[go: up one dir, main page]

Wu, 2021 - Google Patents

RFID System Security

Wu, 2021

Document ID
15337045158377738735
Author
Wu C
Publication year
Publication venue
Internet of Things Security: Architectures and Security Measures

External Links

Snippet

This chapter introduces some typical security threats in RFID systems, including RFID tag cloning, RFID tag tracking, and relay attacks. Tag cloning may cause spoofing attacks, tag tracing violates the location privacy of the thing/person that the traced tag is attached to, and …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Yang et al. Mutual authentication protocol for low-cost RFID
Juels RFID security and privacy: A research survey
CN101111853B (en) Device, method and system of control of data exchange
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
Khattab et al. Rfid security
Hoque et al. Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
Piramuthu Lightweight cryptographic authentication in passive RFID-tagged systems
David et al. Providing strong security and high privacy in low-cost RFID networks
Rong et al. RFID security
Gope et al. QR-PUF: Design and implementation of a RFID-based secure inpatient management system using XOR-arbiter-PUF and QR-code
Kim et al. MARP: Mobile agent for RFID privacy protection
Wu RFID System Security
Kardaş et al. Providing resistance against server information leakage in RFID systems
Song RFID authentication protocols using symmetric cryptography
Chowdhury et al. A secured mutual authentication protocol for RFID system
Yin et al. Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G
Wang et al. PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards
Shemaili et al. Smart RFID Security, Privacy and Authentication
Chien The study of RFID authentication protocols and security of some popular RFID tags
Ranasinghe et al. A low cost solution to authentication in passive RFID systems
KR100994861B1 (en) RFID tag, RF back end system and RF authentication method
KR100618316B1 (en) RFID authentication system and method
Syamsuddin State of the art on secure and low cost RFID authentication protocols for RFID based vehicle license plate