2012 ◽  
Vol 430-432 ◽  
pp. 1755-1758
Author(s):  
Chun Chang Fu ◽  
Wei Lin He

Radio frequency identification technology is an automatic identification technology started in the 1990s. With the RFID technology in a wide range of applications in different areas, it offers the security and privacy threats and caused a great deal of attention. At present, system security and privacy issues have become one of the main factors restricted the wide application of radio frequency identification technology. Aimed at the problem, this article discussed the safety of the privacy issues.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patients care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


Sign in / Sign up

Export Citation Format

Share Document