Mitigating RFID issues - Essay Example

Comments (0) Cite this document
This risk results in a range of improper or undesired activities like identification, positioning, tracking, corresponding, and disclosure of associated information (DeNoia…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Mitigating RFID issues
Read TextPreview

Extract of sample "Mitigating RFID issues"

The preliminary security risk is that unauthorized users will always attempt to capture RFID tags data. This risk results in a range of improper or undesired activities like identification, positioning, tracking, corresponding, and disclosure of associated information (DeNoia and Olsen, 2009, p. 213). I plan to minimize limitations and security issues for 1st and 2nd generation RFID tags through several measures based on these activities.
i. I will reduce the distance between RFID tags and authorized users to lower the possibility of unauthorized users eavesdropping on exchanged communications (DeNoia and Olsen, 2009, p. 213). This measure also helps discern unauthorized from authorized users.
ii. I will apply shielding in the form of a Faraday cage used explicitly around generation 1 and2 RFID tags or in a constrained environment wherein users can trade information using the tags (CoreRFID, 2009).
iii. I plan to ensure the destruction of an RFID tag after serving its core purpose to prevent unauthorized users from abusing its user abilities and extract data from recorded communications (DeNoia and Olsen, 2009, p. 213).
iv. Concealing coding for communication between RFID tags and users can interrupt an unauthorized user’s attempts to extract data from exchanges between 1st and 2nd generation RFID tags
v. Encoding information stored on RFID tags or exchanged between a tag and its authorized user can inhibit unauthorized users from mining information from it (CoreRFID, 2009).
vi. I plan to introduce noise into the using environment to lower the possibility of an unauthorized user differentiating the communications of a specific tag with its authorized user (DeNoia and Olsen, 2009, p. 213).
vii. I will employ authentication mechanisms that identify only authorized users with the use of easy passwords created using refined multi-factor methods (CoreRFID, 2009).
CoreRFID 2009, RFID & Privacy, CoreRFID, viewed 11 January 2015,
DeNoia, LA and Olsen, AL 2009, ‘RFID and Application Security,’ Journal of Research and Practice in Information Technology, Vol. 41, No. 3, pp. 209-21. Read More
Cite this document
  • APA
  • MLA
(“Mitigating RFID issues Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Mitigating RFID issues Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words)
Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words.
“Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


RFID Technology Deployment

...RFID Technology Deployment This chapter contains three sections. The first section, RFID technology primary drivers, discusses deployment, advantages, and disadvantages of RFID. The second section consists of the selection guideline criteria. The final section is a discussion of RFID implementation examples. 2.1 Primary Drivers Wal-Mart and the Department of Defense (DoD) were crucial in adoption of RFID technology (RFID). However, the urgency to seal the information gaps in an organization’s intertwining supply chain has been instrumental in adoption of this vital technology. 2.1.1 RFID Technology Deployment The DoD...
28 Pages(7000 words)Essay

RFID Tracking

...will take over from the present-day Universal Product Code (UPC) bar codes in the near future. The problem with present-day bar codes is they are not able to fulfil every function well, they can be slow at the checkout and stocktaking as every item must be scanned and they do not always cover today’s security issues well, whereas RFID systems cover much more from tracking stock to instantly contacting a customers bank for funds at the point of purchase in a retail store by using a system embedded in a mobile phone (Bonsor, et al n.d) how will this develop? What are the good points and what are the negative problems with RFID tracking, there is a lot to be investigated yet with these...
4 Pages(1000 words)Dissertation

RFID technology in healthcare

...?RFID technology in healthcare Introduction Radio frequency identification (RFID) tags are computer chips linked to atiny antenna that is used to convey information electronically through a close RFID reader. The use of RFIDs in health care is a promising progress in IT, but also raises vital legal, ethical and social issues. They particularly improve patient safety, but also pose some physical risks, deter patient privacy and present other common hazards. RFIDs use wireless technology to converse data through signals over radio frequency range of the electromagnetic spectrum. The microchip stores the data which is then packaged so that...
2 Pages(500 words)Essay

Radio Frequency Identification (RFID)

