TY - JOUR
T1 - The Evolution of RFID Security
AU - Rieback, M.R.
AU - Crispo, B.
AU - Tanenbaum, A.S.
PY - 2006/1
Y1 - 2006/1
N2 - The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home appliances, locating children, and even foiling grave robbers. The RFID tags that optimize supply chains can also violate a person's privacy by tracking the tagged item's owner and muggers with RFID readers could scan crowds for high-value banknotes, whereas, terrorists could scan digital passports to target specific nationalities.
AB - The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home appliances, locating children, and even foiling grave robbers. The RFID tags that optimize supply chains can also violate a person's privacy by tracking the tagged item's owner and muggers with RFID readers could scan crowds for high-value banknotes, whereas, terrorists could scan digital passports to target specific nationalities.
UR - http://www.scopus.com/inward/record.url?scp=32844473946&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=32844473946&partnerID=8YFLogxK
U2 - 10.1109/MPRV.2006.17
DO - 10.1109/MPRV.2006.17
M3 - Article
SN - 1536-1268
VL - 5
SP - 62
EP - 69
JO - IEEE Pervasive Computing
JF - IEEE Pervasive Computing
IS - 1
ER -