2.3.1 RFID. This technology has a widespread application such

Topic: BusinessComparative Analysis
Sample donated:
Last updated: January 8, 2020

 2.3.1 Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) is a system thatsupplies user’s or device’s identity information wireless radio waves in thestructure of some serial number 3.

RFID technology has a crucial role insolving identification issues in the digital world in a cost effective mannerand is composed of a tag, reader, software and server. It is grouped into threetypes based on different provision methods of power supply i.e. Active RFID,Passive RFID and Semi Passive RFID. This technology has a widespreadapplication such as tracing, monitoring patient health information and militaryactivities 4.2.3.

Don't use plagiarized sources.
Get Your Custom Essay on "2.3.1 RFID. This technology has a widespread application such..."
For You For Only $13.90/page!

Get custom paper

2 BarcodeBarcode is a method of encoding letters and numbers usingcombination of spaces of varying width and bars. There is different kind ofbarcode i.e. QR code (Quick Response) first designed and used in automobile inJapan. Due to its fast readability and greater storage capacity as compared tothe standard type, it usage has been widely adopted in the industries evenoutside the automobile industries. They are only machine readable (readable bylaser scanners and cameras) and used to store information associated with theobject it is attached to.2.3.

3. Near Filed Communication (NFC) Near Field Communication (NFC) is a set of communicationprotocols that allows short range wireless connection between two devices whichare few centimeters near or proximate to each other (typically 4 cm) withoutthe use of internet connection. NFC allows exchanging digital content, carryingout transactions, connecting electronic devices with a touch and supportscontactless payments via a smartphone’s NFC chip.

2.3.4. Artificial Intelligence (AI) IoT is the core of Artificial Intelligence which provides aresponsive and sensitive environment to the presence of objects and people. InArtificially Intelligent environment, devices are designed to digitallyexchange electronic data, make decisions based on anticipation, and cooperatewith other digital devices to support organization’s processes or individual’sdaily activities. 3.

0. Cyberattacks Using IoT technology4.0.

Cause of Attacks/ Vulnerability of IoTThere is no centralized management of IoT devices whereupdates could be distributed to patch the vulnerabilities. The absence of reliablefast patch distribution system for IoT is an ongoing critical andattention-requiring failure in terms of security deployment in IoT field. IoTdevices are difficult to patch even when vulnerabilities are known, identifiedand a fix is in hand. Secondly IoT network is not segregated from internetwhich provides open and unrestricted area for attacks on IoT devices anduninvited connections. Moreover local and remote communications through IoTdevices are not encrypted. Nowadays most of the devices or communicationservices are developed in compliance with cryptographic standard across theboard in order to ensure the confidentiality, authenticity and integrity of thedata being transmitted over the internet.

However, IoT devices provide servicesthat fail to comply with the widely and increasingly adopted security standard

Choose your subject


I'm Jessica!

Don't know how to start your paper? Worry no more! Get professional writing assistance from me.

Click here