Tags: Stats On HomeworkResearch Papers On Gender And Short Term MemoryCreative Writing DefineSample Business Plan For SchoolBush Canadian Essay Garden ImaginationAp European History 2012 Essay QuestionsEssays On Ponyboy From The OutsidersMultistate Essay Exam StatesLewis Carroll Thesis Statement
The main purpose of RFID system is the automated identification of people and products.While the biggest stumbling blocks in the use of RFID system are the numerous and complex security threats that as well as privacy issues involved with RFID system. (derived from transmitter/responder).The commercial deployment of RFID technology has captured every segment of the present market sector as well as specialized and security related applications. They have started tagging every item in their possession with RFID tag, raising patron privacy concerns.
More generally, RFID system can be considered a non-contact method of using radio frequency electromagnetic (herein after RFE) waves with frequencies up to 2.5GHz, for communication between two remote entities.
Data is stored in devices called RFID tags or transponders (each with a unique identification number), and is retrieved by readers or transceivers.
It bears the information that identifies the person or object, and is carried or implanted.
The information is usually in the form of an alphanumeric word.
This combined with a weak gate sensor, makes risk of item getting stolen quite high. Syed Md Shahid (2005) considers RFID applications in circulation, tracking, inventorying and security of library materials as well as discusses on the various components of the RFID system in details followed by its installation features.
At the same time, he states that it is important to educate library staff and library users about RFID technology before implementing a program. Serge Vaudenay (2001) deals in preparing a model based purely on the security and privacy of the RFID tags and assumes a powerful adversary who can control all communications mandating the use of some public key cryptography techniques while discussing on tag corruptions and availability of side channels. In a research project, David Alexander Molnar studies the security and privacy in deployments of RFID technology and propose novel mechanism for improving RFID privacy for library books and electronic passport and deals with private authentication.There are some cases, however where there is only one tag for a particular reader.Thus RFID systems are of two types – one to one and many to one. The electrical energy required for the tag current is derived from the radio waves emitted by the reader. They have an internal battery that is used for transmission of data as well as for transmission of the signal.The main purpose of RFID is automated identification of products and people.One of the biggest advantages of RFID over conventional systems such as bar codes is that neither line of sight nor physical contact is required for an object with an RFID tag to be identified, as is the case with bar codes where line of sight is required and smart cards, where contact is required and it is hoped to replace all techniques of optical identification.This receives the information from the reader, and processes it by using the tag ID number of a product to identify it.The RFID reader and the back-end infrastructure are together called the reader system.Therefore, an RFID compliant library is no exception with a large number of readers thronging in and out of it in need of books possessed by the library.The RFID technology is a pervasive technology because leakage of information is a major defect that occurs when data sent by tags reveal sensitive information about the labeled items.Information products labeled with insecure tags reveal their memory content when queried by readers.Usually readers are not authenticated while tags answer in a transparent and indiscriminate manner.