International Journal of Scientific Research in Network Security and Communication

  • Year: 2018
  • Volume: 6
  • Issue: 2

A Critical Study on RFID

  • Author:
  • R. Maruthaveni1, V. Kathiresan2
  • Total Page Count: 4
  • DOI:
  • Page Number: 62 to 65

1Dept. of Computer Science, Dr. SNS Rajalakshmi College of Arts and Science, Bharathiar University Coimbatore, India

2Dept. of Computer Applications, Dr. SNS Rajalakshmi College of Arts and Science, Bharathiar University, Coimbatore, India

Abstract

Radio-Frequency Identification Device (RFID) uses radio waves to read and capture information stored on a tag, attached to an object. A tag can be read from several feet away and does not need to be within the direct line-of-sight of the reader to be tracked. A RFID system is made up of two parts: a tag or label and a reader. RFID tags are embedded with a transmitter and a receiver. It can automatically identify a person, a package or an item. Barcodes are really simple and can be easily replicated or counterfeited where as RFID is effective, cheap and secure. So RFID technology has many applications in military zone, inventory management, supply chain, product tracking, transportation, and logistics.

Keywords

RFID, RFID tag, RFID Reader, Active Tag, Passive Tag