An Approach to Security and Privacy of RFID System for Supply Chain
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Multiple image watermarking using the SILE approach
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.