Skip to main content

Comparison of Attacks and Security Analyses for Different RFID Protocols

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

  • 986 Accesses

Abstract

RFID is a widely adopted in the field of identification technology these days. Radio Frequency Identification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyzed the associated vulnerability and threat to the confidentiality, availability of the information assets for privacy, and mitigate the risks in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. The security functions to be adopted in a system, strongly depend on the application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Park Y-J et al (2012) On the accuracy of RFID tag estimation functions. J Inf Commun Convergence Eng 10(1):33–39

    Google Scholar 

  2. Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing, vol 2802 of LNCS, pp 201–212

    Google Scholar 

  3. Mobahat H (2010) Authentication and lightweight cryptography in low cost RFID. In: 2nd international conference on software technology and engineering (ICSTE), pp 123–129

    Google Scholar 

  4. Pateriya RK et al (2011) The evolution of RFID security and privacy: a research survey. In: International conference on communication systems and network technologies, pp 115–119

    Google Scholar 

  5. Feldhofer M et al (2004) Strong authentication for RFID systems using the AES algorithm. Cryptogr Hardw Embed Syst 31(56):357–370

    Google Scholar 

  6. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  7. Huang Y-J et al (2010) Hardware implementation of RFID mutual authentication protocol. IEEE Trans Ind Electron 57(5):1573–1582

    Article  Google Scholar 

  8. Kavitha SM et al (2012) RFID implementation with secure mutual authentication protocol. In: International conference on computing, electronics and electrical technologies, pp 746–751

    Google Scholar 

  9. Phan RC-W (2009) Cryptanalysis of a new ultra-lightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320

    Article  Google Scholar 

  10. Khoo B (2011) RFID as an enabler of the internet of things: issues of security and privacy. In: IEEE international conferences on internet of things, and cyber, physical and social computing, pp 709–712

    Google Scholar 

  11. Kwon S-H, Park D-W (2012) Hacking and security of encrypted access points in wireless network. J Inf Commun Convergence Eng 10(2):156–161

    Article  Google Scholar 

  12. Jeon D et al (2011) An enhanced forward security on JK-RFID authentication protocol. J Korea Inst Inf Secur Cryptol 21(5):161–168

    Google Scholar 

  13. Chiwn H-Y et al (2009) ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J Parallel Distrib Comput 69(10):848–853

    Article  Google Scholar 

  14. Kapoor G et al (2011) Vulnerabilities in Chen and Deng’s RFID mutual authentication and privacy protection protocol. Eng Appl Artif Intell 24:1300–1302

    Article  Google Scholar 

  15. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman R, Tari Z, Herrero P (eds) OTM 2006 workshops. LNCS, vol 427. Springer, Heidelberg, pp 352–361

    Google Scholar 

  16. Zuo Y (2010) Survivable RFID systems: issues, challenges, and techniques. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):406–418

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: 2012-0007896).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung Tae Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kim, J.T. (2013). Comparison of Attacks and Security Analyses for Different RFID Protocols. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_22

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics