How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.
Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."
For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!
* For most business organizations, adopting RFID is a matter of when
* The RFID services market is expected to reach $4 billion by 2008
* Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues
What people are saying - Write a review
We haven't found any reviews in the usual places.
Working with RFID Tags
Working with Interrogation Zones
Working with Regulations and Standards
Selecting the RFID System Design
Performing Site Analysis
Working With RFID Peripherals
Monitoring and Troubleshooting RFID Systems
Other editions - View all
active tags algorithm amplitude analysis application layer gateway attack backend system barcode cable called carrier wave chapter components configuration connected conveyor cryptography data signal database digital signature dipole antenna effective radiated power electric Electronic Product Code encoder encryption energy environment environmental EPCglobal EPCglobal network example field frequency ranges hardware host computer identify implementation installation interface interference interrogation zone label applicator magnetic middleware modulation monitoring object operating frequency optimal output passive tag performance physical portal power source problem protocols proximity card radiation radio frequency read range reader antenna readers and tags receive regulations requirements RF signal RF waves RFID middleware RFID printer RFID system RFID tag selecting sensor serial number smart label solution specific spectrum SpeedPass standards tag type tag’s tagged items technique tracking transmission line transmitted troubleshooting wavelength wireless