The Survey of RFID Attacks and Defenses

RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. However, they also present a number of inherent vulnerabilities. This paper comprehensive analysis the potential security threats and attacks that RFID networks faces, discusses possible countermeasures,reviews the existing RFID system security mechanisms and examines the weaknesses or flaws in these protocols. Then fields where future research is needed are identified.

[1]  Zhang Fan A Universally Composable Secure RFID Communication Protocol in Supply Chains , 2008 .

[2]  Bernard Eydt,et al.  Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .

[3]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[4]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[5]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[6]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Kaan Yuksel,et al.  Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .

[8]  Bing Jiang,et al.  Some Methods for Privacy in RFID Communication , 2004, ESAS.

[9]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[10]  Y.-C. Lee,et al.  An Improvement on RFID Authentication Protocol with Privacy Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[11]  Gildas Avoine,et al.  Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.

[12]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[13]  Li Jintao,et al.  Research on Hash-Based RFID Security Authentication Protocol , 2009 .