Research of RFID System Security

Article Preview

Abstract:

Radio Frequency Identification (RFID) technology has been gradually into our daily production and life as a new non-contact automatic identification technology.However , the limited resources of low-cost RFID largely restrict the implementation of RFID security mechanisms,which leads to personal privacy issues ,and the issues greatly hinder the rapid adoption of the technology.Here, RFID communication model and security requirements are discussed,and then it analyzes the security solutions for low-cost RFID systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2653-2656

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Garfinkel S L,Juels A,Pappu R,RFID Privacy:An Overview of Problems and Proposed Solutions[J].Security & Privacy Magazine,IEEE,2005,3(3):34~43.

DOI: 10.1109/msp.2005.78

Google Scholar

[2] Ari Juels,Ronald L,Rivest,Michael Szydlo. The Blocker Tag:Selective Blocking of RFID Tags for Consumer Privacy[M].ACM Press,2003:103~111.

DOI: 10.1145/948109.948126

Google Scholar

[3] Gunter Karjoth,Paul A.MOskowitz.Disabling RFID Tags with Visible Confirmation:Clilpped Tags Are Silenced[M]. ACM Press,2005,27~30.

DOI: 10.1145/1102199.1102205

Google Scholar

[4] Turban E,Wetherbe J, Mclean, E. Information Technology for Management: Improving Quality and Productivity.New York:John Wiley and Sons,1996.

Google Scholar

[5] Dacier M, Deswarte Y , Ka^aniche M.Quantitative Assessment of Operational Security:Models and Tools[R].Laboratory for Analysis and Architecture of System,National Center for Scientific Research (LAAS-CNRS),1996.

Google Scholar

[6] Helmer G, Wong J, Slagell M,et al. Software Fault Tree and Colored Petri Net Based Specification,Design and Impementation of Agent-Based Intrusion Detection System.Requirements Engineering,2000,7(4):207~220.

DOI: 10.1007/s007660200016

Google Scholar

[7] Bilar D. Quantitatie Risk Analysis of Computer Networks.Hanover,New Hampshire:Thayer School of Engineering,Dart mouth University,2003.

Google Scholar

[8] You Zhanqing, Liu Kesheng, Wu Xiang, Lin Hanhong. Radio Frequency Identification (RFID) and Barcode Technology[M]. Machinery Industry Press .2007.1(in Chinese)

Google Scholar

[9] Peng Zhiwei.RFID Security and Privacy[J].Communication Technology.2007.8 (4):28-33.(in Chinese)

Google Scholar