2018 15th International Multi-Conference on Systems, Signals &Amp; Devices (SSD) 2018
DOI: 10.1109/ssd.2018.8570558
|View full text |Cite
|
Sign up to set email alerts
|

Security of RFID Based Internet of Things Applications: Requirements and Open Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Some other recent papers have focused on specific topics, so this paper can serve as an entry point, providing a global view to help researchers to explore the most active topics, trending applications and security work in RFID, information that is valuable to people of different backgrounds and interests. During this research, it was observed that the application of RFID continues to grow, with management of the complexity in security models [34,40,62,85,177,178] and protocols [31,39,51,[54][55][56][59][60][61][62]161,196,[200][201][202]204,207,212,213,235].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Some other recent papers have focused on specific topics, so this paper can serve as an entry point, providing a global view to help researchers to explore the most active topics, trending applications and security work in RFID, information that is valuable to people of different backgrounds and interests. During this research, it was observed that the application of RFID continues to grow, with management of the complexity in security models [34,40,62,85,177,178] and protocols [31,39,51,[54][55][56][59][60][61][62]161,196,[200][201][202]204,207,212,213,235].…”
Section: Discussionmentioning
confidence: 99%
“…There are multiple studies on communication protocols to improve performance without compromising on security and scalability [31]; strong security and privacy are important when using mutual authentication between the reader and the tags [32]. The existing security attacks, privacy risks, and countermeasures to be applied [33], and identifying the limitations, requirements, and issues to work on for more secure deployment to meet security demands [34][35][36][37] are also being studied. However, there is a demand to search for more lightweight RFID authentication schemes due to the limitations of processing, storage, and power on the RFID tag side [38,39].…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
See 1 more Smart Citation
“…The maturity of Internet of Things technology provides support to solve this key problem [14], [15]. For example, the radio frequency identification technology (RFID) in the Internet of Things technology has the characteristics of long identification distance, strong anti-interference ability, high accuracy and good data security [16]- [18], which can meet the requirements of data collection in emergencies.…”
Section: Applicability Analysis Of Internet Of Things Technology In U...mentioning
confidence: 99%
“…Researchers have begun to propose stream ciphers as an attractive solution to this problem [6]. Current solutions employing stream ciphers generally lack confidentiality, integrity, and authentication provided by asymmetric algorithms of a public key infrastructure (PKI) [7]. An ongoing challenge associated with cryptography is secure key exchange [8], [9].…”
Section: Introductionmentioning
confidence: 99%