Security and Threats of RFID and WSNs: Comparative Study

被引:0
|
作者
Alzeer, Ghada Hisham [1 ]
Aljumaie, Ghada Sultam [1 ]
Alhakami, Wajdi [1 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, At Taif, Saudi Arabia
关键词
Security; IoT; WSN; RFID; PROTOCOL DESIGN; THINGS IOT; AUTHENTICATION; INTERNET; MODEL; TAGS;
D O I
10.14569/IJACSA.2021.0120534
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) has garnered significant attention from people with growing changes in human life over the last few years. IoT is a network of a group of smart devices that use sensors to collect information and conduct events in their environments. The information can then be shared on the Internet. IoT uses a range of technologies and finds various applications such as smart homes, environmental monitoring, and healthcare. In this paper, we conducted a comparative study to analyze the difference between two technologies-Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID). It is pertinent to note that these technologies would not be effective without incorporating security aspects due to a potential number of threats and attacks on the network. This paper provides a comprehensive review of the recent approaches to securing RFID and WSNs. We have carefully chosen most of these studies to investigate only the recent technique from 2017 to 2020. The paper also highlights common attacks on RFID and WSNs and the secure authentication mechanisms on these technologies. It further provides a different way of detecting varying attacks in RFID and WSNs.
引用
收藏
页码:276 / 285
页数:10
相关论文
共 50 条
  • [1] REASEARCH FOR THREATS AND SECURITY IN RFID INFORMATION SYSTEM
    Wang, Zhaoshun
    Chen, Hongsong
    Huang, Xiaoli
    [J]. CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 288 - 291
  • [2] Security and privacy threats in RFID traceability network
    Chu Chao-Hsien
    [J]. Journal of Southeast University(English Edition), 2008, (English Edition) : 132 - 135
  • [4] Security threats on EPIC based RFID systems
    Garcia-Alfaro, Joaquin
    Barbeau, Michel
    Kranakis, Evangelos
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 1242 - 1244
  • [6] Confronting security and privacy threats in modem RFID systems
    Ranasinghe, Damith C.
    Cole, Peter H.
    [J]. 2006 FORTIETH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-5, 2006, : 2058 - +
  • [7] RFID systems: A survey on security threats and proposed solutions
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 159 - 170
  • [8] Critical Analysis and Comparative Study of Security for Networked RFID Systems
    Ray, Biplob R.
    Chowdhury, Morshed
    Abawajy, Jemal
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 197 - 202
  • [9] The Decline of the Traditional Pension: A Comparative Study of Threats to Retirement Security.
    Asher, Anthony
    [J]. JOURNAL OF PENSION ECONOMICS & FINANCE, 2012, 11 (01): : 143 - 144
  • [10] A comparative study on consensus mechanism with security threats and future scopes: Blockchain
    Yadav, Ashok Kumar
    Singh, Karan
    Amin, Ali H.
    Almutairi, Laila
    Alsenani, Theyab R.
    Ahmadian, Ali
    [J]. COMPUTER COMMUNICATIONS, 2023, 201 : 102 - 115