A critical analysis of RFID security protocols
Access Status
Authors
Date
2008Type
Metadata
Show full item recordCitation
Source Title
Source Conference
Faculty
School
Remarks
Copyright 2008 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Collection
Abstract
RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID.
Related items
Showing items related by title, author, creator and subject.
-
Han, Song; Dillon, Tharam S.; Potdar, Vidyasagar; Chang, Elizabeth (2013)RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues ...
-
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...
-
Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...