RFID Technology: A Comprehensive Report on Challenges and Solutions
VerifiedAdded on  2022/10/18
|17
|3887
|19
Report
AI Summary
This report provides an in-depth analysis of Radio-Frequency Identification (RFID) technology, focusing on its applications in various industries, particularly manufacturing. The report begins with an analysis of the task, outlining the purpose, topic, and format of the report, including a problem statement that identifies key challenges associated with RFID technology such as government regulations, environmental limitations, and software limitations. The report includes an annotated bibliography of ten articles, reviewing the usability and effectiveness of RFID tags. A literature review synthesizes the findings from these sources, discussing the benefits and limitations of RFID. The report then introduces the problems and challenges, detailing the specific challenges, reasons, and mitigation strategies. The final report includes an abstract, modifications to the introduction and literature review, a graph to support the discussion, research findings, and a conclusion, offering insights into the current state and future of RFID technology. The report emphasizes the importance of understanding and addressing the limitations of RFID to maximize its benefits.

Running head: RADIO-FREQUENCY IDENTIFICATION
Radio-Frequency IDentification
Name of the Student
Name of the University
Author Note
Radio-Frequency IDentification
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1RADIO-FREQUENCY IDENTIFICATION
Table of Contents
1. Analysis the Task.........................................................................................................................3
1.1 Purpose of the report..............................................................................................................3
1.2 Topic of the report.................................................................................................................3
1.3 Format of the report...............................................................................................................3
1.4 Problem statement.................................................................................................................3
1.5 Annotated bibliography.........................................................................................................4
2. Literature Review........................................................................................................................6
3. Introduce the problems and challenges........................................................................................9
3.1 Challenges of the RFID.......................................................................................................10
3.2 Structure of the report..........................................................................................................10
4. Final Report..............................................................................................................................11
4.1 Abstract................................................................................................................................11
4.2 Modification of the Introduction.............................................................................................11
4.3 Modification of the review of literature...............................................................................11
4.4 Graph to support the discussion...........................................................................................12
4.5 Research findings.................................................................................................................13
4.6 Conclusion...........................................................................................................................13
Reference.......................................................................................................................................14
Table of Contents
1. Analysis the Task.........................................................................................................................3
1.1 Purpose of the report..............................................................................................................3
1.2 Topic of the report.................................................................................................................3
1.3 Format of the report...............................................................................................................3
1.4 Problem statement.................................................................................................................3
1.5 Annotated bibliography.........................................................................................................4
2. Literature Review........................................................................................................................6
3. Introduce the problems and challenges........................................................................................9
3.1 Challenges of the RFID.......................................................................................................10
3.2 Structure of the report..........................................................................................................10
4. Final Report..............................................................................................................................11
4.1 Abstract................................................................................................................................11
4.2 Modification of the Introduction.............................................................................................11
4.3 Modification of the review of literature...............................................................................11
4.4 Graph to support the discussion...........................................................................................12
4.5 Research findings.................................................................................................................13
4.6 Conclusion...........................................................................................................................13
Reference.......................................................................................................................................14

2RADIO-FREQUENCY IDENTIFICATION
1. Analysis the Task
1.1 Purpose of the report
The notable objective of the paper is to focus on the use of the RFID tags which are used
in the identification of the items which are extensively used in commercial establishments as
well as in our society. This report will be very much important to understand different aspects of
the RFID tags. It can be said that the use of RFID tags has increased considerably in the last five
years.
1.2 Topic of the report
This report will be primarily focussing in the usability as well as the effectiveness of the
RFID tags which are used in most of the manufacturing industries all over the world. Radio
Frequency IDentification (RFID) tags are mostly used as a tracking system using smart barcodes.
Vehicles, pets, patients across various industries use the RFID tags for identification procedures.
1.3 Format of the report
This report will be very much organized and transparent so the usability and the
effectiveness of the RFID tags is understood. This report will be presenting the annotated
bibliography of 10 articles where investigators will be presenting their statements and opinion
about the use of the RFID tags.
