16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

648 Chapter 24<br />

of the potential attacks that RFID systems are susceptible to. We learned that some of the<br />

attacks that are well known to IT professionals can also be applied to RFID.<br />

With new technologies, we are often seduced by the grand vision of what “ it ” promises.<br />

Currently, RFID is one of the newest technologies offering this a grand vision. While<br />

RFID holds great promise in many applications, the last several years have proven that<br />

many aspects of RFID systems are insecure and new vulnerabilities are found daily.<br />

The driving idea behind this chapter is applying information security (InfoSec) principles<br />

to RFID applications. What we [the authors] have attempted to do is show you some<br />

common pitfalls and their solutions, and get you started thinking about the security<br />

implications of installing and running an RFID system in your organization.<br />

24.11 Links to Sites<br />

●<br />

●<br />

●<br />

●<br />

●<br />

RFID Gazette— www.rfi dgazette.org<br />

EPCglobal— www.epcglobalus.org<br />

ISO— www.iso.org<br />

RFID Buzz— www.rfi dbuzz.com<br />

RFID Viruses— www.rfi dvirus.org<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!