The Security and Privacy Protection in RFID

2012 ◽  
Vol 430-432 ◽  
pp. 1755-1758
Author(s):  
Chun Chang Fu ◽  
Wei Lin He

Radio frequency identification technology is an automatic identification technology started in the 1990s. With the RFID technology in a wide range of applications in different areas, it offers the security and privacy threats and caused a great deal of attention. At present, system security and privacy issues have become one of the main factors restricted the wide application of radio frequency identification technology. Aimed at the problem, this article discussed the safety of the privacy issues.

Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
V. E. Taratun ◽  

The article reveals the issues of the relevance of the use of radio frequency identification technology both for organizing the production of an aerospace enterprise and for a single supply chain of material flow to the International Space Station. The article lists the main types of automatic identification. The functional possibilities for organizing the production of an aerospace enterprise using radio frequency identification technology are determined.


2012 ◽  
Vol 178-181 ◽  
pp. 2761-2764
Author(s):  
Ming Hui Wang ◽  
Zhou Zheng ◽  
Jun Hua Pan ◽  
Jie Fang Liu

In the multimedia device management system, because can be applied to reading information from the tags and also to communicating with the database server through the GPRS network, the RFID (Radio Frequency Identification) technology is superior to the currently widespread automatic identification (Auto-ID) technology of the barcode, so which can provide further benefits. On the basis of applying the RFID technology to the management of multimedia devices, we design a RFID-based multimedia devices management system.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Shiyong Zhang ◽  
Gongliang Chen ◽  
Yongkai Zhou ◽  
Jianhua Li

RFID (radio frequency identification) is an emerging technology for automatic identification of physical objects using radio frequency. The security and privacy of the system is increasingly concerned and some light-weight encryption schemes such as Trivium and Bivium have been proposed. In this paper, the internal structure of Bivium is exploited and generalized to an algorithm called Bivium-Model. It is shown that the original Bivium has its inherent imperfections due to the improper parameter selection. A set of better parameters are given out to fix the security vulnerability of original Bivium. Emulation results also show that the Enhanced-Bivium algorithm achieves lower power consumption and lower die size.


Sign in / Sign up

Export Citation Format

Share Document