1.4 Problem statement
There are lots of complexities associated with the use of the RFID tags such as the
capability of the RFID tags, speed and convenience of the RFID and scanning issues of the RFID
which has to be solved in the first place so that the effectiveness of the tags is maintained.
1. Analysis the Task
1.1 Purpose of the report
The notable objective of the paper is to focus on the use of the RFID tags which are used
in the identification of the items which are extensively used in commercial establishments as
well as in our society. This report will be very much important to understand different aspects of
the RFID tags. It can be said that the use of RFID tags has increased considerably in the last five
years.
1.2 Topic of the report
This report will be primarily focussing in the usability as well as the effectiveness of the
RFID tags which are used in most of the manufacturing industries all over the world. Radio
Frequency IDentification (RFID) tags are mostly used as a tracking system using smart barcodes.
Vehicles, pets, patients across various industries use the RFID tags for identification procedures.
1.3 Format of the report
This report will be very much organized and transparent so the usability and the
effectiveness of the RFID tags is understood. This report will be presenting the annotated
bibliography of 10 articles where investigators will be presenting their statements and opinion
about the use of the RFID tags.
1.4 Problem statement
There are lots of complexities associated with the use of the RFID tags such as the
capability of the RFID tags, speed and convenience of the RFID and scanning issues of the RFID
which has to be solved in the first place so that the effectiveness of the tags is maintained.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3RADIO-FREQUENCY IDENTIFICATION
1.5 Annotated bibliography
1: Radio frequency identification (RFID) technology as a strategic tool towards higher
performance of supply chain operations in textile and apparel industry of Malaysia
The RFID is defined as the type of technology which is used as a strategic tool which are
used in the supply chain operations of the textile industry as well as the apparel industry. The use
of the RFID tags is not at all a concern for the management team of the manufacturing industries
due to its low cost. Tracking activities can be enhanced using the RFID tags.
2.: Movement Detection of Human Body Segments: Passive radio-frequency identification
and machine-learning technologies
The use of wireless technology can be very much important to detect the human body
segments in the healthcare industry. Monitoring of the human body segments, as well as the later
movements, can be tracked in a professional modus using the RFID tags. The unusual changes in
the body can be tracked using RFID technology.
3: Optimizing radio frequency identification network planning through ring probabilistic
logic neurons
RFID is a significant technology which is extensively used in the research laboratories as
it includes the ring probabilistic logic neuron. The usability of the RFID tags is very much
common in the industries using Artificial Intelligence technology. The RFID network planning
problems has to be resolved in the first place so that the effectiveness of the RFID tags is
maintained. The human cost as well as the other overhead cost of this industry can be reduced
after using this technology.
1.5 Annotated bibliography
1: Radio frequency identification (RFID) technology as a strategic tool towards higher
performance of supply chain operations in textile and apparel industry of Malaysia
The RFID is defined as the type of technology which is used as a strategic tool which are
used in the supply chain operations of the textile industry as well as the apparel industry. The use
of the RFID tags is not at all a concern for the management team of the manufacturing industries
due to its low cost. Tracking activities can be enhanced using the RFID tags.
2.: Movement Detection of Human Body Segments: Passive radio-frequency identification
and machine-learning technologies
The use of wireless technology can be very much important to detect the human body
segments in the healthcare industry. Monitoring of the human body segments, as well as the later
movements, can be tracked in a professional modus using the RFID tags. The unusual changes in
the body can be tracked using RFID technology.
3: Optimizing radio frequency identification network planning through ring probabilistic
logic neurons
RFID is a significant technology which is extensively used in the research laboratories as
it includes the ring probabilistic logic neuron. The usability of the RFID tags is very much
common in the industries using Artificial Intelligence technology. The RFID network planning
problems has to be resolved in the first place so that the effectiveness of the RFID tags is
maintained. The human cost as well as the other overhead cost of this industry can be reduced
after using this technology.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4RADIO-FREQUENCY IDENTIFICATION
4: Outdoor stocking density in free-range laying hens
Major global organizations such as the Wal-Mart is complete relying on this technology.
