Abstract
RFID is a widely adopted in the field of identification technology these days. Radio Frequency Identification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyzed the associated vulnerability and threat to the confidentiality, availability of the information assets for privacy, and mitigate the risks in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. The security functions to be adopted in a system, strongly depend on the application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Park Y-J et al (2012) On the accuracy of RFID tag estimation functions. J Inf Commun Convergence Eng 10(1):33–39
Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing, vol 2802 of LNCS, pp 201–212
Mobahat H (2010) Authentication and lightweight cryptography in low cost RFID. In: 2nd international conference on software technology and engineering (ICSTE), pp 123–129
Pateriya RK et al (2011) The evolution of RFID security and privacy: a research survey. In: International conference on communication systems and network technologies, pp 115–119
Feldhofer M et al (2004) Strong authentication for RFID systems using the AES algorithm. Cryptogr Hardw Embed Syst 31(56):357–370
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394
Huang Y-J et al (2010) Hardware implementation of RFID mutual authentication protocol. IEEE Trans Ind Electron 57(5):1573–1582
Kavitha SM et al (2012) RFID implementation with secure mutual authentication protocol. In: International conference on computing, electronics and electrical technologies, pp 746–751
Phan RC-W (2009) Cryptanalysis of a new ultra-lightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320
Khoo B (2011) RFID as an enabler of the internet of things: issues of security and privacy. In: IEEE international conferences on internet of things, and cyber, physical and social computing, pp 709–712
Kwon S-H, Park D-W (2012) Hacking and security of encrypted access points in wireless network. J Inf Commun Convergence Eng 10(2):156–161
Jeon D et al (2011) An enhanced forward security on JK-RFID authentication protocol. J Korea Inst Inf Secur Cryptol 21(5):161–168
Chiwn H-Y et al (2009) ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J Parallel Distrib Comput 69(10):848–853
Kapoor G et al (2011) Vulnerabilities in Chen and Deng’s RFID mutual authentication and privacy protection protocol. Eng Appl Artif Intell 24:1300–1302
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman R, Tari Z, Herrero P (eds) OTM 2006 workshops. LNCS, vol 427. Springer, Heidelberg, pp 352–361
Zuo Y (2010) Survivable RFID systems: issues, challenges, and techniques. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):406–418
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: 2012-0007896).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Kim, J.T. (2013). Comparison of Attacks and Security Analyses for Different RFID Protocols. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_22
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_22
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)