Question Description
I’m working on a Software Development question and need guidance to help me study.
I'll share my research proposal and reference to make a concept map flow chart on RFID security and privacy on Internet of Things
Explanation & Answer
Attached.
Running head: RFID NETWORK SECURITY
RFID Network Security Research Paper Proposal
Student’s Name
University Affiliation
Date of submission
1
RFID NETWORK SECURITY
2
Systematic and precise method of providing security to RFID Network
Abstract
The RFID (Radio Frequency Identification) application has been on the rise in the last 10 years.
This rise in the use of RFID has been attributed to the fact that there has been increase in Internet
of things (IoTs) applications and hence making it possible to integrate RFID technology with
mobile applications. However, the increase in the use of RFIDs raises the issue of the RFIDs
security. Therefore, as the use of RFIDs is on the rise, it’s important that it also remains secure.
In order to provide for a secure RFID system it’s important to understand the operation and
application. RFIDs comprise of three major parts. These parts include the RFID reader, Tag and
contactless card. The operation of RFID technology is simple. First, every RFID card and tag has
a unique number. The reader uses the unique number to identify each card or tag. Every tag and
card contains a chip that can store information and whenever this tag or card comes into close
proximity with the Reader, the reader can retrieve the information stored in this card or tag. Also,
it’s important to understand fields under which the RFID technology is under use. There is a
massive and wide application of the RFID technology in logistical tracking, monitoring, car
parking, payment processing, and product safety among others. Despite the many applications
for the RFID technology, the question of the RFID security still remains. Therefore, my research
intends to explore the various methods through which we can enhance the RFID security system.
The main why my research focusses on the RFID security is because there has a surge in the use
of the RFID technology and hence the RFID system needs to be secure for it to remain relevant.
RFID NETWORK SECURITY
3
Introduction
The Radio Frequency Identification (RFID) has attracted more application in the recent
past. The increase in the use of RFID is attributed to the fact that there has been increase in
Internet of things (IoTs) applications. However, the increase in the use of RFIDs raises questions
regarding to the security of RFIDs. Therefore, as the use of RFIDs is on the rise, it’s important
that it also remains secure. In order to provide for a secure RFID system it’s important to
understand its operation. RFIDs comprise of three main components1. These component include
the RFID reader, Tag and contactless card. The operation of RFID technology is simple. First,
every RFID card and tag has a unique number. The reader uses this unique number to identify
each card or tag. Every tag and card contains a chip that ...