International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 2 Issue 12, December 2013

Threats in RFID Applications on Silent Commerce

J. Venkatesh

Radio Frequency Identification (RFID) tools assure remuneration that ensues from being capable to recognize and follow individual goods in profitable supply chains. This assist in account management, decrease robbery, can be used in concurrence with other antenna technology to spot dented goods, and promises cost reductions. Safety and seclusion features interrelated to RFID are, though, ahead noteworthy significance as the nonexistence of good security and retreat is moderately accountable for investment back the great level accomplishment that are requisite for the earlier revealed RFID request. Since RFID is a wireless structure devoid of any usual safety controls, label can be interpreted, customized, influenced, or immobilized with no substantial, and so visible, contact. The isolation issues have been recurrently glorified in the medium by assured persons and cluster that are beside the use of RFID, in meticulous in buyer products, as they imagine it to disobey their isolation. The purpose of this manuscript is to categorize impending threats to profitable supply chains associated to the use of RFID technology.

Keywords: RFID, Global, Threat, Data, Information

Edition: Volume 2 Issue 12, December 2013

Pages: 297 - 300


How to Cite this Article?

J. Venkatesh, "Threats in RFID Applications on Silent Commerce", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013641, Volume 2 Issue 12, December 2013, 297 - 300

28 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'RFID'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this article

Review Papers, Information Technology, Kenya, Volume 5 Issue 11, November 2016

Pages: 1930 - 1935

Internet of Things and Competitive Advantage

Henry K. Mwenemeru, David Nzuki

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 3241 - 3246

IoT: Smart Vehicle Management System for Effective Traffic Control and Collision Avoidance

Rohini Temkar, Vishal Asrani, Pavitra Kannan

Share this article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 51 - 55

Challenges of Radio Frequency Identification Technique

Gaurav Sethi, Dr. Andhe Dharani

Share this article

Research Paper, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 2111 - 2116

Performance Evaluation of Weighted Time-Parameterized Edit?Distance based Trajectory Clustering in RFID Environment

Sagar V. Mahajan, R. H. Borhade

Share this article

Similar Articles with Keyword 'Global'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1123 - 1126

Information Retrieval for Bridging Vocabulary Gap between Health Seekers and Providers

Venkatesh.M, Hemavathi.D

Share this article

Case Studies, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1881 - 1885

Reliable Internet Connectivity for Relay of Live Broadcasts to Satellite from Remote Tropical Areas: Lessons from a GSM Link Aggregation Solution

Wilson Nwankwo PhD

Share this article

Survey Paper, Information Technology, India, Volume 6 Issue 5, May 2017

Pages: 2006 - 2008

Smart City Carpooling Mobile Application Based on Intelligent Route

Prof. S. U. Kadam, Mahesh W. Nimje, Sheetal Kode, Vaibhav Talegaonkar, Anand Sangle

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this article

Similar Articles with Keyword 'Threat'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1651 - 1653

Secure Package Manager for UTM

Tom K Sunny, Beatrice Ssowmiya J

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 2245 - 2247

The Impact of Computer Virus Attacks and its Detection and Preventive Mechanism among Personal Computer PC Users

Pratik P. Thakur, Sampat Vaidya

Share this article

Similar Articles with Keyword 'Data'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1788 - 1791

Provision of Content Based Service Recommendations using Hadoop and MapReduce

M. Vigneesh, K. Nimala

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1315 - 1318

SIP Over NON-TLS vs TLS Environment

Prapti Priya Nayak, G. Sujatha

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this article

Research Paper, Information Technology, India, Volume 5 Issue 11, November 2016

Pages: 1608 - 1611

Academic Performance Evaluation and Prediction using SC-FCM Clustering Algorithm

Govinda Raj S S

Share this article

Similar Articles with Keyword 'Information'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1788 - 1791

Provision of Content Based Service Recommendations using Hadoop and MapReduce

M. Vigneesh, K. Nimala

Share this article

Review Papers, Information Technology, Kenya, Volume 4 Issue 2, February 2015

Pages: 1228 - 1232

Information Packaging for Communication with the Physically Challenged

Samuel Macharia W.

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this article

Top