Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems

Author(s):  
Rajat Jain ◽  
Dev Kumar Chaudhary ◽  
Sanjiv Kumar
Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ju-min Zhao ◽  
Ding Feng ◽  
Deng-ao Li ◽  
Wei Gong ◽  
Hao-xiang Liu ◽  
...  

Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.


Author(s):  
Ian Graham ◽  
Raluca Bunduchi ◽  
Martina Gerst ◽  
Robin Williams

For RFID technology (radio frequency identification), the forms of the standardisation processes are co-evolving with the technology and are being shaped by the technology itself and by the needs of users. However, the engagement of the large majority of end-users in standards development is at best limited. Based on semi-structured interviews with key actors in the automotive industry, the chapter discusses the role that RFID standards play in shaping the adoption of RFID systems in the automotive supply chain.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


2018 ◽  
Vol 2 (12) ◽  
Author(s):  
Gnanesswaran Vettrivel

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


10.5772/56511 ◽  
2013 ◽  
Vol 5 ◽  
pp. 9 ◽  
Author(s):  
S. L. Ting ◽  
Albert H. C. Tsang ◽  
Y. K. Tse

There are an increasing number of organizations planning to implement Radio Frequency Identification (RFID) systems to enhance their competitiveness. Due to the novelty of the technology, many managerial challenges exist in determining and planning for the implementation of such systems. These challenges often lead to wasted efforts and resources, as well as to failed implementations. This paper presents a systematic and holistic RFID implementation framework which has been validated by both users and experts. The framework outlines the important tasks to be performed in each step of the implementation process. To enable practitioners to make informed go/no-go decisions, essential considerations of implementation are also discussed in this paper. Furthermore, the critical success factors for the deployment of such systems are also elaborated.


Author(s):  
Rudrigo Rangel Lima ◽  
Sávio Murillo Dias Bastos ◽  
Adaildo Gomes D’Assunção ◽  
Lincoln Machado Araújo ◽  
Gustavo Araujo Cavalcante

<p>This paper proposes the development of textile antennas for applications in radio frequency identification (RFID) systems. Jeans has been used as a dielectric substrate, and, as a conductor, a highly conductive, lightweight and flexible polyester fabric with copper. The dielectric properties of the jeans (electrical permittivity and loss tangent) were characterized using the coaxial probe method and the results compared with those found. Simulated results for the of three antennas using jeans as a textile substrate are shown. Three prototypes of the simulated antennas were built and then measurements were taken (distance (m) versus number of readings) and compared with a commercial tag, good results have been obtained.</p>


Author(s):  
В.В. БУТЕНКО ◽  
А.С. БАГДАСАРЯН ◽  
С.А. БАГДАСАРЯН ◽  
В.И. НИКОЛАЕВ

Представлен подход к управлению критически важными процессами с использованием инфокоммуникационных систем и стремительно развивающейся технологии поверхностных акустических волн (ПАВ). Проведен краткий анализ принципов работы,особенностей проектирования,методик расчета и найдены оптимальные решения радиочастотных компонентов на ПАВ для RFID-систем. Выполнен анализ способов повышения эффективности RFID-систем для защиты информации от несанкционированного доступа в телекоммуникационных системах. Разработан метод выбора оптимальной радиочастотной системы идентификации с учетом совокупности количественных показателей ее качества. Обоснованы и формализованы основные показатели комплексной оценки эффективности RFID-систем. Разработана методология выбора оптимальной RFID-системы на основе теории нечетких множеств. An approach to the management of critical processes using info-communication systems and the rapidly developing technology of surface acoustic waves (SAW) is presented. A brief analysis of the principles of operation, design features, calculation methods is carried out, and optimal solutions of radio frequency components based on SAW for RFID systems are found. The analysis of ways to improve the efficiency of RFID systems for information access security in telecommunication systems is performed. A method for choosing an optimal radio frequency identification system has been developed taking into account a set of quantitative indicators of its quality. The main indicators of a comprehensive assessment of the effectiveness of RFID systems are substantiated and formalized. A methodology for choosing the optimal RFID system based on the theory of fuzzy values has been developed.


2018 ◽  
Vol 1 (03) ◽  
Author(s):  
Vettrivel Gnaneswaran

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


Sign in / Sign up

Export Citation Format

Share Document