My thanks go out to all who have helped me complete this study and with whom this project may have not been possible. In particular, my gratitude goes out to friends, facilitator and family for extensive and helpful comments on early drafts. I am also deeply indebted to the authors who have shared my interest and preceded me. Their works provided me with a host of information to learn from and build upon, also served as examples to emulate.
DECLARATION
I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It also represents my very own views & not essentially those associated with university.
Signature:
Date:
ABSTRACT
In this study we try to provide an overview of RFID with its relation to the privacy concern. This research will provide information about the various aspects of RFID, advantages, disadvantages and how it will be distinguished from normal things which are in relevance to security. Introduction of RFID channel as a means of security and privacy is studied in detail and how it avoids any uncertainties. RFID offers many types of services to customers in a convenient way, therefore, has a possible prospective to change or convert with the usual system of channels. In future, such systems and channels would get improvised, and they would provide services very differently than they do today. Most of the systems would improve present trend of security and technology with collaborators or advance the structure to promote electronic channels. In the foreseeable future, virtually all consumer goods be equipped with RFID chips, including, lich of the products that the consumers in the public sensitivity at the bears, such as clothing, mobile telephone etc. The RFID technology allows any abuse consumption, since access to the chips in consumer goods effect is not restricted, and so each of Interested out-unnoticed by a reader can be read. We therefore recommend that in integrated products RFID's on sale to the consumer, functional unable to make, with all other secure chips Authentication mechanisms and equip Transparency in the use of RFID technology produce.
TABLE OF CONTENTS
ACKNOWLEDGEMENTSII
DECLARATIONIII
ABSTRACTIV
CHAPTER 1: INTRODUCTION1
Radio Frequency Identification (RFID)1
Origins of RFID technology1
Overview of an RFID system2
RFID Tags:2
RFID readers:3
Backend server:3
Rationale4
Scope5
Aims and objectives:5
Research questions5
Main Contributions6
Summary6
CHAPTER 2: LITERATURE REVIEW8
Issues related with RFID8
Managing Databases9
Spectrum9
Standards9
Authentication and Privacy Considerations10
Benefits of RFID11
Drawbacks of RFID13
Security and RFID17
RFID success and failure18
Environmental concerns20
Failures and their solutions20
CHAPTER 3: METHODOLOGY22
Data Collection22
Literature Search23
The Survey Approach23
Survey Purpose23
Survey Respondents24
Reliability/Dependability24
Validity26
Ethical Considerations28
Pros and Cons of Chosen Methodology29
Limitations30
CHAPTER 4: DISCUSSION31
Risk of injury to the privacy and systems to avoid32
Privacy issues related to the use of RFID34
RFID Privacy Protocols35
RFID challenges39
CHAPTER 5: RESEARCH AND FINDINGS41
CHAPTER 6: CONCLUSION51
Applications and Common Benefits of RFID51
Recommendation53
CHAPTER 7: REFLECTION55
What Worked?55
What difficulties were encountered?55
What was learnt for the research process?56
REFERENCES59
APPENDIX65
CHAPTER 1: INTRODUCTION
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) is identified as emerging technology that is utilized by various applications to automatically identify objects such as objects ...