ABSTRACT

A computing paradigm known as ubiquitous computing allows for computing to present anywhere utilizing every device, anywhere, and in any manner. It covers mobile and wearable technology with limited resources where calculations are incorporated into the environment. The main technology of the ubiquitous network is radio frequency identification (RFID). It permits data interchange through remote detection and data recognition via wireless transmission. As part of automatic identification and data capture (AIDC), RFID systems that operate at high and ultra-high frequencies (UHF) are used to track and trace goods and material movement in production systems. Due to its propensity for convergence, the RFID reader can be integrative into handheld devices or mobile phones. Due to the extensive tracking capabilities of the tags, which led to widespread adoption of the technology and implementation on such a large scale, new dangers to user and application privacy have emerged. Because of the tags’ strong tracking skills and the widespread adoption of the technology that resulted from their low cost, users’ privacy and the privacy of applications are now at risk. It is due to the numerous restrictions placed on the security and privacy provisions made by RFID technology. Although there are moral and societal concerns, these difficulties are mostly of a technological and economic origin and RFID solutions must be cost-effective, practical, inter-organisational, reliable, expandable, adaptable, and long-lasting in addition to meeting security and privacy standards. This chapter examines the methods that researches have suggested for ensuring the privacy and integrity of RFID systems, as well as the social and technical background of those work.