Supply Chain the Way to Flat Organisation 2009
DOI: 10.5772/6668
|View full text |Cite
|
Sign up to set email alerts
|

RFID Technology, Security Vulnerabilities, and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Sikota [2] submitted that during the construction of RDP buildings theft of building materials usually occur on site. Whereas RFID has been suggested by [42]- [44] Housing delivery strategies (market enabling strategy, self-aided and public housing) security on construction sites. A combination of the technologies powered by construction 4.0 with the housing delivery strategies will assist in delivering quality and available houses in the country.…”
Section: Application Of Industry 40 To the Construction Industry (Comentioning
confidence: 99%
“…Sikota [2] submitted that during the construction of RDP buildings theft of building materials usually occur on site. Whereas RFID has been suggested by [42]- [44] Housing delivery strategies (market enabling strategy, self-aided and public housing) security on construction sites. A combination of the technologies powered by construction 4.0 with the housing delivery strategies will assist in delivering quality and available houses in the country.…”
Section: Application Of Industry 40 To the Construction Industry (Comentioning
confidence: 99%
“…1. The purpose of the RFID system is to transfer information between a tag and a reader to perform a specific application based on the data stored in the tag [4]. RFID tag can be categorized into three types: passive, semi-passive/semi-active and active.…”
Section: Basic Rfid Systemmentioning
confidence: 99%
“…Similar to active tags, semi-active tags also have internal battery. However, they cannot communicate with other tags and only transmit their information once they receive a radio frequency (RF) signal from the reader [4].…”
Section: Basic Rfid Systemmentioning
confidence: 99%
“…The new secret code is updated on the tag. In this case, secret key gets updates every time the tag is read [15] [16].…”
Section: Related Workmentioning
confidence: 99%