09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 1.1. Potential consumer privacy problems of RFID [24] .<br />

can also, in another guise, betray competitive intelligence[24]. It is a national risk for<br />

the military if the enemy forces are monitoring them.<br />

The RFID technology has gained popularity in the supply chain industry mak-<br />

ing the products visible at real time. But there is a treat to the company if other<br />

companies can also get this information. We have already discussed how easy it is<br />

to get this information. So it is very important to ensure the privacy by making the<br />

RFID Systems more secure. In this Thesis we will discuss how we can make this<br />

happen with other devices outside the RFID system.<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!