The effectiveness of the service given by Walmart can be enhanced significantly using the RFID
tags. The data entry errors of this organization have been decreased considerably after the use of
the RFID tags.
5: Consideration of the brute-force attack cost and retrieval cost
The movement of inventories of the manufacturing industries can be improved using the
RFID tags. The use of the RFID tags can be very much useful to reduce other costs such as the
data retrieval cost. The shipping issues of manufacturing industries can be solved using the
manufacturing industries.
6: Benefits and barriers of implementation and utilization of radio-frequency identification
(RFID) systems in transfusion medicine
Critical business situations such as the out of stock situations cab be managed in a
professional manner using the RFID tags. The deal which is obtained by the shoppers can be
improved using the RFID tags. The availability of the products and the net profitability of the
manufacturing industries can also be saved using RFID tags.
7: Evaluation of hand hygiene compliance and associated factors with a radio-frequency-
identification-based real-time continuous automated monitoring system
RFID can be defined as the type of technology which are extensive used in different
commercial establishments as it helps in improving the Quality of Service offered by the
4: Outdoor stocking density in free-range laying hens
Major global organizations such as the Wal-Mart is complete relying on this technology.
The effectiveness of the service given by Walmart can be enhanced significantly using the RFID
tags. The data entry errors of this organization have been decreased considerably after the use of
the RFID tags.
5: Consideration of the brute-force attack cost and retrieval cost
The movement of inventories of the manufacturing industries can be improved using the
RFID tags. The use of the RFID tags can be very much useful to reduce other costs such as the
data retrieval cost. The shipping issues of manufacturing industries can be solved using the
manufacturing industries.
6: Benefits and barriers of implementation and utilization of radio-frequency identification
(RFID) systems in transfusion medicine
Critical business situations such as the out of stock situations cab be managed in a
professional manner using the RFID tags. The deal which is obtained by the shoppers can be
improved using the RFID tags. The availability of the products and the net profitability of the
manufacturing industries can also be saved using RFID tags.
7: Evaluation of hand hygiene compliance and associated factors with a radio-frequency-
identification-based real-time continuous automated monitoring system
RFID can be defined as the type of technology which are extensive used in different
commercial establishments as it helps in improving the Quality of Service offered by the

5RADIO-FREQUENCY IDENTIFICATION
business organizations. There are lots of limitations associated with the use of RFID tags such as
physical limitations such as the physical limitations and accuracy issues.
8: Relationships between range access as monitored by radio frequency identification
technology, fearfulness, and plumage damage in free-range laying hens.
The use of the RFID technology can be very much important to identify the flaws and
security loopholes of the shipping procedures of the manufacturing industries. Technical
consultants are needed to be hired for the use of the RFID tags.
9: Radio frequency identification (RFID) adoption
The limitation of the RFID tags can be categorized in numerous categories such as the
software limitations, government protocols, environmental limitations and physical limitations.
The RFID tags do not have any internal power supply, however there are electrical currents
present in the Electronic Product Code.
10: Automated tracking of wild hummingbird mass and energetics over multiple time
scales using radio frequency identification (RFID) technology
Nonvolatile EEPROM is present in the RFID tags which are used in different categories
of industries as well as in our society. The usage of the multiple time scales of the RFID is very
much important to improve the effectiveness of the production rooms of various industries.
Inventory management of the retails industry can also be improved using the RFID tags.
2. Literature Review
2.1 According to Huang et al. (2015), RFID technology is widely used in different categories of
industry such as the garments industry as well as the manufacturing industries. The investigator
business organizations. There are lots of limitations associated with the use of RFID tags such as
physical limitations such as the physical limitations and accuracy issues.
8: Relationships between range access as monitored by radio frequency identification
technology, fearfulness, and plumage damage in free-range laying hens.
