Wu, 2021 - Google Patents
RFID System SecurityWu, 2021
- Document ID
- 15337045158377738735
- Author
- Wu C
- Publication year
- Publication venue
- Internet of Things Security: Architectures and Security Measures
External Links
Snippet
This chapter introduces some typical security threats in RFID systems, including RFID tag cloning, RFID tag tracking, and relay attacks. Tag cloning may cause spoofing attacks, tag tracing violates the location privacy of the thing/person that the traced tag is attached to, and …
- 238000010367 cloning 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Yang et al. | Mutual authentication protocol for low-cost RFID | |
Juels | RFID security and privacy: A research survey | |
CN101111853B (en) | Device, method and system of control of data exchange | |
Toiruul et al. | An advanced mutual-authentication algorithm using AES for RFID systems | |
Khattab et al. | Rfid security | |
Hoque et al. | Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Piramuthu | Lightweight cryptographic authentication in passive RFID-tagged systems | |
David et al. | Providing strong security and high privacy in low-cost RFID networks | |
Rong et al. | RFID security | |
Gope et al. | QR-PUF: Design and implementation of a RFID-based secure inpatient management system using XOR-arbiter-PUF and QR-code | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Wu | RFID System Security | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Song | RFID authentication protocols using symmetric cryptography | |
Chowdhury et al. | A secured mutual authentication protocol for RFID system | |
Yin et al. | Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G | |
Wang et al. | PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards | |
Shemaili et al. | Smart RFID Security, Privacy and Authentication | |
Chien | The study of RFID authentication protocols and security of some popular RFID tags | |
Ranasinghe et al. | A low cost solution to authentication in passive RFID systems | |
KR100994861B1 (en) | RFID tag, RF back end system and RF authentication method | |
KR100618316B1 (en) | RFID authentication system and method | |
Syamsuddin | State of the art on secure and low cost RFID authentication protocols for RFID based vehicle license plate |