Security Challenges for User-Oriented RFID Applications within the "Internet of Things"

In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ”Internet of Things” and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating user-oriented, Internet-based application architectures. Finally, we look at the high-level security challenges that these user-oriented application architectures will need to address.

[1]  Gerhard P. Hancke,et al.  Eavesdropping Attacks on High-Frequency RFID Tokens , 2008 .

[2]  John Ayoade,et al.  Roadmap to solving security and privacy concerns in RFID systems , 2007, Comput. Law Secur. Rev..

[3]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[4]  Collin Mulliner,et al.  Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.

[5]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[6]  A. Karygicmnis,et al.  RFID Security: A Taxonomy of Risk , 2006, 2006 First International Conference on Communications and Networking in China.

[7]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[8]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[9]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Rick Huhn,et al.  Security Standards for the RFID Market , 2005, IEEE Secur. Priv..

[11]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[12]  Claudia Eckert Sicherheit in der Informationstechnik , 2002 .

[13]  George Roussos,et al.  RFID Meets the Internet , 2009, IEEE Internet Computing.

[14]  S TanenbaumAndrew,et al.  Classifying RFID attacks and defenses , 2010 .