A systematic mapping study on radio frequency identification security

Author(s):  
Yasir Amer Abbas ◽  
Saad Albawi ◽  
Abdullah Thaier Abd ◽  
Ahmed K. Jameil

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features is important at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Method: The systematic mapping for a specific search area. For this purpose, we must identify the number of RQs. These RQs help researchers obtain comprehensive related studies. Researchers are responsible for determining the number and type of RQs, which must be selected depending on the research field. In addition, the RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Result: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically choosing and deeply analyzed a all conceptance related (RFID) techniques and implementation methods which provide an complete about the (RFID) state and enviroment of studies . Firstly we collect 2133 From the initially searchbased on manual and automatic searches. We reduction to 92 papers depend on the inclusion and exclusion criteria for this review.

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2008 ◽  
Vol 3 (1) ◽  
pp. 55-70
Author(s):  
Dharmaraj Veeramani ◽  
Jenny Tang ◽  
Alfonso Gutierrez

Radio frequency identification (RFID) is a rapidly evolving technology for automatic identification and data capture of products. One of the barriers to the adoption of RFID by organizations is difficulty in assessing the potential return on investment (ROI). Much of the research and analyses to date of ROI in implementing RFID technology have focused on the benefits to the retailer. There is a lack of a good understanding of the impact of RFID at upper echelons of the supply chain. In this paper, we present a framework and models for assessing the value of RFID implementation by tier-one suppliers to major retailers. We also discuss our real-life application of this framework to one of Wal-Mart’s top 100 suppliers


Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patients care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.


2012 ◽  
Vol 430-432 ◽  
pp. 1755-1758
Author(s):  
Chun Chang Fu ◽  
Wei Lin He

Radio frequency identification technology is an automatic identification technology started in the 1990s. With the RFID technology in a wide range of applications in different areas, it offers the security and privacy threats and caused a great deal of attention. At present, system security and privacy issues have become one of the main factors restricted the wide application of radio frequency identification technology. Aimed at the problem, this article discussed the safety of the privacy issues.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 150081-150112
Author(s):  
Leonardo Horn Iwaya ◽  
Aakash Ahmad ◽  
M. Ali Babar

Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research


Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patient’s care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients’ health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.


2008 ◽  
pp. 3848-3855
Author(s):  
Jorma Kajava ◽  
Juhani Anttila ◽  
Rauno Varonen

New technology has continuously changed the face of computing, and each change has involved an improvement in computer architecture and information processing. There are strong indications that the next paradigm shift in information technology will be kicked off by tiny radio frequency identification (RFID) tags. These lowly devices are being ushered in by corporations like Wal-Mart to facilitate business logistics, but other uses are waiting in the wings. As usual with any technology, criminally-minded individuals have been quick to exploit smart tags for their own purposes. Thus, it is in place to take a look at the dark side of RFID technology to see how it may affect the security and privacy of citizens.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Sign in / Sign up

Export Citation Format

Share Document