Theoretical analysis of RFID security protocols

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Radio Frequency Identification (RFID) is a system that transmits an entity's identity wirelessly using radio waves in the form of a unique serial number. RFID systems are broadly applied in various applications. The remarkable increase in the use of RFID technology has resulted in a number of security and privacy issues. Moreover, most previous security schemes suffer from the lack of a global standard secure communication and the time-consuming computational process of the necessary database activities. This paper focuses on the problems faced by RFDD protocols attempting to raise security and privacy. Therefore, several criteria of RFID protocols will be compared and discussed on some chosen security protocols; including conformity to the EPCglobal C1-G2 standard, ability to implement on low-cost tags, anonymity, privacy, tracking, forward security, DoS attack, and impersonation attack.

Original languageEnglish
Title of host publicationIEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management
PublisherIEEE Computer Society
Pages302-306
Number of pages5
Volume2015-January
ISBN (Electronic)9781479964109
DOIs
Publication statusPublished - 2014
Event2014 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2014 - Selangor, Malaysia
Duration: 9 Dec 201412 Dec 2014

Other

Other2014 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2014
CountryMalaysia
CitySelangor
Period9/12/1412/12/14

Fingerprint

Radio frequency identification (RFID)
Radio waves
Security protocols
Radio frequency identification
Theoretical analysis
Privacy
Costs
Attack

Keywords

  • EPCglobal Class-1 Generation-2 Standard
  • Radio Frequency Identification
  • Security and Privacy

ASJC Scopus subject areas

  • Business, Management and Accounting (miscellaneous)
  • Industrial and Manufacturing Engineering
  • Safety, Risk, Reliability and Quality

Cite this

Zavvari, A., Islam, M. T., Shakiba, M., & Jit Singh, M. S. (2014). Theoretical analysis of RFID security protocols. In IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management (Vol. 2015-January, pp. 302-306). [7058648] IEEE Computer Society. https://doi.org/10.1109/IEEM.2014.7058648

Theoretical analysis of RFID security protocols. / Zavvari, A.; Islam, Mohammad Tariqul; Shakiba, M.; Jit Singh, Mandeep Singh.

IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management. Vol. 2015-January IEEE Computer Society, 2014. p. 302-306 7058648.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zavvari, A, Islam, MT, Shakiba, M & Jit Singh, MS 2014, Theoretical analysis of RFID security protocols. in IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management. vol. 2015-January, 7058648, IEEE Computer Society, pp. 302-306, 2014 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2014, Selangor, Malaysia, 9/12/14. https://doi.org/10.1109/IEEM.2014.7058648
Zavvari A, Islam MT, Shakiba M, Jit Singh MS. Theoretical analysis of RFID security protocols. In IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management. Vol. 2015-January. IEEE Computer Society. 2014. p. 302-306. 7058648 https://doi.org/10.1109/IEEM.2014.7058648
Zavvari, A. ; Islam, Mohammad Tariqul ; Shakiba, M. ; Jit Singh, Mandeep Singh. / Theoretical analysis of RFID security protocols. IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management. Vol. 2015-January IEEE Computer Society, 2014. pp. 302-306
@inproceedings{29339e9ed7a74bfba877764bfeb4faf7,
title = "Theoretical analysis of RFID security protocols",
abstract = "Radio Frequency Identification (RFID) is a system that transmits an entity's identity wirelessly using radio waves in the form of a unique serial number. RFID systems are broadly applied in various applications. The remarkable increase in the use of RFID technology has resulted in a number of security and privacy issues. Moreover, most previous security schemes suffer from the lack of a global standard secure communication and the time-consuming computational process of the necessary database activities. This paper focuses on the problems faced by RFDD protocols attempting to raise security and privacy. Therefore, several criteria of RFID protocols will be compared and discussed on some chosen security protocols; including conformity to the EPCglobal C1-G2 standard, ability to implement on low-cost tags, anonymity, privacy, tracking, forward security, DoS attack, and impersonation attack.",
keywords = "EPCglobal Class-1 Generation-2 Standard, Radio Frequency Identification, Security and Privacy",
author = "A. Zavvari and Islam, {Mohammad Tariqul} and M. Shakiba and {Jit Singh}, {Mandeep Singh}",
year = "2014",
doi = "10.1109/IEEM.2014.7058648",
language = "English",
volume = "2015-January",
pages = "302--306",
booktitle = "IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Theoretical analysis of RFID security protocols

AU - Zavvari, A.

AU - Islam, Mohammad Tariqul

AU - Shakiba, M.

AU - Jit Singh, Mandeep Singh

PY - 2014

Y1 - 2014

N2 - Radio Frequency Identification (RFID) is a system that transmits an entity's identity wirelessly using radio waves in the form of a unique serial number. RFID systems are broadly applied in various applications. The remarkable increase in the use of RFID technology has resulted in a number of security and privacy issues. Moreover, most previous security schemes suffer from the lack of a global standard secure communication and the time-consuming computational process of the necessary database activities. This paper focuses on the problems faced by RFDD protocols attempting to raise security and privacy. Therefore, several criteria of RFID protocols will be compared and discussed on some chosen security protocols; including conformity to the EPCglobal C1-G2 standard, ability to implement on low-cost tags, anonymity, privacy, tracking, forward security, DoS attack, and impersonation attack.

AB - Radio Frequency Identification (RFID) is a system that transmits an entity's identity wirelessly using radio waves in the form of a unique serial number. RFID systems are broadly applied in various applications. The remarkable increase in the use of RFID technology has resulted in a number of security and privacy issues. Moreover, most previous security schemes suffer from the lack of a global standard secure communication and the time-consuming computational process of the necessary database activities. This paper focuses on the problems faced by RFDD protocols attempting to raise security and privacy. Therefore, several criteria of RFID protocols will be compared and discussed on some chosen security protocols; including conformity to the EPCglobal C1-G2 standard, ability to implement on low-cost tags, anonymity, privacy, tracking, forward security, DoS attack, and impersonation attack.

KW - EPCglobal Class-1 Generation-2 Standard

KW - Radio Frequency Identification

KW - Security and Privacy

UR - http://www.scopus.com/inward/record.url?scp=84988215538&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84988215538&partnerID=8YFLogxK

U2 - 10.1109/IEEM.2014.7058648

DO - 10.1109/IEEM.2014.7058648

M3 - Conference contribution

VL - 2015-January

SP - 302

EP - 306

BT - IEEM 2014 - 2014 IEEE International Conference on Industrial Engineering and Engineering Management

PB - IEEE Computer Society

ER -