Browse > Article
http://dx.doi.org/10.6109/ijice.2011.9.6.701

Analyses of Security, Privacy Issues and Challenges for RFID System  

Kim, Jung-Tae (Dept. of Electronic Eng., Mokwon University)
Abstract
RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.
Keywords
Security; Privacy; RFID Protocol; Ultra-weight algorithm;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Raphael C.-W. Phan, "Cryptanalysis of a New Ultra-lightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, Oct 2009   DOI   ScienceOn
2 George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
3 Dong-liang Wu, "A brief Survey on Current RFID Application", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009, pp.2330-2335
4 S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.A
5 M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
6 Karygiannis, "Karygianni's Taxonomy Model in RFID Threats", 2008 11th IEEE International Conference on Communication Technology Proceedings, pp.765-768
7 Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Trans. on Network and Service Management, V. 6, N. 3, pp.190-205, Sep. 2009.   DOI   ScienceOn
8 J.D.H, etcs, "Strong Authentication and improving privacy with ultra-weight RFID authentication Protocol", KIISC, v.19, n.19, pp.81-91, 2009
9 P. Peris-Lopez, etcs, "M2AP: A Minimalist mutual authentication Protocol for Low-cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing, pp.912-923, 2006.
10 H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007   DOI   ScienceOn
11 P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Rib-agorda, "RFID systems: A survey on security threats and proposed solutions," in 11th IFIP International Conference on Personal Wireless Communications - PWC06, ser. Lecture Notes in Computer Science, vol.4217. Springer-Verlag, September 2006, pp. 159-170.
12 Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006   DOI   ScienceOn
13 P. Peris-Lopez, etcs, "LMAP: A Real Lightweight Low-cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006
14 P. Ekdahl, and T. Johansson, "Another attack on A5/1", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003A   DOI   ScienceOn
15 Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842
16 Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-Part C: Applications and reviews, v. 40, n. 4, pp. 406-418, July 2010
17 P. Peris-Lopez, etcs, "EMAP: An Efficient Mutal Authentication Protocol for Low-Cost RFIDs", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006
18 Selwyn Piramuthu, "Lightweight Cryptographic Authentication in Passive RFID Tagged Systems," IEEE Tran. On Systems, Man, and Cybernetics-Part C: Applications and review, v.38, n.3, pp.360-376, May 2008   DOI   ScienceOn
19 Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg, 2006
20 Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008