Results 1 - 10
of
1,126
RFID security and privacy: A research survey
- ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008
, 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract
-
Cited by 353 (6 self)
- Add to MetaCart
Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next
New Directions in RFID Security
"... Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, a ..."
Abstract
- Add to MetaCart
Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security
The evolution of rfid security
- IEEE Pervasive Computing
, 2006
"... has been an obvious target for abuse. Wireless identification is a powerful capability, and RFID reveals both a physical object’s nature and location. Anyone can easily gain unauthorized access to RFID data because they don’t need a line of sight to gather it. For example, ..."
Abstract
-
Cited by 40 (0 self)
- Add to MetaCart
has been an obvious target for abuse. Wireless identification is a powerful capability, and RFID reveals both a physical object’s nature and location. Anyone can easily gain unauthorized access to RFID data because they don’t need a line of sight to gather it. For example,
RFID security threat model
- In Proceedings Acxiom Laboratory for Applied Research (ALAR) Conf
"... Abstract: Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
Abstract: Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged
RFID Security and Privacy Concerns
- WSEAS Transactions on Computer Science
, 2006
"... Abstract:- Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond the capabilities of any of the tools available today for monitori ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
for monitoring any item without an RFID tag. Many of the applications envisioned have a legitimate use. However, this technology provides room for abuse of people’s privacy. Moreover, since the communication between a RFID tag and its reader takes place in a wireless manner, issues concerning security of such a
RFID Security Taken for Granted
"... In its everyday life an average person is surrounded by RFID devices. For example when you use the access control at your office building, travelling with a public transport card, authenticate to an vehicle immobilizers that is embedded in your car key, pay for lunch with your mobile phone and readi ..."
Abstract
- Add to MetaCart
In its everyday life an average person is surrounded by RFID devices. For example when you use the access control at your office building, travelling with a public transport card, authenticate to an vehicle immobilizers that is embedded in your car key, pay for lunch with your mobile phone
RFID Security and Privacy
"... The European Commission has published in May 2009 a recommendation “on the implementation of privacy and data protection principles in applications supported by radio-frequency identification”, which is designed to provide “guidance to Member States on the design and operation of RFID applications ..."
Abstract
- Add to MetaCart
The European Commission has published in May 2009 a recommendation “on the implementation of privacy and data protection principles in applications supported by radio-frequency identification”, which is designed to provide “guidance to Member States on the design and operation of RFID applications
Desynchronization Attacks on RFID Security Protocols
, 2013
"... The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This pa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented
RFID Security and Privacy: Threats and Countermeasures
, 2013
"... The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This ..."
Abstract
- Add to MetaCart
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas
Mutual Authentication in RFID Security and Privacy
"... In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols ca ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols
Results 1 - 10
of
1,126