blog




  • Essay / RFID Test - 2383

    Austin J. DeLaCruzINFS 3370Dr. Anand S. KunnathurCommunication and Security Issues Related to RFIDAs you now know, the world is becoming more and more technology-oriented. Every day we use technology in one way or another. Whether it's just checking emails or being able to light up our entire house with the push of a button on our smartphone. Whether we like it or not, the technology is here. One technology that seems to be getting attention and more research is radio frequency identification, or RFID. Radio frequency identification is a form of wireless media where messages and data are broadcast over the air. It is a radio transmission that uses an RFID tag, an RFID reader and a back-end system to communicate in both directions and requires no line of sight. As simple as it may seem, this technology comes with its share of complications and the security issues that have arisen are at the forefront of this expanding technology. As mentioned above, the RFID system has three main components: the tag, the reader and the back-end system. There are two types of RFID tags: active and passive. Active beacons are battery powered and therefore have a limited lifespan. These tags are writable and readable. On the other hand, passive tags are quite simple. When near an RFID reader, the tag begins transmitting the data it has stored in its memory. The radio transmission of the reader provides the energy necessary for the operation of the tag. (Paraschiv p. 10) The reader is composed of a frequency module, a control unit and a control unit that helps it communicate with the tag via radio transmission. Readers can take various forms from a mobile or laptop...... middle of paper ......e. (Chin-Feng Journal p. 2) The debate over whether the increasing implementation of RFID constantly ebbs and flows. Because technology has found its place in licenses and passports. The recurring theme is that RFID in various forms of identification will allow certain authorized individuals to access information about a specific person and have resources such as a criminal record, known aliases or any other information that could protect against security. threat. Although the fundamental belief is that only simple basic information stored on RFID tags is harmless, the truth is that even the simplest data can eventually become important. Tadayoshi Kohno believes information security should be taken seriously: “Information and uses evolve over time and these things can reveal more than we initially expected. » (Naone, p.. 73)