- Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What is Radio Frequency Identification (RFID)?
RFID stands for Radio-Frequency Identification. It is a small electronic device which has a small chip and an antenna. This chip generally carries 2,000 bytes of data or less.
It works the same as a bar code or a magnetic strip on the back of a credit card or ATM card providing a unique identifier for the object. The RFID device is just like a barcode or magnetic strip used to scan to retrieve the identifying information.
It is one of the wireless non-contact uses of radio-frequency electromagnetic fields to transfer data, for identifying and tracking tags attached to objects automatically. The tags have electronically stored information. Some tags are powered and read at short ranges through magnetic fields.
Some are used as a local power source like a battery, or else have no battery but collect energy from the interrogating EM field, and work as a passive transponder to emit microwaves.
Battery powered tags can operate at hundreds of meters. The tag does not need to be within line of sight of the reader, and it can be embedded in the tracked object.
Components of RFID
A radio frequency identification system (RFID system) has three components which are as follows −
Antenna or coil
A transceiver (with decoder)
A transponder (RADIO FREQUENCY TAG) electronically programmed with unique information.
A common RFID security or privacy concern is that RFID tag data can be read by anyone with a compatible reader. In addition, tags can often be read after the item leaves the store or supply chain.
Tags can be read without the user's knowledge, suppose if the tag has a unique serial number, then it can be associated with a consumer. As a privacy concern for individuals, in military or medical settings this can be a national security concern or life-or-death matter.
RFID tags do not have a more compute power, generally they are unable to accommodate encryption, like challenge-response authentication systems. These tags are used in passports, basic access control where the chip has sufficient compute power to decode an encrypted token from the reader proving the validity of the reader.
At the reader side, in turn, the information printed on the passport is machine-scanned and used to derive a key for the passport.
The information is divided into three and used as-- the passport number, the birth date of the passport holder and the passport's expiration date along with a checksum digit for each of the three.
- Radio Frequency IDentification (RFID)
- What is RFID?
- What are the RF (Radio Frequency) Networks?
- What is RFID in information security?
- What is User Identification and Authentication in information security?
- Bands in Radio frequency Spectrum in C program
- What is Radio Group in android?
- What is the role of RFID in Information Security?
- Biometric Identification Techniques
- What is Frequency Division Multiplexing?
- What are the Biometric techniques used for identification?
- What is dynamic frequency selection (DFS)?
- What are the differences between RFID and Barcode?
- What are the applications of RFID in Information Security?
- What are the disadvantage of RFID in information security?