RFID uses radio frequency signals to provide a no-measures based on the risk assignment of the components of contact and non-line-of-sight identification. In spite of its the system. A reliable tool should be developed to test the numerous advantages and implementations, it can also pose effectiveness of these changes and new implementations.invasive new threats to rights, privacy of individuals, and security of organizations. A modified version of attack graph, a II. LITERATURE REVIEW graph-based approach to network vulnerability analysis, is used in the threat modeling of an EPCglobal RFID system. The model can be used for the qualitative and quantitative assessment of the RFID is the latest phase in the decade-old trend of the vulnerabilities and security attributes of the system. miniaturization of computers [4]. RFID stands for radio frequency identification and describes the use of radio I. INTRODUCTION frequency signals to provide automatic identification [5]. RFID technology is no-contact and non-line-of-sight A. Problem identification, which is different from ubiquitous barcode identification technology [6]. The electronic product code Radio frequency identification (RFID) uses radio signals to (EPC) was developed by the Auto-ID Center at MIT and is automatically identify objects like a barcode is used to identify now being managed by EPCglobal Inc. EPCglobal Inc. is a objects in a retail store [1]. It is used in many different global not-for-profit standards organization commercializing applications such as gas payment, toll roads, automobile anti-the Electronic Product CodeTM (EPC) and RFID worldwide theft systems, pet identification, entry cards, humans, and the [1]. supply chain. The most common form of RFID is the Electronic Product Code (EPC) system managed by RFID systems consist of radio frequency (RF) tags and RF tag EPCglobal Inc.[2]. EPC is a technology similar to the readers. The reader interrogates the tag for its content by uniform product code (UPC) barcode identification except that broadcasting an RF signal. The tag responds by transmitting it uses wireless signals instead of optics.back resident data, typically including a unique serial number [7]. The unique serial number interacts with the in-house RFID can provide huge benefits to society. But it can also database to do the necessary operation. The potential features pose invasive new threats to rights, privacy of individuals, and of RFID have enabled its deployment in a wide range of security of organizations [1]. applications including supply chain management, manufacturing, retailing, auto payment systems, animal * What if an attacker performs an unauthorized inventory of a identification, smart cards and health care. While expectations store by scanning RFID tags with a reader or deletes the serial for RFID are growing, more concerns are being raised about number on RFID tags in the store disrupting business its use [8]. RFID can pose new invasive threats to rights, operation?privacy of individuals and security of organizations...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.