An Introduction to RFID Technology
Sanjay Ahuja, Pavan Potti
.
DOI: 10.4236/cn.2010.23026   PDF    HTML     22,554 Downloads   39,274 Views   Citations

Abstract

RFID technology emerged some time back and was not used that much because of lack of standardization and high costs. Latest technologies have brought costs down and standards are being developed. Today RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper describes RFID technology and its applications in today’s world.

Share and Cite:

S. Ahuja and P. Potti, "An Introduction to RFID Technology," Communications and Network, Vol. 2 No. 3, 2010, pp. 183-186. doi: 10.4236/cn.2010.23026.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Roy Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, Santa Clara, 2006, PP. 25-33.
[2] Ron Weinstein, “RFID: A Technical Overview and Its Application to the Enterprise,” IT Pro-fessional, Vol. 7, No. 3, June 2005, pp. 27-33.
[3] Klaus Finkenzeller, “RFID Handbook,” 2nd edition, John Wiley & Sons, Ciudad Real, 2003.
[4] Badri Nath, Franklin Reynolds, Roy Want, “RFID Technology and Applications,” IEEE CS and IEEE ComSoc, Vol. 5, No. 1, 2006, pp. 22-24.
[5] Timo Salminen, Simo Hosio and Jukka Riekki, “Enhancing Bluetooth Connectivity with RFID,” Proceedings of the Fourth Annual IEEE International Conference on Perva-sive Computing on Pervasive Computing and Communi-cations, Pisa, 2006, pp. 6-41.
[6] Lei Zhang and Zhi Wang, “Integration of RFID into Wireless Sensor Net-works: Architectures, Opportunities and Challenging Problems,” Proceedings of the Fifth International Confe-rence on Grid and Cooperative Computing Workshops, Hunan, 2006, pp.463-469.
[7] N.Krahntoever, J.Rittscher, P.Tu, K.Chean and T.Tomlin-son, “Activity Recognition Using Visual Tracking and RFID,” Pro-ceedings of the Seventh IEEE Workshop on Applications for Computer Vision, Vol. 1, New York ,2005, pp. 494-500.
[8] Melanie R.Rieback, Bruno Crispo and Andrew S.Tanen-baum, “RFID Malware,” IEEE Security and Privacy, Vol. 4, No. 4, 2006, pp. 70-72.
[9] Hyun-Seok Kim, Jeong-Hyum Ob and Jin-Young Choi, “Security Analysis of RFID Authentica-tion for Pervasive Systems using Model Checking,” Pro-ceedings of the 30th Annual International Computer Software and Applications Conference, Vol. 2, Chicago, 2006, pp. 195-202.
[10] Hyun-Seok Kim, Jung-Hyun Oh, Jin-Young Choi and Jin-Woo Kim, “The Vulnerabilities Analysis and Design of the Security Protocol for RFID System,” Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, Seoul, 2006, p.152.
[11] Simon L.Garfinkel, Ari Juels and Ravi Pappu, “RFID Privacy: An Overview of Prob-lems and Proposed Solutions,” IEEE Security and Privacy, Vol. 3, No. 3, Massachusetts, 2005, pp.34-43.
[12] Fred Niederman, Richard G.Mathieu, Roger Morley, and Ik-Whan Kwon, “Examining RFID Applications in Supply Caching Management,” Communications of the ACM, Vol. 50, No. 7, July 2007, pp. 92-101.
[13] Zoltan Nochta, Thorsten Staake and Elgar Fleisch, “Product Specific Security Features Based on RFID Technology,” Proceedings of the International Symposium on Applications and the Internet Workshops, Phoenix, 2005. pp. 4-75.
[14] Ramaswamy Chandramouli, Tim Grance, Rick kuhn, and Susan Landau, “Security Standards for the RFID Market,” IEEE Security and Privacy, Vol. 3, No. 6, McLean, 2005, pp. 85-89.
[15] Katina Michael and Luke McCathie, “The Pros and Cons of RFID in Supply Chain Management,” Proceedings of the International Conference on Mobile Business, Sydney, 2005, pp. 623-629.
[16] Melanie R.Rieback, Bruno Crispo and Andrew S. Tanenbaum, “The Evolution of RFID Security,” IEEE Pervasive Computing, Vol. 5, No. 1, 2006, pp. 62-69.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.