Date of Publication :9th March 2017
Abstract: Increasing use of RFID in all areas of the industry is being made of the RFID technology. RFID technologies have been introduced in order to increase the reliability of their inventory control systems by companies and government agencies. The technology is used in the healthcare industry to save patients ' lives by preventing medical errors and mistreatment, to monitor medical devices and to monitor the administration of medication. Despite all of the advantages of RFID to industry, its use presents obvious security problems. It will recognize the safety risks inherent in RFID technology and will provide a mechanism to protect intelligent tagged cards by using active tags and to avoid cloning tags or sniffing data between tags and readers. The framework proposed is specific to the layer of tag and reader communication. Based on the data received, the controller will take the information and use it. The data can be stored or transferred in an inventory as an entity.
Reference :
-
- “Avery Williamson, L.-S. Tsay, I. A. Kateeb, and L. Burton”, “‘Solutions for RFID Smart Tagged Card Security Vulnerabilities,’” AASRI Procedia, 2013.
- L. S. Tsay, A. Williamson, and S. Im, “Framework to build an intelligent RFID system for use in the healthcare industry,” in Proceedings - 2012 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2012, 2012.
- K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and near-Field Communication. 2010
- M. Batty, “Big data, smart cities and city planning,” Dialogues Hum. Geogr., 2013.
- D. Guinard, V. Trifa, F. Mattern, and E. Wilde, “From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices,” in Architecting the Internet of Things, 2011.
- M. Elkhodr, S. Shahrestani, and H. Cheung, “The Internet of Things: Vision & challenges,” in IEEE 2013 Tencon - Spring, TENCONSpring 2013 - Conference Proceedings, 2013.
- Y. Mishra, G. K. Marwah, and S. Verma, “Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement,” Int. J. Eng. Res. Technol., 2015.
- S. Li, T. Tryfonas, and H. Li, “The Internet of Things: a security point of view,” Internet Res., 2016.
- P. J. Hawrylak, N. Schimke, J. Hale, and M. Papa, “Security risks associated with radio frequency identification in medical environments,” in Journal of Medical Systems, 2012
- X. Shao, “Study on security issue of internet of things based on RFID,” in Proceedings - 4th International Conference on Computational and Information Sciences, ICCIS 2012, 2012.
- J. H. Khor, W. Ismail, M. I. Younis, M. K. Sulaiman, and M. G. Rahman, “Security problems in an RFID system,” Wirel. Pers. Commun., 2011.
- B. Alsamani and H. Lahza, “A taxonomy of IoT: Security and privacy threats,” in 2018 International Conference on Information and Computer Technologies, ICICT 2018, 2018
- Ishleen Kaur, Gagandeep Singh Narula and Vishal Jain, “Identification and Analysis of Software Quality Estimators for Prediction of Fault Prone Modules”, INDIACom-2017, 4th 2017 International Conference on “Computing for Sustainable Global Development”.
- Ishleen Kaur, Gagandeep Singh Narula, Ritika Wason, Vishal Jain and Anupam Baliyan, “Neuro Fuzzy—COCOMO II Model for Software Cost Estimation”, International Journal of Information Technology (BJIT), Volume 10, Issue 2, June 2018, page no. 181 to 187 having ISSN No. 2511-2104.
- Ishleen Kaur, Gagandeep Singh Narula, Vishal Jain, “Differential Analysis of Token Metric and Object Oriented Metrics for Fault Prediction”, International Journal of Information Technology (BJIT), Vol. 9, No. 1, Issue 17, March, 2017, page no. 93-100 having ISSN No. 2511-2104.
- VM Prabhakaran, S Balamurugan, S Charanyaa, “Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- RS Venkatesh, K Deepika, R Poornima, S Balamurugan, M Sowmiya, “A Novel Dynamic Object Oriented Model for Automated Credit Card Management System”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 2, February 2015
- R Santhya, S Latha, S Balamurugan, S Charanyaa, “Certain Investigations on Methods Developed for Efficient Discovery of Matching Dependencies” International Journal of Innovative Research in Computer and Communication Engineering , Vol. 3, Issue 1, January 2015