Classification of major security attacks against RFID systems

被引:0
|
作者
El Beqqal, Mohamed [1 ]
Azizi, Mostafa [1 ]
机构
[1] Univ Mohamed Ist Oujda, MATSI Lab, ESTO, Oujda, Morocco
关键词
component; RFID system; RFID applications; security; privacy; threats; countremeasures;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open issue. In this work, we present a survey of recent works dealing with security and privacy in RFID systems. Particularly, we compare and classify them according to which part of RFID system each solution could be applied, taking into account different requirements and parameters including their conformity to RFID standards. Hence, our comparative study targets to provide a wide and clear vision of these concerns as a dashboard to help determining the most appropriate solutions towards any security problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Security of unmanned aerial vehicle systems against cyber-physical attacks
    Rani, Chaitanya
    Modares, Hamidreza
    Sriram, Raghavendra
    Mikulski, Dariusz
    Lewis, Frank L.
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (03): : 331 - 342
  • [32] Structural Analysis and Design for Security against Actuator Stealthy Attacks in Uncertain Systems
    Zhang, Kangkang
    Kasis, Andreas
    Polycarpou, Marios M.
    Parisini, Thomas
    [J]. 2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 8051 - 8056
  • [33] Security in mobile agent systems: A model to protect against malicious host attacks
    Sameh, A
    Fakhry, D
    [J]. COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2001, : 181 - 184
  • [34] Hardware RFID Security for Preventing Far-Field Attacks
    Dobrykh, Dmitry
    Filonov, Dmitry
    Slobozhanyuk, Alexey
    Ginzburg, Pavel
    [J]. IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2022, 70 (03) : 2199 - 2204
  • [35] Classification Statistics in RFID Systems
    Wen, Zhenzao
    Huang, Jiapeng
    Kong, Linghe
    Wu, Min-You
    Chen, Guihai
    [J]. COMBINATORIAL OPTIMIZATION AND APPLICATIONS, COCOA 2017, PT II, 2017, 10628 : 425 - 440
  • [36] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [37] Hybrid Security Classification Approach to Attacks in WiMAX
    Ahmadzadegan, M. Hossein
    Elmusrati, M.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC), 2013,
  • [38] A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
    Ma, Di
    Saxena, Nitesh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2684 - 2695
  • [39] Security aspects of RFID communication systems
    Bindar, Valerica
    Popescu, Mircea
    Bartusica, Razvan
    Craciunescu, Razvan
    Halunga, Simona
    [J]. ADVANCED TOPICS IN OPTOELECTRONICS, MICROELECTRONICS, AND NANOTECHNOLOGIES VII, 2015, 9258
  • [40] An Evaluation of RFID Security Systems and their Effectiveness
    Ketterer, Jeremy
    Chowdhury, Md Minhaz
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 38 - 43