RFID Protocols and Authentication

Main Article Content

Ajit Kumar

Abstract

Last two decades encountered various technological innovations. RFID is one of these changes. RFID impacted and eased out the day to day life of merchandisers and customers as well. RFID replaced the paper bases system of keeping the records. RFID has proved its importance in various classifications of science society and technology. RFID is a technology that uses radio waves to exchange data between devices. The three main components of an RFID system are readers, tags, and a back-end. The initial objective of RFID was identication of objects. Early applications of RFID systems include tracking systems for farm animals, library items, and airport baggage. Over the years, RFID tags have become more powerful and are used in applications that require more than mere identification.

Downloads

Download data is not yet available.

Article Details

How to Cite
Kumar, A. (2016). RFID Protocols and Authentication. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 8(01), 67-72. https://doi.org/10.18090/samriddhi.v8i1.11414
Section
Research Article

References

[1] “The role of B2B Protocols in Inter – Enterprise
Process Execution”, Christoph Bussler, Oracle
Corporation, Redwood Shores. 16-29
[2] Contract – Driven creation and operation of virtual
enterprise, Hofner Y et al, Semantic Scholar, https:/
/www.semanticscholar.org/paper/
[3] Nalluri, S. K., & Parasaram, V. K. B. (2015).
Automating Software Builds with Jenkins: Design
Patterns and Failure Handling. International
Journal of Technology, Management and
Humanities, 1(01), 16-33.
[4] “Operational and Semantic Protocols” Cas Cramer
et al. Springer Book, 23-34.
[5] https://www.utdallas.edu/~zxl111930/fileAutoFormat_
NDSS08.pdf