RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.
The internet of things (IoT) is a concept that is revolutionizing our daily lives along with different areas of industry. All existing objects will be connected to the internet. All the possibilities offered by IoT are very promising. However, setting up these architectures poses various problems. The exponential increase in devices is a challenge to the current internet architecture and represents a major security weakness of the internet of things. Indeed, securing these devices poses a significant security challenge. Thus, the emergence of the internet of things requires the design and deployment of new solutions. In this chapter, the authors propose content-centric networking (CCN) as a potential alternative networking solution for the IoT. The authors show that the implementation of CCN architecture in IoT can address several IoT requirements including security challenges.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.