RFID security and privacy: a research survey
read more
Citations
The Internet of Things: A survey
Internet of Things (IoT): A vision, architectural elements, and future directions
The internet of things: a survey
Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions
A survey on Internet of Things architectures
References
Untraceable electronic mail, return addresses, and digital pseudonyms
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms.
Physical one-way functions
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Related Papers (5)
Privacy and security in library RFID: issues, practices, and architectures
Frequently Asked Questions (16)
Q2. What are the two common forms of side-channel analysis?
The two predominant forms of side-channel analysis studied by the security community are timing attacks, which extract information based on variations in the rate of computation of a target device, and power analysis attacks, which exploit measurable variations in power consumption.
Q3. What is the role of the RFID tag in anticounterfeiting?
To be fair, even in the absence of resistance to tag cloning, unique numbering of objects can be a powerful anticounterfeiting tool.
Q4. Why is the range of a reader subject to eavesdropping at greater distances?
Because readers transmit at much higher power than tags, they are subject to eavesdropping at much greater distances than tag-to-reader communications—perhaps even kilometers away.
Q5. What is the interesting and potentially serious attack in the case of RFID?
Most interesting and potentially serious in the case of RFID are attacks involving side channels, meaning sources of information beyond the mere bit-values of protocol flows.
Q6. What are the main factors that affect the reading distances of RFID tags?
The proximity of radio-reflective materials, e.g., metals, and radio-absorbing materials, like liquids, as well as ambient radio noise, affect scanning distances.
Q7. What is the purpose of the call for the pharmaceutical industry to apply RFID tags to pallets and?
In the United States, the Food and Drug Administration (FDA) has called for the pharmaceutical industry to apply RFID tags to pallets and cases by 2007, with the aim of combatting counterfeit pharmaceuticals [24].
Q8. What are some of the reasons why some libraries have implemented RFID systems?
Some libraries have implemented RFID systems to facilitate book checkout and inventory control and to reduce repetitive stress injuries in librarians.
Q9. What is the purpose of a re-encrypting reader?
To re-encrypt a ciphertext , it would be necessary to know under which public key it is encrypted, information that is potentially privacy-sensitive.
Q10. What is the way to avoid brute-force key search?
Synchronization approach: Another approach to avoiding brute-force key search is for a reader to maintain synchronized state with tags.
Q11. How many gate equivalents do they need to implement?
Their design requires just over 3500 gate equivalents—considerably more than appropriate for basic RFID tags, but suitable for higher cost RFID tags.
Q12. What are some of the advantages of using RFID tags for shipping-container security?
Devices like RFID tags for shipping-container security, high-security contactless smartcards, and RFID-enabled passports10 can often perform public-key operations.
Q13. What is the idea of effacing unique identifiers in tags?
Relabeling: Sarma, Weis, and Engels (SWE) propose the idea of effacing unique identifiers in tags at the point of sale [60] to address the tracking problem, but retaining product-type identifiers (traditional barcode data) for later use.
Q14. How can an attacker inflate a tag?
By querying a tag repeatedly, for example, an attacker can inflate artificially, to the point where is distinctly large and, therefore, recognizable to the adversary.
Q15. What is the way to delegate ownership of an RFID tag?
Such tag delegation can be useful in a couple of ways.1) A tag holder can transfer ownership of an RFID tag to another party, while ensuring that past tag history remains private.
Q16. Why do some stores kill RFID tags?
And in some cases, such as libraries and rental shops, RFID tags cannot be killed because they must survive over the lifetime of the objects they track.