2017
DOI: 10.25046/aj020624
|View full text |Cite
|
Sign up to set email alerts
|

Review on security issues in RFID systems

Abstract: Radio frequency Identification (RFID) is currently considered as one of the most used

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Evaluations of RFID device performance within the blood supply chain were conducted, utilizing FMEA to identify departments necessitating reengineering [55]. A review of security concerns in RFID systems was presented in [56]. Furthermore, [57][58][59] outlined the issues and challenges encountered with RFID technology.…”
Section: An Overview Of the Rfid Systemmentioning
confidence: 99%
“…Evaluations of RFID device performance within the blood supply chain were conducted, utilizing FMEA to identify departments necessitating reengineering [55]. A review of security concerns in RFID systems was presented in [56]. Furthermore, [57][58][59] outlined the issues and challenges encountered with RFID technology.…”
Section: An Overview Of the Rfid Systemmentioning
confidence: 99%
“…It is a powerful solution to avoid interference and multi-path fading (distortion), it also decreases narrowband interference, increases signal capacity, and improves the signal to noise ratio [18]. Porambage et al [19] have discussed a pervasive authentication (PAuthKey) method which is lightweight in nature. This algorithm has been developed keeping in mind the resource scarcity at sensors end.…”
Section: Security Solution At Perception Layermentioning
confidence: 99%
“…The possibility that malicious objects easily access some insecure data sources because of the unavailability of encryption and other security management [102]. The distributed storage of IoT data across multiple geographical countries might enable attackers to access the data at some insecure holders [103] Security management, robust encryption algorithms, strict access controls [53,104] (continued) File integrity monitoring, logging activity, web application scanners [109] Data scavenging attacks S4, S6, S10…”
Section: S4 S6mentioning
confidence: 99%