RFID Systems: A Survey on Security Threats and Proposed Solutions

نویسندگان

  • Pedro Peris-Lopez
  • Julio César Hernández Castro
  • Juan E. Tapiador
  • Arturo Ribagorda
چکیده

Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technology in history. This can have huge security implications. The present article surveys the most important technical security challenges of RFID systems. We first provide a brief summary of the most relevant standards related to this technology. Next, we present an overview about the state of the art on RFID security, addressing both the functional aspects and the security risks and threats associated to its use. Finally, we analyze the main security solutions proposed until date.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Handling Security Threats to the RFID System of EPC Networks

1 Abstract: The use of radio frequency identification (RFID) technologies in all kinds of wireless network-based applications is becoming truly pervasive. Indeed, applications based on mobile wireless ad hoc networks (MANETs), wireless sensor networks (WSNs), and vehicular ad hoc networks (VANETs), among others, can highly benefit from the adoption of battery-less RFID solutions, such as electr...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Analysis of threats on EPC based RFID systems

Detecting and responding to security and privacy threats on Radio Frequency IDentification (RFID) technologies are becoming one of the major concerns of information security researchers. However, and before going further in these activities, an evaluation of threats in terms of importance must be done. We present in this paper an evaluation of threats on Electronic Product Code (EPC) based RFID...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006