Abstract

Abstract: RFID (Radio Frequency Identification) has gone from unknown to well-known in recent years as it is frequently employed for security purposes. Because everyone's primary goal is to be safe, our project is heavily focused on security. Because everyone is concerned about data being leaked or misused, this project will ensure that security is increased and that RFID can be used safely. It is a wireless communication technique that allows computers to read the identity of electronic tags from a distance using computers. There are numerous advantages to RFID, but it also has certain disadvantages. This article use card/tag detection to ensure that RFID users are permitted. Radio frequency is the technology that allows smart labels to be attached to objects. As a result, even physical objects can take part in the computing process. It is gaining popularity as a result of its technological advancements and capacity to overcome line-of-sight issues. RFID has become commonplace in smart applications or IoT use cases such as smart education, smart housing, smart healthcare, and smart cities, to name a few. IoT, RFID, and a slew of other technologies and standards make it possible to connect the digital and physical worlds. When RFID technology is used to uniquely identify linked devices and things, it is critical to understand its utility in the authentication process as well as the security concerns that may arise. In wireless communication, RFID tags and RFID readers are used. Keywords: Radio frequency Identification ,smart IoT applications, Internet of Things, cloud-based remote RFID authentication

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call