2023
DOI: 10.3390/fi15110354
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications

Ismail El Gaabouri,
Mohamed Senhadji,
Mostafa Belkasmi
et al.

Abstract: The Internet of Things (IoT) concept is tremendously applied in our current daily lives. The IoT involves Radio Frequency Identification (RFID) as a part of the infrastructure that helps with the data gathering from different types of sensors. In general, security worries have increased significantly as these types of technologies have become more common. For this reason, manifold realizations and studies have been carried out to address this matter. In this work, we tried to provide a thorough analysis of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…Furthermore, RNM-SC applies Blum-Goldwasser asymmetric cryptography to encrypt and decrypt sensitive data. An extensive review by I. E. Gaabouri [12] addressed the security challenges and threats of systems based on RFID and NFC technologies. It is suggested that the deployment of a strong cryptography scheme is a feasible solution to reinforce RFID's communication security.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, RNM-SC applies Blum-Goldwasser asymmetric cryptography to encrypt and decrypt sensitive data. An extensive review by I. E. Gaabouri [12] addressed the security challenges and threats of systems based on RFID and NFC technologies. It is suggested that the deployment of a strong cryptography scheme is a feasible solution to reinforce RFID's communication security.…”
Section: Introductionmentioning
confidence: 99%