StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Radio Frequency Identification Tags - Essay Example

Cite this document
Summary
Radio Frequency Identification tags are not spared from viruses. The viruses may come from a buffer overflow even if the identification tags can hold information even if its memory is only about 114 bytes. The viral intrusion may also arise from SQL injections…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Radio Frequency Identification Tags
Read Text Preview

Extract of sample "Radio Frequency Identification Tags"

Download file to see previous pages

They proved that the once-thought virus-safe RFID tags are prone to virus attack even if the memory seems too small to contain all the information needed by the virus to ruin the technology. This research is a call for the RFID designers to take extra care in engineering the chips' code. Since the databases vary about their built in security, the designers should focus on the details of the lines of source code which numbers up to millions. Around 6 to 16 mistakes out of a thousand lines of code mean less security and vulnerability to virus attack.

This is important because RFID tags have promising uses in industries such as groceries and airports, wherein important information are all stored in databases. The uses include tracking and inventories, storage of information about personal and financial matters, and property monitoring. Interference of the RFID tags using the viruses does not affect only the system, but the larger scale of the industries concerned. False tags can be used on an item to deliver a virus in a properly working system.

This virus can then replicate its illegal code on the databases and corrupt the files. (Kirk, 2006). Privacy of information stored in RFID tags should start at the design and engineering stage. The RFID tags must be designed in such a way that it holds the minimum amount of information possible, without compromising its function and performance. Manufacturers must find a way to decrease the linkability of the tags with confidential data (Cavoukian, 2006). Since RFID tags carry important information, it is very usefule not only in identification but for access into different databases as well.

The Senate of the California State had passed a legislation which bans RFID tags in government transactions and documentations. Integration of RFID in any form of identification card, license, and document issued by the state. This prohibition is applicable also in the use of RFID by the employees for security access. (Hook, 2005). The University of Amsterdam's Faculty of Science created a website called the RFID Guardian. The site aims to help RFID users secure their privacy. The website, www.

rfidguardian.org, offers a free video about the function of RFID Guardian and how its system works (Faculty of Science).Data and identity theft The RFID tag user should be responsible for the information covered by his tag. He should definitely be in control of the information his RFID tag carries. The same goes for institutions and organizations. They, therefore, should allot resources for training their employees so that the organization as a whole would be able to comply with privacy and security guidelines.

They should limit the use of RFID in the disclosure of information by assessing their files and classifying them according to their relevance and confidentiality. Data including those of personal and confidential nature, and those data containing dispersible information, should be updated and accurate. This could prevent subsequent transfer of information using RFID tags from one system to another, which makes the information vulnerable to illegal attacks. There should also be consent from an individual concerned whether or not certain information about him can be disclosed from his RFID tag (Cavoukian, 2006).

Due to the important data stored in RFID tags, the technology attracts unauthorized individuals to invade somebody else's privacy. These illegally involved people can

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Radio Frequency Identification Tags Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Radio Frequency Identification Tags Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1524128-radio-frequency-identification-tags
(Radio Frequency Identification Tags Essay Example | Topics and Well Written Essays - 750 Words)
Radio Frequency Identification Tags Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1524128-radio-frequency-identification-tags.
“Radio Frequency Identification Tags Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1524128-radio-frequency-identification-tags.
  • Cited: 0 times

CHECK THESE SAMPLES OF Radio Frequency Identification Tags

Pros and Cons of Chip Implantation in Humans

According to the article “ RFIDs: The Pros and Cons Every Consumer Needs to Know About Radio Frequency Identification Tags” (SixWise.... ??RFIDs: The Pros and Cons Every Consumer Needs to Know About Radio Frequency identification tags”.... However, these implants will still run on a radio frequency system that can be intercepted and read from afar by unsrcupulous elements who make their living off identity theft.... The RF ID or CHIP is supposed to help lessen or eliminate the cases of medical malpractice and prescription errors because these tags will be used to hold the most accurate and up to date health information of an insurance plan holder....
3 Pages (750 words) Essay

The Pros and Cons of Implanting a Chip into a Patient

Basically, Radio Frequency Identification Tags (RFIDs) refer to a computerized detection and identification technique that's already being used in the healthcare sector to keep track of some of the major aspects, such as prescription drugs to pets.... RFIDs: The pros and cons every consumer needs to know about Radio Frequency Identification Tags.... This advancement emerged in the form of radio frequency identification technology.... This advancement emerged in the form of radio frequency identification technology....
4 Pages (1000 words) Essay

Mathew Brzezinski's Fortress America

(Brzezinski, 156)This book is stuffed with disturbing new gadgets -- silent, low-flying buzz that watch us overhead; behavior-spotting software; microscopic radio-frequency identification tags that when placed beneath our skin could track our every move and a broad list of amusing characters....
3 Pages (750 words) Book Report/Review

Critical Appraisal - Packaging Design and the consumer behaviour

Products are placed inside a package in order to be safely transported from one place to another.... The movement of merchandise goes from the manufacturing plant,… At the end of the supply chain the customer is ultimately the person that takes the packaged product into their homes or businesses....
4 Pages (1000 words) Lab Report

Participation Questions

Wireless applications such as Radio Frequency Identification Tags have gain a lot of popularity among supplier chain managers.... According to Patterson (1991) quality and service in supplier relations improve with the passage of time.... I agree with your point of view that companies must… If a supplier has a specific raw material that is hard to obtain it would be in the best interest of the company to establish a long term relationship with such a supplier....
2 Pages (500 words) Essay

Capacity Management Issues

A technology that can help John Deere coordinate its delivery of its new lawnmowers are Radio Frequency Identification Tags (RFID).... RFID tags give managers the capability of tracking the position of the merchandise while the items are in transit or in a warehouse....
2 Pages (500 words) Essay

Current events paper

A technological advancement that can be used by companies to track inventory is Radio Frequency Identification Tags (RFID).... It can be defined as a stock or store of goods.... The inventory of a firm is classified as a current asset in the balance sheet of the company.... In the manufacturing sector the inventory balance of a firm is composed of… The balance of inventory of a company represents 30% of the current assets of a business....
2 Pages (500 words) Essay

Near Field Communication by Want

hellip; NFC communicates using Radio Frequency Identification Tags at a radio field range of 13.... This article a"Near Field Communication by Want" presents an article, Near Field Communication, that explains that Near Field Communication (NFC) enables contactless communication between electronic devices within range of each other, including both tablets and smartphones....
1 Pages (250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us