Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol

The limitless possibilities and low cost are the reasons Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at the same time. And in such and numerous more situations presented RFID is prone to security threat as well, which is the main focus of this paper. This paper presents an anti-collision protocol existing, sited vulnerabilities and suggested general security solutions.

[1]  Cheng-Hao Quan,et al.  The Slotted-LBT: A RFID Reader Medium Access Scheme in Dense Reader Environments , 2008, 2008 IEEE International Conference on RFID.

[2]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[3]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[4]  Yanghee Choi,et al.  SARIF: A novel framework for integrating wireless sensor and RFID networks , 2007, IEEE Wireless Communications.

[5]  Alex Biryukov,et al.  Recent attacks on alleged SecurID and their practical implications , 2005, Comput. Secur..

[6]  D C Robbins,et al.  A bill of rights. , 1989, Diabetes care.

[7]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[8]  Xiao Fan,et al.  Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment , 2008, KSII Trans. Internet Inf. Syst..

[9]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[10]  Daniel W. Engels,et al.  Colorwave: a MAC for RFID reader networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[11]  R. Bansal,et al.  Antenna theory; analysis and design , 1984, Proceedings of the IEEE.

[12]  Dong Hoon Lee,et al.  Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.

[13]  S. Iyer,et al.  Mitigating the reader collision problem in RFID networks with mobile readers , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[14]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[15]  Junius K. Ho,et al.  Solving the reader collision problem with a hierarchical Q-learning algorithm , 2003 .

[16]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[17]  Ari Juels,et al.  Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.

[18]  Joongheon Kim,et al.  Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems , 2007, IEEE Communications Letters.

[19]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[20]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[21]  P. Nikitin,et al.  Antenna design for UHF RFID tags: a review and a practical application , 2005, IEEE Transactions on Antennas and Propagation.

[22]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[23]  Lei Zhang,et al.  Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.