Radio Frequency Identification (RFID) is noticeably shifting business methodologies towards more automated and ubiquitous techniques. The new amendment in the ISO 18000-6 RFID standard and successive adaptation of Gen 2 from Electronic Product Code (EPC) is driving research activities for secure and trustworthy systems around the globe. Data security and communication links are still vulnerable and there are certain loopholes that should be addressed to add this valuable communication for personal data processing to accounting systems. This paper investigates the ISO 18000-6 Type C and Gen2 standards and we will point out the security drawbacks and limitations of the existing air interface that should be addressed for widespread of this ubiquitous technology.
|Name||Proceedings of the International Conference on Anti-counterfeiting, Security and Identification|
|Workshop||2007 International Workshop on Anti-counterfeiting security, identification|
|Abbreviated title||2007 ASID|
|Period||16/04/07 → 18/04/07|
- Wireless vulnerability
- Second generation of RFID
- Security loopholes in RFID