The use of the RFID technology can be very much important to identify the flaws and
security loopholes of the shipping procedures of the manufacturing industries. Technical
consultants are needed to be hired for the use of the RFID tags.
9: Radio frequency identification (RFID) adoption
The limitation of the RFID tags can be categorized in numerous categories such as the
software limitations, government protocols, environmental limitations and physical limitations.
The RFID tags do not have any internal power supply, however there are electrical currents
present in the Electronic Product Code.
10: Automated tracking of wild hummingbird mass and energetics over multiple time
scales using radio frequency identification (RFID) technology
Nonvolatile EEPROM is present in the RFID tags which are used in different categories
of industries as well as in our society. The usage of the multiple time scales of the RFID is very
much important to improve the effectiveness of the production rooms of various industries.
Inventory management of the retails industry can also be improved using the RFID tags.
2. Literature Review
2.1 According to Huang et al. (2015), RFID technology is widely used in different categories of
industry such as the garments industry as well as the manufacturing industries. The investigator
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6RADIO-FREQUENCY IDENTIFICATION
of the paper stated that the out of stocks levels of the industries can be tracked in an organized
manner using the RFID technology. The researcher of the paper stated that the stocking and
storing of the products can be managed from the organizational databases using the RFID
technology.
2.2 As mentioned by Jia and Feng (2015), theft of items from shopping malls can be successfully
prevented using the RFID technology. The investigator of the paper stated that the mishandling
of the products can be identified using the RFID tags. The prosecution of the shop lifter and the
missing merchandise of commercial establishments are needed to be managed using the RFID
tags.
2.3 As listed by Jun et al. (2016), stock level of the manufacturing industries can be tracked in a
professional manner using the RFID tags. The investigator of the resources helps in
understanding the impact of the RFID tags which are very much helpful to improve the customer
satisfaction of commercial establishments.
2.4 As debated by Lee et al. (2015), identification of the animals can be successfully done using
the RFID tags. All the objects in the stores can be tracked and monitored using the RFID tags.
Building the access control can be done using the RFID tags, the investigator also stated the use
of the RFID tags is increasing in the smart cards.
2.5 As enumerated by Maselyne et al. (2016), RFID circuit are mostly used in the electronic
industry as they are far more superior as compared with the considering the functionalities of the
bar codes. The investigator of the paper stated about the improved efficiency of the RFID tags,
However, the investigator also focused on the limitation of the RFID tags in terms of the security
as well as the privacy concerns of the RFID tags.
of the paper stated that the out of stocks levels of the industries can be tracked in an organized
manner using the RFID technology. The researcher of the paper stated that the stocking and
storing of the products can be managed from the organizational databases using the RFID
technology.
2.2 As mentioned by Jia and Feng (2015), theft of items from shopping malls can be successfully
prevented using the RFID technology. The investigator of the paper stated that the mishandling
of the products can be identified using the RFID tags. The prosecution of the shop lifter and the
missing merchandise of commercial establishments are needed to be managed using the RFID
tags.
2.3 As listed by Jun et al. (2016), stock level of the manufacturing industries can be tracked in a
professional manner using the RFID tags. The investigator of the resources helps in
understanding the impact of the RFID tags which are very much helpful to improve the customer
satisfaction of commercial establishments.
2.4 As debated by Lee et al. (2015), identification of the animals can be successfully done using
the RFID tags. All the objects in the stores can be tracked and monitored using the RFID tags.
Building the access control can be done using the RFID tags, the investigator also stated the use
of the RFID tags is increasing in the smart cards.
2.5 As enumerated by Maselyne et al. (2016), RFID circuit are mostly used in the electronic
industry as they are far more superior as compared with the considering the functionalities of the
bar codes. The investigator of the paper stated about the improved efficiency of the RFID tags,
However, the investigator also focused on the limitation of the RFID tags in terms of the security
as well as the privacy concerns of the RFID tags.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7RADIO-FREQUENCY IDENTIFICATION
2.6 According to Mtita, Laurent and Delort (2016), unauthorized readers are the prime concerns
of most of the IoT based devices. The investigator of this resources stated about the different
categories of approaches which are considered during the implementation of the RFID tags such
as the cryptographic approach, hash function approach, Faraday Cage approach, Randomized
hashlock backward channel XOring, regulation approach as well as the active jamming
approach.
