Popis: |
In this chapter, we focused on the issues and potential solutions for a range of security vulnerabilities of RFID systems. Recent advances in the uses of RFID technology have generated significant interest in society, not only because they have brought change to the industry and business sectors, but also because they will begin to influence our daily life more and more. As mentioned above, the use of RFID has grown exponentially across a variety of core industries, such as logistics, manufacturing, retail and healthcare. Although each application has its own special requirements, security vulnerabilities will be always a major concern when deploying RFID applications. Like the Internet or mobile telephony, RFID is a wireless networking technology. While the non-contact and non-line-of-sight properties of RFID systems increase the convenience and efficiency of their applications, these properties also increase the system's vulnerability. In this chapter, we have analyzed the underlying vulnerabilities that exist in RFID systems, illustrated the threats of possible attacks, and provided corresponding countermeasures. Case studies have been presented and discussed to examine four specific security threats. The objective of the chapter is to try to make life for an attacker very difficult, if not impossible. The directions for further study are suggested in there major areas: technology standards, authentication protocols, and operational policies/guidelines. Security has not historically been the focus of technology standards for RFID systems and their components. With the increasing usages of RFID, such as passports, personal ID cards and consumer products, potential security threats and compliance risks in the future are enormous. It is necessary to pay attention to standardization of RFID systems. There are many different RFID standards |