Internet of Things and RFID Security Issues and Countermeasures Featuring the Biometric e-Passport: An Introductory Exploratory Research

[1]  Paul A. Karger,et al.  Security and Privacy Issues in Machine Readable Travel Documents (MRTDs) , 2005 .

[2]  Jochen Schiller,et al.  Location Based Services , 2004 .

[3]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[4]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[5]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[6]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[7]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[8]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.

[9]  Rajveer Kaur,et al.  Various Attacks and their Countermeasure on all Layers of RFID System , 2013 .

[10]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[11]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[12]  Balaji Srinivasan,et al.  Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics , 2012 .

[13]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[14]  Hanifa Shah,et al.  RFID Applications: An Introductory and Exploratory Study , 2010, ArXiv.

[15]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[16]  Balaji Srinivasan,et al.  Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net , 2012 .

[17]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[18]  Mahdi R. Alaghband,et al.  Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard , 2011, ArXiv.

[19]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[20]  Rob Kitchin,et al.  Software, Objects, and Home Space , 2009 .

[21]  Graham Clarke,et al.  Some socio-technical aspects of intelligent buildings and pervasive computing research , 2009 .

[22]  Huaxiong Wang,et al.  Security Analysis of Australian and E.U. E-passport Implementation , 2008, J. Res. Pract. Inf. Technol..

[23]  Huaxiong Wang,et al.  Formal Security Analysis of Australian E-passport Implementation , 2008, AISC.

[24]  David J. Warner A Call to Action: The Fourth Amendment, The Future of Radio Frequency Identification, and Society , 2007 .

[25]  Jennifer E. Smith You Can Run, But You Can't Hide: Protecting Privacy from Radio Frequency Identification Technology , 2007 .

[26]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[27]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[28]  Jean-Jacques Quisquater,et al.  ePassport: Securing International Contacts with Contactless Chips , 2008, Financial Cryptography.

[29]  Rishab Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..

[30]  Pavol Zavarsky,et al.  An analysis of security weaknesses in the evolution of RFID enabled passport , 2012, World Congress on Internet Security (WorldCIS-2012).

[31]  Aikaterini Mitrokotsa,et al.  Security Primitive Classification of RFID Attacks , 2011 .

[32]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[33]  Julio C. Hernandez-Castro,et al.  Attacking RFID Systems , 2010 .

[34]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[35]  Paweł Rotter Security and Privacy in RFID Applications , 2009 .

[36]  Jürgen Bohn Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.

[37]  Eric W. T. Ngai,et al.  Managing RFID projects in organizations , 2009, Eur. J. Inf. Syst..

[38]  Martin Drahanský,et al.  Anatomy of Biometric Passports , 2012, Journal of biomedicine & biotechnology.

[39]  Atsushi Kanai,et al.  Privacy Enhanced Active RFID Tag , 2005 .

[40]  Deborah E. Popper,et al.  Traceability: Tracking and Privacy in the Food System* , 2007 .

[41]  David A. Wagner,et al.  Privacy for RFID through trusted computing , 2005, WPES '05.

[42]  Pablo Najera,et al.  Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents , 2009, J. Univers. Comput. Sci..