2.7 As declared by Singh, Singh and Nalwa (2017), there used to have numerous health issues
associated with the use of the RFID tags which is no longer a concern for the users of this
technology as the low end electromagnetic spectrum used in thus technology has been replaced
using the high-end electromagnetic spectrum.
2.8 According to Tsirmpas et al. (2015), different categories of frequencies are used by the RFID
tags. The investigator of this resource stated that the water content items cannot use the RFID
tags. The investigator of this resource stated about the difference between the active as well as
the passive tags. The specifications of the active RFIC tags was mentioned in the paper in an
organized manner.
2.9 As declared by Tuba and Bacanin (2015), reader collision and tag collision are the two
essential aspects of the RFID tags. The investigator of the paper stated that the standards which
are maintained by most of the RFID tags used in the manufacturing industries. The investigator
of the paper also successfully mentioned about the RFID tags.
2.10 As mentioned by Tuba, and Bacanin (2015), there are different categories of RFID tags
such the battery operated tags and passive tags. The investigator of the paper stated only 2KB of
2.6 According to Mtita, Laurent and Delort (2016), unauthorized readers are the prime concerns
of most of the IoT based devices. The investigator of this resources stated about the different
categories of approaches which are considered during the implementation of the RFID tags such
as the cryptographic approach, hash function approach, Faraday Cage approach, Randomized
hashlock backward channel XOring, regulation approach as well as the active jamming
approach.
2.7 As declared by Singh, Singh and Nalwa (2017), there used to have numerous health issues
associated with the use of the RFID tags which is no longer a concern for the users of this
technology as the low end electromagnetic spectrum used in thus technology has been replaced
using the high-end electromagnetic spectrum.
2.8 According to Tsirmpas et al. (2015), different categories of frequencies are used by the RFID
tags. The investigator of this resource stated that the water content items cannot use the RFID
tags. The investigator of this resource stated about the difference between the active as well as
the passive tags. The specifications of the active RFIC tags was mentioned in the paper in an
organized manner.
2.9 As declared by Tuba and Bacanin (2015), reader collision and tag collision are the two
essential aspects of the RFID tags. The investigator of the paper stated that the standards which
are maintained by most of the RFID tags used in the manufacturing industries. The investigator
of the paper also successfully mentioned about the RFID tags.
2.10 As mentioned by Tuba, and Bacanin (2015), there are different categories of RFID tags
such the battery operated tags and passive tags. The investigator of the paper stated only 2KB of

8RADIO-FREQUENCY IDENTIFICATION
data can be stored in a RFID tag. The investigator of this resources stated about the use of the
radio waves by the RFID tags.
Modification of the problem statement: Based on the above discussions it can be said
that the government regulations, environmental limitations and the software limitations are the
prime problems associated with the RFID tags which are increasingly used across numerous
industries.
Techniques used to solve the identified problems: The management team of the
commercial establishments who are using this technology must be understanding the reason
behinds the limitations of the RFID tags. Interference with multiple readers have to be monitored
in the first place in order to address the software limitations of the RFID tags. The reading
distance of the RFID tags must be very much short so that the frequency of this technology can
be properly managed. The label properties of the RFID tags must be studied by the users to
address the stringent government protocols. The RFID antennae and the SMA connector must be
checked before implementing this technology. The maintenance of the internal standards can be
very much significant for the users of the RFID tags to resolve the environmental issues of this
technology in terms of the human health hazards.
3. Introduce the problems and challenges
There are different categories of problems which are associated with the use of the RFID
tags in major manufacturing organisations such as the stringent government regulations,
environmental limitations and the software limitations of the RFID tags.
data can be stored in a RFID tag. The investigator of this resources stated about the use of the
radio waves by the RFID tags.
