From: A systematic review of RFID applications and diffusion: key areas and public policy issues
Issue | Paper | Year | Case | Country |
---|---|---|---|---|
Tag Corruption | Armknecht et al. | Tag corruption can be occurred at every stage of RFID implementation | Â | |
Jules | Dupyu staff attach cloned tags to counterfeit drugs | US | ||
Reader Corruption | Lee et al. | Although reader corruption can cause serious privacy attack, most of the scholars do not consider it as security problem. | Â | |
Cheating | Reichenbach | Waste being disposed of at work places | EU | |
Bilitewski | Burning waste or transferring it to outside | EU |