Survivability Enhancing Techniques for RFID Systems

2011 ◽  
Vol 2 (1) ◽  
pp. 25-40
Author(s):  
Yanjun Zuo

Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the system’s abilities to provide essential services to users. Although there have been intensive studies on RFID security and privacy, there is still no complete solution to RFID survivability. In this paper, the authors classify the RFID security techniques that could be used to enhance an RFID system’s survivability from three aspects, i.e., resilience, robustness and fault tolerance, damage assessment and recovery. A threat model is presented, which can help users identify devastating attacks on an RFID system. An RFID system must be empowered with strong protection to withstand those attacks and provide essential functions to users.

Author(s):  
Yanjun Zuo

Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the system’s abilities to provide essential services to users. Although there have been intensive studies on RFID security and privacy, there is still no complete solution to RFID survivability. In this paper, the authors classify the RFID security techniques that could be used to enhance an RFID system’s survivability from three aspects, i.e., resilience, robustness and fault tolerance, damage assessment and recovery. A threat model is presented, which can help users identify devastating attacks on an RFID system. An RFID system must be empowered with strong protection to withstand those attacks and provide essential functions to users.


2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


2014 ◽  
Vol 513-517 ◽  
pp. 3305-3308
Author(s):  
Chen Xi Chen ◽  
Dong Wang

Radio Frequency Identification (RFID) provides a non-line-of-sight and contactless approach for object identification. In the supply chain, objects are usually assembled into a group and RFID system enables us to quickly identify a group of objects. However, RFID system only provide the identified objects ID, unable to provide the missing objects IDs. This paper concerns the problem of missing objects detection and missing unique IDs recovery. In supply chain, a traditional method of items lost detection is encoding a group of objects ID before the shipment, and decoding when examine the integrity of the objects. In this paper, we propose a new scheme for missing objects detection and missing IDs recovery, which is called Linearly Independent Vectors Based Group Coding, abbreviated LIVGC. A numerical simulation reveals that the proposed method have higher recovery rate (>20%) than the EGC scheme in the same length of redundancy code.


Author(s):  
Yasir Amer Abbas ◽  
Saad Albawi ◽  
Abdullah Thaier Abd ◽  
Ahmed K. Jameil

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features is important at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Method: The systematic mapping for a specific search area. For this purpose, we must identify the number of RQs. These RQs help researchers obtain comprehensive related studies. Researchers are responsible for determining the number and type of RQs, which must be selected depending on the research field. In addition, the RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Result: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically choosing and deeply analyzed a all conceptance related (RFID) techniques and implementation methods which provide an complete about the (RFID) state and enviroment of studies . Firstly we collect 2133 From the initially searchbased on manual and automatic searches. We reduction to 92 papers depend on the inclusion and exclusion criteria for this review.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


2012 ◽  
Vol 241-244 ◽  
pp. 2331-2334
Author(s):  
Miao Lei Deng ◽  
Hao Jun Zhang ◽  
Wei Jun Zhu

Radio frequency identification (RFID) systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. This paper analyze two of the newest RFID security protocols which proposed by Niu et al. and Fu et al. form the security viewpoint of data desynchronization attack. These two lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these two RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand space model, data desynchronization attacks on these two protocols were analyzed. Furthermore, improvements to overcome the security vulnerabilities of these two protocols were given.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Sign in / Sign up

Export Citation Format

Share Document