plate RFID tags being used for supply chain management eliminates the potential for any security vulnerability due to the use of the tag data in a competent system.
Rights: © Springer
DOI: 10.1007/978-3-540-71641-9_7
Published version: http://www.springerlink.com/content/q0kg112356374650/
Appears in Collections:Aurora harvest 6
Electrical and Electronic Engineering publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.