正在加载图片...
them.Moreover,Readers can change frequencies randomly so that unauthorized users cannot easily detect and eavesdrop on traffic.On the other hand,RFID environments can be equipped with special devices to detect unauthorized read attempts or transmissions on tag frequencies.These read detectors may be used to detect unauthorized read/update attempts on tags,if they are used together with specially designed tags that can transmit signals over reserved frequencies,indicating any attempts to kill or modify tags. While the use of RFID technology is increasing across a range of different industries,the associated security and privacy issues need to be carefully addressed. For its powerful function,RFID is fully believed to be competitive,and even be developed into a global Internet of Things.Therefore,its privacy and security issues cannot be ignored.them. Moreover, Readers can change frequencies randomly so that unauthorized users cannot easily detect and eavesdrop on traffic. On the other hand, RFID environments can be equipped with special devices to detect unauthorized read attempts or transmissions on tag frequencies. These read detectors may be used to detect unauthorized read/update attempts on tags, if they are used together with specially designed tags that can transmit signals over reserved frequencies, indicating any attempts to kill or modify tags. While the use of RFID technology is increasing across a range of different industries, the associated security and privacy issues need to be carefully addressed. For its powerful function, RFID is fully believed to be competitive, and even be developed into a global Internet of Things. Therefore, its privacy and security issues cannot be ignored
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有