RFID Security and Privacy
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | India | Volume 4 Issue 6, June 2015

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Radio Frequency Identification technology has been part of the market from a long time. It has proved itself as a boon to the global market world. Believing it can be developed furthermore and would have been evolved as actually a mesmerizing technology but because some of its issues and the negative opinions which the innovators feel are the main reason which prevents the technology to be submerged with more resources. Data security and protection are in this way vital scholastic exploration zones. In this research paper the RFID Threat Countermeasure Framework to be better comprehend and give much better performance or say solutions to the extensive variety of RFID dangers. In this paper it has been concluded that RFID security and protection advancements are encouraging yet they require a lot of advancement cycles to end up basically helpful for associations and to stand as a reliable resource in the future generation

Keywords: Spoofing, RTCF, Logistics, Eavesdropping, Tags

Edition: Volume 4 Issue 6, June 2015

Pages: 753 - 755

Share this Article

How to Cite this Article?

Richa Mishra, Dr. Nitin Pandey, "RFID Security and Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155190, Volume 4 Issue 6, June 2015, 753 - 755

43 PDF Views | 40 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Spoofing'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Logistics'

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 707 - 711

An Efficient Failover Enabling Mechanism in OpenStack

S. Ramakrishnan

Share this Article

Similar Articles with Keyword 'Eavesdropping'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article

Similar Articles with Keyword 'Tags'

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 51 - 55

Challenges of Radio Frequency Identification Technique

Gaurav Sethi, Dr. Andhe Dharani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 302 - 305

Review: Parsing Clothes by Giving Weak Supervision using Pose Estimation in Fashion Photographs

Mayuri P. Waghmode, Umesh B. Chavan

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 370 - 374

A Survey on Privacy Recommendation for Images on Social Network

Kshitij S. Ahirrao, Aditi Jahangirdar

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 2111 - 2116

Performance Evaluation of Weighted Time-Parameterized Edit?Distance based Trajectory Clustering in RFID Environment

Sagar V. Mahajan, R. H. Borhade

Share this Article
Top