RFID Attacks: Securing Communications Using RFID Middleware
暂无分享,去创建一个
This chapter recalls the security fundamentals and principles that are the foundation of any good security strategy, addressing a range of issues from authentication and authorization, to controls and audit. No primer on security would be complete without an examination of the common security standards, which are addressed alongside the emerging privacy standards and their implications for the wireless exchange of information. RFID is used to identify, track, and locate assets. The vision that drives the development at the Auto-ID Center is the unique identification of individual items. The unique number, called the Electronic Product Code (EPC), is encoded in an inexpensive RFID tag. The EPC Network architecture shows the high-level components of the EPC network. Readers are the devices responsible for detecting when tags enter their read range. They are also capable of interrogating other sensors coupled to tags or embedded within tags.