O'Reilly logo

Network and System Security by John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13

Radio Frequency Identification Security

Chunming Rong, Erdal Cayirci, Gansen Zhao, Laing YanUniversity of Stavanger

Radio frequency identification (RFID) systems use RFID tags to annotate and identify objects. When objects are processed, an RFID reader is used to read information from the tags attached to the objects. The information will then be used with the data stored in the back-end databases to support the handling of business transactions.

1. Radio Frequency Identification Introduction

Generally, an RFID system consists of three basic components: RFID tags, RFID readers, and a back-end database.

RFID tags or RFID transponders. These are the data carriers attached to objects. A typical RFID tag contains information about the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required