The future of RFID protocols - Essay Example

Comments (0) Cite this document
Improved computing capacities should allow RFID protocols to employ only pseudo-arbitrary validation messages for tags complying…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
The future of RFID protocols
Read TextPreview

Extract of sample "The future of RFID protocols"

Running Head: THE FUTURE OF RFID PROTOCOLS The Future of RFID Protocols By State

The Future of RFID Protocols
The future of RFID protocols should revolve around computing capacities, necessity, identification, matching, verification, and performance factors. Improved computing capacities should allow RFID protocols to employ only pseudo-arbitrary validation messages for tags complying with EPC Class-1 Gen 2 or MACs (Message Authentication Codes) for more commanding tags (Peris-Lopez et al., 2011, p. 842). In addition, RFID protocols should entail new arbitrary figures as one of the inputs of MAC function to reduce the likelihood of initiating an effective replay attack.
In terms of necessity, each input assigned to an RFID protocol can be acquired from computations that can only be conducted by parallel RFID tags partaking in the evidence (Peris-Lopez et al., 2011, p. 843). This ability will assure the interconnection of the tokens produced in the course of the evidence, which only the verifier can terminate within a given period. RFID tags should entail different, untraceable, and masked identifiers during every protocol implementation process (Srivastava, n.d., p. 4). Including arbitrary figures appears suitable for developing privacy-secured identifiers although it does not assure immunity against privacy hacks for suggested RFID protocols.
RFID protocols should have supreme matching capabilities. For instance, when RFID tags are unable to authenticate their fitting in a certain group, separate tags can be members of a proof. As a result, only the verifier would detect the tags’ failure when sent the evidence (Peris-Lopez et al., 2011, p. 843). RFID protocols should also use encoded versions of timestamps. Verifiers should compute secure timestamps using their abiding secret input. I think a future that employs these potentials of RFID protocols will see a rise in “smart” products and smarter electronics. For instance, RFID protocols that reach these potentials should be able to tag smart clothes or machines at a store (Srivastava, n.d., p. 9).
Peris-Lopez, P, Orfila, A, Hernandez-Castro, JC, van der Lubbe, JCA 2011, ‘Flaws on RFID grouping-proofs. Guidelines for future sound protocols,’ Journal of Network and Computer Applications, vol. 34, pp. 833–845.
Srivastava, N n.d. ‘RFID Introduction, Present and Future applications and Security Implications,’ George Mason University, pp. 1-10. Read More
Cite this document
  • APA
  • MLA
(“The future of RFID protocols Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
The future of RFID protocols Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(The Future of RFID Protocols Essay Example | Topics and Well Written Essays - 250 Words)
The Future of RFID Protocols Essay Example | Topics and Well Written Essays - 250 Words.
“The Future of RFID Protocols Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The future of RFID protocols

RFID Technology Deployment

...with the ability to Read both Passive and Active Tags Active tags can be combined with passive tags to create a hierarchical visibility of asset tracking in the supply chain. However, executives need multi-protocol readers to read both active and passive tags. Case in point, the AR 400 RFID reader by Symbol Technologies can read passive tags, from the same company, 33 feet away and active ones 330 feet away (RFID PASSIVE). On the other hand, some new readers can incorporate active, passive, and sensor-based systems in one package in addition to managing the infrastructure for enterprise wide, multi-site deployments. Other Considerations that Could Affect Externally the Optimal...
28 Pages(7000 words)Essay

Security protocols

...? School of Computing Module and 6CC513 Security Protocols Assignment No. and Security Report for EEC Assessment Shao Ying ZhuHand-In Deadline Date 08/05/2013 Abdallah Alkhanbashi 100181705 1 Introduction In this report, we will address security loop holes for EEC, as it is comprised of Birmingham, Glasgow and Derby. As per the scenario, Birmingham is considered to be the head office consisting of IT, Human Resource, Research and Development, Management, Marketing, Sales, operations and Finance. The other two branch sites have IT, sales, operations and manufacturing departments. Currently, all company servers (file, email, data, web, radius and FTP servers etc.) are located in the server farm at its head office in...
12 Pages(3000 words)Case Study

