The Survey of RFID Attacks and Defenses

被引:0
|
作者
Li, Hong [1 ]
Chen, YongHui [1 ]
He, ZhangQing [2 ]
机构
[1] Hubei Univ Technol, Coll Comp Sci & Technol, Wuhan, Peoples R China
[2] Hubei Univ Technol, Sch Elect & Elect Engn, Wuhan, Peoples R China
关键词
RFID System; RFID Security and Privacy; security protocol; encryption algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. However, they also present a number of inherent vulnerabilities. This paper comprehensive analysis the potential security threats and attacks that RFID networks faces, discusses possible countermeasures, reviews the existing RFID system security mechanisms and examines the weaknesses or flaws in these protocols. Then fields where future research is needed are identified.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Classifying RFID attacks and defenses
    Aikaterini Mitrokotsa
    Melanie R. Rieback
    Andrew S. Tanenbaum
    [J]. Information Systems Frontiers, 2010, 12 : 491 - 505
  • [2] Classifying RFID attacks and defenses
    Mitrokotsa, Aikaterini
    Rieback, Melanie R.
    Tanenbaum, Andrew S.
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
  • [3] Tampering in RFID: A Survey on Risks and Defenses
    Filippo Gandino
    Bartolomeo Montrucchio
    Maurizio Rebaudengo
    [J]. Mobile Networks and Applications, 2010, 15 : 502 - 516
  • [4] Tampering in RFID: A Survey on Risks and Defenses
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    [J]. MOBILE NETWORKS & APPLICATIONS, 2010, 15 (04): : 502 - 516
  • [5] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [6] Survey of Attacks and Defenses against SGX
    Zhang, Yahui
    Zhao, Min
    Li, Tingquan
    Han, Huan
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496
  • [7] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [8] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [9] Survey on adversarial attacks and defenses for object detection
    Wang, Xinxin
    Chen, Jing
    He, Kun
    Zhang, Zijun
    Du, Ruiying
    Li, Qiao
    She, Jisi
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (11): : 260 - 277
  • [10] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu, Rui-Xuan
    Chen, Hong
    Guo, Ruo-Yang
    Zhao, Dan
    Liang, Wen-Juan
    Li, Cui-Ping
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (03): : 866 - 892