Security Threats and Countermeasures in the Internet of Things Based on RFID

Article Preview

Abstract:

Nowadays, the internet of things (IOT) has attracted the attention of the researchers. As a key technology of the Internet of Things, RFID (Radio Frequency Identification) has also attracted the interest of industry and academia. One of the most important issues for the applications of the IOT based on RFID is security. In order to promote the development of IOT based on RFID, first of all, we briefly introduce the IOT system components and work process based on RFID, and then we deeply analyze the security threats in the IOT based on RFID, by the means of these analysis we discuss the current countermeasures for the security threats of RFID. Aiming at the RFID system, the corresponding technologies are raised such as Tag killing, Tag sleeping and blocker Tag; and the authentication based on HASH is the main method aiming at the communication process.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2817-2821

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dang Nguyen Duc; Hyunrok Lee; Konidala, D.M.; Kwangjo Kim Open Issues in RFID Security, in Proc. Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference, Nov. 2009, pp.1-5.

DOI: 10.1109/icitst.2009.5402510

Google Scholar

[2] Shao Xiwen, Study on Security Issue of Internet of Things based on RFID, Proc. IEEE 2012 Fourth International Conference on Computational and Information Sciences(ICCIS), IEEE Press, Aug. 2012, p.566–569, doi: 10. 1109/ICCIS. 2012. 301.

DOI: 10.1109/iccis.2012.301

Google Scholar

[3] Pateriya, R.K.; Sharma, S. The Evolution of RFID Security and Privacy: A Research Survey, in Proc. Communication Systems and Network Technologies (CSNT), June 2011, p.115 – 119, doi: 10. 1109/CSNT. 2011. 31.

DOI: 10.1109/csnt.2011.31

Google Scholar

[4] Khoo, B. , RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, in Proc. 2011 4th International Conference on Cyber, Physical and Social Computing, p.709 – 712, doi: 10. 1109/iThings/CPSCom. 2011. 83.

DOI: 10.1109/ithings/cpscom.2011.83

Google Scholar

[5] LI U Li min , X IAO De bao, LI L in , SH UI Hai hong Information Security and Its Countermeasures of RFID System of Internet of Things Sensing Layer, JOURNAL OF WUHAN UNIVERSITY OF TECHNOLOGY, Vo l. 32. No. 20. Oct. 2010, pp.79-87.

Google Scholar

[6] Serge Vaudenay , On Privacy Models for RFID, Advances in Cryptology – ASIACRYPT 2007, Lecture Notes in Computer Science Vol. 4833, pp.68-87, (2007).

DOI: 10.1007/978-3-540-76900-2_5

Google Scholar

[7] Ton van Deursen, 50 Ways to Break RFID Privacy, IFIP AICT(Advances in Information and Communication Technology) Vol. 352, p.192–205, (2011).

DOI: 10.1007/978-3-642-20769-3_16

Google Scholar

[8] Tao Yan, Qiaoyan Wen , A Secure Mobile RFID Architecture for the Internet of Things, Proc. IEEE Information Theory and Information Security (ICITIS), IEEE Press, Dec. 2010 , p.616 – 619, doi: 10. 1109/ICITIS. 2010. 5689514.

DOI: 10.1109/icitis.2010.5689514

Google Scholar

[9] Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei, RFID Technology and Its Applications in Internet of Things (IOT), in Proc. 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), April 2012, p.1282.

DOI: 10.1109/cecnet.2012.6201508

Google Scholar

[10] Juels, R. L. Rivest, and M. Szydlo, The blocker tag: Selective blocking of RFID tags for consumer privacy, in Proc. 8th ACM Conf. Comput. Commun. Security, V. Atluri, Ed., 2003, p.103–111.

DOI: 10.1145/948109.948126

Google Scholar