A comprehensive taxonomy of security and privacy issues in RFID

被引:0
|
作者
Atul Kumar
Ankit Kumar Jain
Mohit Dua
机构
[1] National Institute of Technology,
来源
关键词
IoT; RFID; Security; Confidentiality; Integrity; Availability; Authorization;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile devices, and many more. These devices interact with each other without human interaction. Radio-frequency identification (RFID) devices are used to track people, assets, objects, etc. Along with the small memory capacity and low-power battery issues, these devices suffer from various security-related issues. These security threats include attacks such as replay, disclosure, tracking, offline guessing, denial of service attacks, and many more. In the last few decades, the researchers have suggested various security approaches to overcome these vulnerabilities. Hence, this paper discusses various possible attacks that can occur on an RFID system, and several security schemes that have been proposed to handle these attacks. First, the works presents the architecture of IoT in detail. Second, all possible attacks are described by categorizing them into confidentiality, integrity, and availability. Then, taxonomy of various security schemes, to deal with these attacks, is discussed under the criteria cryptography approaches, privacy, authentication, authorization, and availability. Finally, the paper describes various issues and challenges to have a better understanding of scope of the future research in the field of RFID security.
引用
收藏
页码:1327 / 1347
页数:20
相关论文
共 50 条
  • [31] Information Security Issues of RFID
    Nyikes, Zoltan
    [J]. 2016 IEEE 14TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2016, : 111 - 114
  • [32] An Exploration of RFID Information Security and Privacy
    Chen, Chih-Yung
    Kuo, Chien-Ping
    Chien, Fang-Yuan
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 65 - +
  • [33] RFID Security Issues & Challenges
    Kulkarni, Gurudatt
    Shelke, Rupali
    Sutar, Ramesh
    Mohite, Sangita
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [34] Security and privacy in RFID and applications in telemedicine
    Xiao, Y
    Shen, XM
    Sun, B
    Cai, L
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (04) : 64 - 72
  • [35] RFID systems and security and privacy implications
    Sarma, SE
    Weis, SA
    Engels, DW
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 454 - 469
  • [36] Privacy and security issues in teleradiology
    White, P
    [J]. SEMINARS IN ULTRASOUND CT AND MRI, 2004, 25 (05) : 391 - 395
  • [37] IoT Security and Privacy Issues
    Assiri, Abeer
    Almagwashi, Haya
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [38] Metaverse: Security and Privacy Issues
    Di Pietro, Roberto
    Cresci, Stefano
    [J]. 2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 281 - 288
  • [39] Legal issues of security and privacy
    Anon
    [J]. Newspaper Techniques, 2002, (JAN.):
  • [40] A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges
    Hathaliya, Jigna J.
    Tanwar, Sudeep
    [J]. SECURITY AND PRIVACY, 2024, 7 (04)