2010
DOI: 10.1007/s11277-010-0186-2
|View full text |Cite
|
Sign up to set email alerts
|

Security Problems in an RFID System

Abstract: This paper focuses on the security and privacy threats being faced by the lowcost RFID communication system, the most challenging of which relate to eavesdropping, impersonation, and tag cloning problems. The security issues can be improved and solved by utilizing both prevention and detection strategies. Prevention technique is needed since it offers resistance capabilities toward eavesdroppers and impersonators. Detection technique is vital to minimize the negative effects of tag cloning threats. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 11 publications
(29 reference statements)
1
20
0
Order By: Relevance
“…Aiming to increase the security level offered by this standard many proposals [19][20][21][22] have been published in the last years, but unfortunately cryptanalysis were published [23][24][25][26] in the ensuing months. In this paper, we show how Khor et al [8] suffers the same fate as previous proposals. That is, this work does not guarantee the claimed security properties.…”
Section: Background and Security Threatssupporting
confidence: 58%
“…Aiming to increase the security level offered by this standard many proposals [19][20][21][22] have been published in the last years, but unfortunately cryptanalysis were published [23][24][25][26] in the ensuing months. In this paper, we show how Khor et al [8] suffers the same fate as previous proposals. That is, this work does not guarantee the claimed security properties.…”
Section: Background and Security Threatssupporting
confidence: 58%
“…The UHF tags are known to have the longest range (up to tens of meters) and are subject to ambient interference. In the paper by Khor et al (2011), the lightweight cryptography is said to conform to the EPC Class-1 Generation-2 standard. Lightweight cryptographic functions such as the XOR, CRC and PRNG were mentioned and proposed as a part of the authors' solution to protect tags from eavesdropping and impersonation.…”
Section: Radio Frequency Identification (Rfid) Rcementioning
confidence: 99%
“…Web-based programming and architecture system are introduced in this study to design and develop a fully automated and embedded system for real time monitoring and data acquisition system in industrial application. Web-based programming technology is a challenging technology in order to make this automation more efficient and reliable [8].…”
Section: System Componentsmentioning
confidence: 99%