...of detecting the possessions of the consumers without their knowledge are the main objective of these groups. If access of being able to detect and read the RFID were given to the wrong hands, possibility such as robbery and other crimes is at hand. Also, the business groups perceive the possibility of RFID being a tool for company surveillance. As a possible answer to the security issues, RSA Security provides ways to validate RFID readers and to be able to make protected internal transactions (RSA Security, 2004a). The Radio-Frequency Identification or RFID is made up of a silicon microchip that is fastened to an antenna. It comes in many forms...
10 Pages(2500 words)Essay


...RFID Table of Contents What is RFID? 3 What is it for? 3 Why it is used? 3 References 5 What is RFID? Radio Frequency Identification or RFID is referred to a technology or system that is capable of transmitting the identity of a person or an object wirelessly by using the radio waves. The identity is transmitted as a unique serial number. The term ‘RFID’ is actually a generic term. The technology uses a semiconductor in a label or tag and when this label or tag is exposed to the correct radio frequency, the stored data gets transmitted (Reigelsperger & Harkins, n.d.). What is it for? The radio frequency identification technology is in use for serving...
1 Pages(250 words)Essay

Benefits of RFID Tags

...Chapter 1 Questions Article 1: A. The benefit of RFID tags is that they store unique numerical identification codes that are able to be scanned within a certain range. The purpose of this is so that a company can track merchandise as it moves through the supply chain. This helps firms to make informed decisions about demand and supply. The new system is different in that the actual items will be able to be scanned. Employees will be able to track each individual item, which assists when decided how much stock to order. B. The main privacy concern with this technology is that the electronic tags cannot be removed. Because of this, a piece of clothing can be tracked to a specific location. Some critics of the new...
1 Pages(250 words)Essay


.... Benefits of RFID Technology This technology has also been associated with enhanced processes of operations; that is, it has reduced the amount of time needed to handle certain aspects of business operations. Technology experts have also asserted that the use of Radio Frequency Identification Technology has also been associated with enhanced security i.e. in the transport sector. How to Mitigate the Risks The risks associated with the use of Radio Frequency Identification Technology can be reduced through implementation of proper security measures i.e. use of passwords to access information transferred from RFID gadgets installed in vehicle and products. Work Cited "Security Risks...
1 Pages(250 words)Coursework


...RFID Tags Introduction RFID is radio-frequency identification. It is a technology that uses radio-frequency electromagnetic fields to identify and track tags that are attached to the objects. RFID is used for inventory control to record the presence of object with the help of radio signals. RFID applications are used in healthcare to improve patient identification, tracking high-cost items and instruments. Cost-benefit analysis The adoption of RFID technology in the healthcare sector has gained more publicity because of its potential to enhance the productivity and process of tracking patients and medical instruments (Goundrey-Smith, 2012). The pivotal reasons behind the adoption are high operating costs and numerous stakeholders... for the...
2 Pages(500 words)Assignment

Mitigating Climate Change

...Mitigating Climate Change Introduction Climate change mitigation is considered to be actions that help in limiting the rate of long-term changes in a region’s climate. It generally involves the reduction in greenhouse gas emission by humans, increasing the carbon sinks’ capacity through forestation, etc. (What is climate change mitigation?, 2014) Renewable Electricity and Fuels: Renewable energy is known to be derived from natural processes which are refilled constantly. The flow of renewable energy usually involves wind, tide, sunlight, etc. Fuel Switching: It is considered to be the process of switching to a mean of energy consumption that would impose minimum effect on the climate....
2 Pages(500 words)Assignment

Mitigating Toxic Leadership

...Mitigating toxic leadership April 8, Mitigating toxic leadership The organization is experiencing issues with its Senior Vice President (SVP) of sales with high employee turnover from the SVP’s team as the main issue, with employees citing the SVP’s management traits such as being autocratic, dictatorial, being a micro manager, yelling at people, and being mercurial in decision making as reasons for the turnover. The SVP makes them feel unsupported, afraid for the jobs, belittled, and depressed and the factors identifies weaknesses of the SVP. Another issue is the SVP’s potential strength that clients report and the fact that the company’s main competitor...
1 Pages(250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Mitigating RFID issues for FREE!

Contact Us