Classification of major security attacks against RFID systems

被引:0
|
作者
El Beqqal, Mohamed [1 ]
Azizi, Mostafa [1 ]
机构
[1] Univ Mohamed Ist Oujda, MATSI Lab, ESTO, Oujda, Morocco
关键词
component; RFID system; RFID applications; security; privacy; threats; countremeasures;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open issue. In this work, we present a survey of recent works dealing with security and privacy in RFID systems. Particularly, we compare and classify them according to which part of RFID system each solution could be applied, taking into account different requirements and parameters including their conformity to RFID standards. Hence, our comparative study targets to provide a wide and clear vision of these concerns as a dashboard to help determining the most appropriate solutions towards any security problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Classification of RFID attacks
    Mitrokotsa, Aikaterini
    Rieback, Melanie R.
    Tanenbaum, Andrew S.
    [J]. IWRT 2008: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON RFID TECHNOLOGY - CONCEPTS, APPLICATIONS CHALLENGES, 2008, : 73 - 86
  • [2] Security Against Impersonation Attacks in Distributed Systems
    Brown, Philip N.
    Borowski, Holly P.
    Marden, Jason R.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 440 - 450
  • [3] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1943 - 1959
  • [4] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Lijun Gao
    Maode Ma
    Yantai Shu
    Yuhua Wei
    [J]. Wireless Personal Communications, 2013, 68 : 1943 - 1959
  • [5] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    [J]. 2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [6] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508
  • [7] Anapole-enabled RFID security against far-field attacks
    Mikhailovskaya, Anna
    Shakirova, Diana
    Krasikov, Sergey
    Yusupov, Ildar
    Dobrykh, Dmitry
    Slobozhanyuk, Alexey
    Bogdanov, Andrey
    Filonov, Dmitry
    Ginzburg, Pavel
    [J]. NANOPHOTONICS, 2021, 10 (17) : 4409 - 4418
  • [8] Security Analysis of RFID Relay Attacks
    Guizani, Sghaier
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 191 - 196
  • [9] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [10] Sensor deception attacks against security in supervisory control systems
    Yao, Jingshi
    Li, Shaoyuan
    Yin, Xiang
    [J]. AUTOMATICA, 2024, 159