2016
DOI: 10.3390/s17010028
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

Abstract: The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 63 publications
(36 citation statements)
references
References 63 publications
0
35
0
1
Order By: Relevance
“…Hence, it can perform flexible and low-cost peer-to-peer communications. In practice, it has been widely used in myriad applications such as mobile identification systems and logistic monitoring systems [36].…”
Section: Internet Of Ioementioning
confidence: 99%
“…Hence, it can perform flexible and low-cost peer-to-peer communications. In practice, it has been widely used in myriad applications such as mobile identification systems and logistic monitoring systems [36].…”
Section: Internet Of Ioementioning
confidence: 99%
“…Retailers will have to work out how the changing room will look like and how to promote the features of smart clothes. • Smart environments rely on a ensuring high-security against cyber threats [260][261][262], and on the constant availability of sensor and actuator devices, whose power consumption is a concern due to the large number of sensor nodes to be deployed. IoT devices require high-security lightweight protocols [263] and cipher suites [264] that optimize the use of resources and the energy consumption.…”
Section: Main Challenges and Technical Limitations For A Broader Adopmentioning
confidence: 99%
“…IoT gateways can be improved in different ways to reduce power consumption, but, in this paper, how to increase energy efficiency and maximize data throughput while guaranteeing high security in the communications between IoT gateways and with the cloud is analyzed. Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [ 13 , 14 , 15 ], defense and public safety [ 16 ], transportation and connected vehicles [ 17 ], or healthcare, where security issues can pose risks for human safety and privacy [ 18 , 19 ] and which can be the target of cyberwarfare attacks [ 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…It is also important to emphasize that security in IoT and fog computing systems is often overlooked or not completely addressed [ 18 , 21 , 22 ], slowing down the broad adoption of IoT. Furthermore, one of the main barriers for not implementing security mechanisms to protect the communications is the low computing capabilities of most IoT nodes, which is a topic to be researched in the next years.…”
Section: Introductionmentioning
confidence: 99%