scholarly journals Internet of Things Security: A review on the RFID contactless security protocols

Author(s):  
Natalie Outteridge

The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the ever-changing security protocols. The Radio Frequency Identification (RFID) technology has recently gained popularity in the world of IoT, this is due to the RFID chips involvement within credit and debit cards to allow them to become contactless. This survey will produce an in-depth discussion about the background of RFID, the relevance of RFID in today's society, related work, the advantages and disadvantages of RFID and finally a solution to the RFID contactless.

2018 ◽  
Author(s):  
Natalie Outteridge

The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the ever-changing security protocols. The Radio Frequency Identification (RFID) technology has recently gained popularity in the world of IoT, this is due to the RFID chips involvement within credit and debit cards to allow them to become contactless. This survey will produce an in-depth discussion about the background of RFID, the relevance of RFID in today's society, related work, the advantages and disadvantages of RFID and finally a solution to the RFID contactless.


2019 ◽  
Vol 8 (4) ◽  
pp. 1743-1745

Vehicular traffic can hardly escape the list of critical problems in the world that demand to be resolved at the earliest. Attempting to eradicate the factors that led to this menace is a process too long for the current critical situation to wait for and stay unattended. Considering the serious consequences that ensue as a result of traffic jams, some solution that can bring an expeditious remedy needs to be found in order to handle the current situation. And this paper is aimed at proposing one such solution which can considerably ameliorate the degree of the mayhem that is prevailing, using Radio Frequency IDentification (RFID) technology.


Proceedings ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 6
Author(s):  
María Martínez Pérez ◽  
Carlos Dafonte ◽  
Ángel Gómez

At present, the term Internet of Things (IoT) is a key aspect in determining the sustainability, safety, quality and efficiency of the majority of the most important business sectors in society. The capacity to track processes that are undertaken, facilitates the recording of data of the professionals and clients involved. Identification technologies such as RFID (Radio-Frequency Identification) when integrated into sectorial activities, can generate multiple benefits.


Author(s):  
Naseer Ali Hussien ◽  
Saif Abd alradha Alsaidi ◽  
Iman Kadhim Ajlan ◽  
Mohamed Fazil Mohamed Firdhous ◽  
Haider TH. Salim Alrikabi

<p>The Internet of Things (IoT) incorporates most extensive number of innovations and imagines a mixture of things or questions around us that, through one of a kind tending to plans and standard correspondence conventions, consume the ability to connect through one another's also collaborate by their neighbors in the direction of attain regular purposes. The misuse of such a standard has been broadly explored in Internet-related investigates. As a result, a few plans have been suggested that utilization informal organizations to hunt Internet assets, to course activity, or to choose powerful strategies for substance dissemination. The essential understood this knowledge remains persistent locality everywhere us as a diverse carrier of things or articles – i.e. Radio-Frequency identification (RFID) sensors, labels, cellular telephones, actuators, and more – that finished novel inclining to ideas, consume the ability to subordinate through one another besides chip in through their neighbors to realize normal objectives of shopping situation in business sector. Web of Things (IoT) overpowered standard imperfection for structure code, which backing to shopping in business sector or undertaking gathering of most prominent concern and examinant.</p><p> </p>


Author(s):  
Amarjeet Singh Chauhan ◽  
Dayal Nigam

The Smart Bag is a very innovative and helpful project that uses RFID Technology [1] for identifying books / items smartly. The Radio Frequency Identification sensor uses a reader to get information about the item from a tag attached to it. Smart Bag initially used this technology. Technologies or devices which are used in development of The Smart Bag are RFID Sensor, HX711 Load Cell Sensor, NodeMCU, Arduino, and GPS. The Books / items can be identified by using RFID tag and it will store the count of books / items to its memory and matches the items according to schedule. The circuit for communication comprises of NodeMCU and RFID receiver in which passing of messages / alerts, reading of books / item is done. When the books / items are placed inside the bag, the RFID receiver reads the RFID Tag and sends the Books / items in the bag to the NodeMCU [2]. The NodeMCU compares it with the schedule list. If any book / item is missing then the NodeMCU generates an alert of missing books / item. The smart bag has GPS function also, which sends the Real-time Location of a Bag or a Kid to the Guardian or Parents. Initially, this project is for those small kids who regularly go to school.


2021 ◽  
Vol 40 ◽  
pp. 01004
Author(s):  
Vinay Ganesh Bhagure ◽  
Somdotta Roy Choudhury

Chip-less radio frequency identification (RFID) technology is capable for detecting, identification, and chasing for the future Internet of Things (IoT) systems and applications. The chipless RFID technology gives us the impression as a rising substitute of the traditional RFID tags and barcodes by encoding data from tags employing the radio frequency waves. The paper presents the design as well as simulation of chip-less Plus shaped RFID tags. The structure is composed of Rogers RT/Duroid 5880 by means of a substrate having the physical dimensions 40mm x 40mm over which eight resonators are placed. This tag is compact, and the resonators are closely placed. The tag is designed using Ansys Electronics Desktop.


2008 ◽  
Vol 3 (1) ◽  
pp. 55-70
Author(s):  
Dharmaraj Veeramani ◽  
Jenny Tang ◽  
Alfonso Gutierrez

Radio frequency identification (RFID) is a rapidly evolving technology for automatic identification and data capture of products. One of the barriers to the adoption of RFID by organizations is difficulty in assessing the potential return on investment (ROI). Much of the research and analyses to date of ROI in implementing RFID technology have focused on the benefits to the retailer. There is a lack of a good understanding of the impact of RFID at upper echelons of the supply chain. In this paper, we present a framework and models for assessing the value of RFID implementation by tier-one suppliers to major retailers. We also discuss our real-life application of this framework to one of Wal-Mart’s top 100 suppliers


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Sign in / Sign up

Export Citation Format

Share Document