Critical evaluation of RFID security protocols

Azam Zavvari, Ahmed Patel

    Research output: Contribution to journalArticle

    3 Citations (Scopus)

    Abstract

    Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.

    Original languageEnglish
    Pages (from-to)56-74
    Number of pages19
    JournalInternational Journal of Information Security and Privacy
    Volume6
    Issue number3
    DOIs
    Publication statusPublished - Jul 2012

    Fingerprint

    Radio frequency identification (RFID)
    Data communication systems
    Supply chains
    Costs
    Communication
    Industry

    Keywords

    • Cyclic Redundancy Code
    • EPCglobal Class-1 Generation-2
    • Hash Function
    • Pseudo-Random Number Generator
    • Radio Frequency Identification (RFID)

    ASJC Scopus subject areas

    • Information Systems

    Cite this

    Critical evaluation of RFID security protocols. / Zavvari, Azam; Patel, Ahmed.

    In: International Journal of Information Security and Privacy, Vol. 6, No. 3, 07.2012, p. 56-74.

    Research output: Contribution to journalArticle

    Zavvari, Azam ; Patel, Ahmed. / Critical evaluation of RFID security protocols. In: International Journal of Information Security and Privacy. 2012 ; Vol. 6, No. 3. pp. 56-74.
    @article{1bf9c60d1a1147b9902de4a08e347e17,
    title = "Critical evaluation of RFID security protocols",
    abstract = "Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.",
    keywords = "Cyclic Redundancy Code, EPCglobal Class-1 Generation-2, Hash Function, Pseudo-Random Number Generator, Radio Frequency Identification (RFID)",
    author = "Azam Zavvari and Ahmed Patel",
    year = "2012",
    month = "7",
    doi = "10.4018/jisp.2012070103",
    language = "English",
    volume = "6",
    pages = "56--74",
    journal = "International Journal of Information Security and Privacy",
    issn = "1930-1650",
    publisher = "IGI Global Publishing",
    number = "3",

    }

    TY - JOUR

    T1 - Critical evaluation of RFID security protocols

    AU - Zavvari, Azam

    AU - Patel, Ahmed

    PY - 2012/7

    Y1 - 2012/7

    N2 - Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.

    AB - Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.

    KW - Cyclic Redundancy Code

    KW - EPCglobal Class-1 Generation-2

    KW - Hash Function

    KW - Pseudo-Random Number Generator

    KW - Radio Frequency Identification (RFID)

    UR - http://www.scopus.com/inward/record.url?scp=84871872748&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84871872748&partnerID=8YFLogxK

    U2 - 10.4018/jisp.2012070103

    DO - 10.4018/jisp.2012070103

    M3 - Article

    AN - SCOPUS:84871872748

    VL - 6

    SP - 56

    EP - 74

    JO - International Journal of Information Security and Privacy

    JF - International Journal of Information Security and Privacy

    SN - 1930-1650

    IS - 3

    ER -