RFID Tracking

...will take over from the present-day Universal Product Code (UPC) bar codes in the near future. The problem with present-day bar codes is they are not able to fulfil every function well, they can be slow at the checkout and stocktaking as every item must be scanned and they do not always cover today’s security issues well, whereas RFID systems cover much more from tracking stock to instantly contacting a customers bank for funds at the point of purchase in a retail store by using a system embedded in a mobile phone (Bonsor, et al n.d) how will this develop? What are the good points and what are the negative problems with RFID tracking, there is a lot to be investigated yet with these...
4 Pages(1000 words)Dissertation

The Past, Present and Future of RFID

...Identifier chips. With the use of the RFID, all necessary information has become just a tag scanner away. No more losing files or misfiling information. RFID is the wave of the future although it is currently mired in doubt and controversy due to privacy issues and the high cost of creating the chip. But as the RFID becomes a truly integral part of our daily lives, the cost and distrust of the technology is bound to go down. Through this research paper, evidence shall be presented showing that there is a growing use for the RFID technology and that the public as slowly learning to get over their apprehensions of the technology's use. As more and more...
6 Pages(1500 words)Research Paper

Advanced Routing Protocols

...become more complex. The largest global computing network is the Internet which is the backbone of millions of businesses across the globe. The power & speed of Internet have achieved this level because of the routing protocols that have ensured smooth & reliable performance irrespective of the number of nodes getting added continuously. The routing protocols can propagate millions of network changes across the globe within a small timeframe to every routing device connected to the Internet. The popular routing protocol used on the Internet is the Border Gateway Protocol (BGP) which is an exterior gateway routing protocol. Corporate networks manage...
22 Pages(5500 words)Essay


...RFID Table of Contents What is RFID? 3 What is it for? 3 Why it is used? 3 References 5 What is RFID? Radio Frequency Identification or RFID is referred to a technology or system that is capable of transmitting the identity of a person or an object wirelessly by using the radio waves. The identity is transmitted as a unique serial number. The term ‘RFID’ is actually a generic term. The technology uses a semiconductor in a label or tag and when this label or tag is exposed to the correct radio frequency, the stored data gets transmitted (Reigelsperger & Harkins, n.d.). What is it for? The radio frequency identification technology is in use for serving...
1 Pages(250 words)Essay


...Application of Radio Frequency Identification Devices Radio Frequency Identification Devices have been high used to facilitate tracking activities i.e. they are currently installed in vehicles, passengers in a plane as well as the tracking of the movement of consumer products in the market. On the other hand, the essence of tracking has also been extended to tracking of disease distribution i.e. Alzheimer disease. In addition, the use of Radio Frequency Identification Devices has been extended to business processes whereby certain tags with RFID are used to detect shopping items, and the amount of money incurred is deducted from the consumer’s bank account. One of the Companies that provide that Radio Frequency...
1 Pages(250 words)Coursework

Network Protocols

...Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45). There are various types of protocols; in the lowest stage protocols are used to define the type of the...
1 Pages(250 words)Case Study


... supplies and replacement costs. RFID technology can be expensive in short-term basis. The high evolving of technology can replace RFID in future. Conclusion The emergence of RFID technology has accelerated the revolution of healthcare industry.RFID tool is the best possible technology that can continuously monitor the inventory to notify the precise stock. The application of RFID has offered healthcare sector to provide more advanced patient tracking capabilities. References Goundrey-Smith, S. (2012). Information Technology in Pharmacy. New York: Springer. McDonnell, G., & Sheard, D. (2012). A Practical Guide to Decontamination in Healthcare. New Jersey: John Wiley & Sons.... RFID Tags Introduction RFID...
2 Pages(500 words)Assignment

EDirectory Protocols

...Edirectory protocols By Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed components to use and find needed services available in the network. Domain name system (DNS) was added in the edirectory 8.7.1 as a discovery protocol. The domain name system is a type of edirectory discovery protocol that enables the user to locate and translate internet domain names into internet protocol...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The future of RFID protocols for FREE!

Contact Us