Modification of the problem statement: Based on the above discussions it can be said
that the government regulations, environmental limitations and the software limitations are the
prime problems associated with the RFID tags which are increasingly used across numerous
industries.
Techniques used to solve the identified problems: The management team of the
commercial establishments who are using this technology must be understanding the reason
behinds the limitations of the RFID tags. Interference with multiple readers have to be monitored
in the first place in order to address the software limitations of the RFID tags. The reading
distance of the RFID tags must be very much short so that the frequency of this technology can
be properly managed. The label properties of the RFID tags must be studied by the users to
address the stringent government protocols. The RFID antennae and the SMA connector must be
checked before implementing this technology. The maintenance of the internal standards can be
very much significant for the users of the RFID tags to resolve the environmental issues of this
technology in terms of the human health hazards.
3. Introduce the problems and challenges
There are different categories of problems which are associated with the use of the RFID
tags in major manufacturing organisations such as the stringent government regulations,
environmental limitations and the software limitations of the RFID tags.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9RADIO-FREQUENCY IDENTIFICATION
3.1 Challenges of the RFID
Challenges Reason behind the
challenge
Violation Mitigation strategy
Inflexible
government
regulations
The manufacturers of
this technology may
not consider the
international
standards while
manufacturing the
tags.
Trying to get access
to most of the bands
of the RFID tags can
be the reason behind
the government
protocols of the RFID
tags.
Monitoring of the
bands can be very
much beneficial to
address this
challenges of the
RFID tags.
Environmental
limitations
The organization who
manufacturer this
technology
sometimes do not
considers the
International
standards, which is
the main reason
behind this challenge
of this technology.
Passive UHF tags is
the prime reason
behind this issue of
the RFID tags.
Maintaining the
protocols of the
International
Standards can be the
mitigation strategy to
address this issue.
Software limitations The data associated
with the RFID tags
can be compromised
due to numerous
cyber security issues
such as the
ransomware.
Both the passive as
well as the active
RFID are affected
using due to the
security challenge.
IT governance plan
be very much helpful
to mitigate this
challenge.
Table 1: Challenges of RFID
(Source: Created by the author)
3.2 Structure of the report
The above unit of the paper identified the challenges of using the RFID tags across
numerous industries. The primary challenges of using the tag was presented in the initial
segment of this report.
3.1 Challenges of the RFID
Challenges Reason behind the
challenge
Violation Mitigation strategy
Inflexible
government
regulations
The manufacturers of
this technology may
not consider the
international
standards while
manufacturing the
tags.
Trying to get access
to most of the bands
of the RFID tags can
be the reason behind
the government
protocols of the RFID
tags.
Monitoring of the
bands can be very
much beneficial to
address this
challenges of the
RFID tags.
Environmental
limitations
The organization who
manufacturer this
technology
sometimes do not
considers the
International
standards, which is
the main reason
behind this challenge
of this technology.
Passive UHF tags is
the prime reason
behind this issue of
the RFID tags.
Maintaining the
protocols of the
International
Standards can be the
mitigation strategy to
address this issue.
Software limitations The data associated
with the RFID tags
can be compromised
due to numerous
cyber security issues
such as the
ransomware.
Both the passive as
well as the active
RFID are affected
using due to the
security challenge.
IT governance plan
be very much helpful
to mitigate this
challenge.
Table 1: Challenges of RFID
(Source: Created by the author)
3.2 Structure of the report
The above unit of the paper identified the challenges of using the RFID tags across
numerous industries. The primary challenges of using the tag was presented in the initial
segment of this report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10RADIO-FREQUENCY IDENTIFICATION
4. Final Report
4.1 Abstract
The foremost determination of this report is to focus on the issues of using the RFID tags
which are widely used in numerous industries. The RFID tags can be defined as the type of
technology which can help in the authorization of the products in any industry.
