With the wide application of Radio Frequency Identification Devices (RFID) technology, the security and privacy threat of this transmission mode is becoming more and more prominent. This paper summarizes the security problems faced by RFID, such as eavesdropping, man-in-the-middle attack, physical cracking, falsifying, and so on. Based on these problems, three solutions are proposed: 1. Using sleeping or killing to change RFID relevance. 2. Using renaming or hash lock cryptography to change the uniqueness of RFID. 3. Hiding the real information according to the distance. So as to provide a theoretical basis for RFID applications to solve security problems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.