RFID systems: A survey on security threats and proposed solutions

被引:0
|
作者
Peris-Lopez, Pedro [1 ]
Hernandez-Castro, Julio Cesar [1 ]
Estevez-Tapiador, Juan M. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, E-28903 Getafe, Spain
关键词
RFID security; pervasive computing; ubiquitous computing; security and privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technology in history. This can have huge security implications. The present article surveys the most important technical security challenges of RFID systems. We first provide a brief summary of the most relevant standards related to this technology. Next, we present an overview about the state of the art on RFID security, addressing both the functional aspects and the security risks and threats associated to its use. Finally, we analyze the main security solutions proposed until date.
引用
收藏
页码:159 / 170
页数:12
相关论文
共 50 条
  • [21] A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
    Kim, Nam Yong
    Rathore, Shailendra
    Ryu, Jung Hyun
    Park, Jin Ho
    Park, Jong Hyuk
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1361 - 1384
  • [22] Satellite-based communications security: A survey of threats, solutions, and research challenges
    Tedeschi, Pietro
    Sciancalepore, Savio
    Di Pietro, Roberto
    [J]. COMPUTER NETWORKS, 2022, 216
  • [23] Security Threats of Wireless Networks: A Survey
    Gupta, Akhil
    Jha, Rakesh Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 389 - 395
  • [24] A survey of security threats and defense on Blockchain
    Jieren Cheng
    Luyi Xie
    Xiangyan Tang
    Naixue Xiong
    Boyi Liu
    [J]. Multimedia Tools and Applications, 2021, 80 : 30623 - 30652
  • [25] Database Security Threats: A Survey Study
    Al-Sayid, Nedhal A.
    Aldlaeen, Dana
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 60 - 64
  • [26] A survey of security threats and defense on Blockchain
    Cheng, Jieren
    Xie, Luyi
    Tang, Xiangyan
    Xiong, Naixue
    Liu, Boyi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 30623 - 30652
  • [27] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [28] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [29] A Review on Cloud Security Threats and Solutions
    Sebastian, Anu Maria
    Kizhakkethottam, Jubilent J.
    [J]. PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [30] Smart Grid Security: Threats and Solutions
    Ul Haq, Ejaz
    Xu, Huarong
    Pan, Liang
    Khattak, Muhammad Irfan
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG 2017), 2017, : 188 - 193