There are numerous security issues of this technology which has to be solved in the first place in
order to improve the efficiency of using this technology.
The addressing on these issues can be very much helpful to enhance the net profitability of
corporate establishments.
4.2 Modification of the Introduction
Based on the above section of the paper it can be said that the security issues of the RFID
tags is the most significant issue of using RFID tags.
4.3 Modification of the review of literature
As stated by Virkki et al. (2015), there are lots of security issues associated with the use
of the RFID tags such as the reverse engineering, Denial of Service (DoS), MITM attacks and
Eavesdropping. The investigations of the paper highlighted that these security issues can have an
undesirable impact on the users of the RFID tags from financial perspective.
Techniques used to solve the problem
According to Tuba and Bacanin (2015), the security issues of the RFID can be
purposefully solved using such as the threats coming from DoS can be addressed using the IT
governance plan. The researcher of this paper stated that the cyber security issues of the RFID
4. Final Report
4.1 Abstract
The foremost determination of this report is to focus on the issues of using the RFID tags
which are widely used in numerous industries. The RFID tags can be defined as the type of
technology which can help in the authorization of the products in any industry.
There are numerous security issues of this technology which has to be solved in the first place in
order to improve the efficiency of using this technology.
The addressing on these issues can be very much helpful to enhance the net profitability of
corporate establishments.
4.2 Modification of the Introduction
Based on the above section of the paper it can be said that the security issues of the RFID
tags is the most significant issue of using RFID tags.
4.3 Modification of the review of literature
As stated by Virkki et al. (2015), there are lots of security issues associated with the use
of the RFID tags such as the reverse engineering, Denial of Service (DoS), MITM attacks and
Eavesdropping. The investigations of the paper highlighted that these security issues can have an
undesirable impact on the users of the RFID tags from financial perspective.
Techniques used to solve the problem
According to Tuba and Bacanin (2015), the security issues of the RFID can be
purposefully solved using such as the threats coming from DoS can be addressed using the IT
governance plan. The researcher of this paper stated that the cyber security issues of the RFID

11RADIO-FREQUENCY IDENTIFICATION
tags can be addressed using the risk management plan. The investigator also added that malware
prevention techniques can be very much useful to contain the MITM attacks. The investigator
also suggested that the configuration of the RFID tag must be done only by professional IT
experts.
Selection of appropriate technique with justification
The IT governance plan can be the most significant risk management strategy of the
RFID tags as it can help to identify most of the vulnerabilities of the RFID tags in terms of the
security loop holes.
Annotated bibliography
Based on the annotated bibliography of the first milestone, it can be said the limitations
of the RFID tags such as the software limitations and government protocols can be addressed or
resolved using the IT governance plan. It can also be argued that the separate investments are
needed to be taken by the management team of the organization who are using the RFID
technology which can be significant concern from the business perspective.
4.4 Graph to support the discussion
The following graph can be very much useful to understand the impact of using IT
project governance plan to address the security issues of the RFID tags.
Figure 1: Use of different technique to address security issue of RFID
tags can be addressed using the risk management plan. The investigator also added that malware
prevention techniques can be very much useful to contain the MITM attacks. The investigator
also suggested that the configuration of the RFID tag must be done only by professional IT
experts.
Selection of appropriate technique with justification
The IT governance plan can be the most significant risk management strategy of the
RFID tags as it can help to identify most of the vulnerabilities of the RFID tags in terms of the
security loop holes.
Annotated bibliography
Based on the annotated bibliography of the first milestone, it can be said the limitations
of the RFID tags such as the software limitations and government protocols can be addressed or
resolved using the IT governance plan. It can also be argued that the separate investments are
needed to be taken by the management team of the organization who are using the RFID
technology which can be significant concern from the business perspective.
4.4 Graph to support the discussion
The following graph can be very much useful to understand the impact of using IT
project governance plan to address the security issues of the RFID tags.
Figure 1: Use of different technique to address security issue of RFID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.