Security on RFID technology

RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have brought costs down and standards are being developed. Actually, RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper presents some research done on RFID, the RFID applications and RFID data security.

[1]  H. Klauk,et al.  Fast organic thin-film transistor circuits , 1999, IEEE Electron Device Letters.

[2]  Alfred R. Koelle,et al.  Short-range radio-telemetry for electronic identification, using modulated RF backscatter , 1975 .

[3]  Wiem Tounsi,et al.  Security and Privacy Controls in RFID Systems: Applied to EPCglobal Networks , 2014 .

[4]  Nora Cuppens-Boulahia,et al.  KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems , 2014, J. Netw. Comput. Appl..

[5]  A. Laurie RFID: Practical attacks against RFID , 2007 .

[6]  Nandita Srivastava,et al.  RFID Introduction, Present and Future applications and Security Implications , 2006 .

[7]  F. Aghdasi,et al.  Research trends in RFID technology , 2007 .

[8]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[9]  H. Stockman,et al.  Communication by Means of Reflected Power , 1948, Proceedings of the IRE.

[10]  Herve Aubert,et al.  RFID technology for human implant devices , 2011 .

[11]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[12]  L. Reindl,et al.  Wireless measurement of temperature using surface acoustic waves sensors , 2004, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.

[13]  Vivek Subramanian,et al.  Progress Toward Development of All-Printed RFID Tags: Materials, Processes, and Devices , 2005, Proceedings of the IEEE.

[14]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.