2009 International Conference on Signal Acquisition and Processing 2009
DOI: 10.1109/icsap.2009.31
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model

Abstract: Abstract-Recent researches in the Radio Frequency IDentification (RFID) attempt to raise solutions for general applications within the field, these solutions often are hindered by the fact that different RFID deployments do not meet in their specifications and need. In order for these solutions to be valid and more useful; it has to be classified based on certain design requirements, and exploitation area. Our research contributes to those solutions in a novel model for a threetiered categorization of the RFID… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…However, [17] discussed the technical obstacles and security risks associated with RFID tags, for instance, those pertaining to the effect of natural factors on reliable radio transmissions and security threats such as eavesdropping and tag cloning. The work in [18] proposed a lightweight security protocol to overcome these challenges, which included the use of mutual authentication based on encrypted random numbers, use of digital certificates, automatic resetting of the original states to prevent blocking and jamming, and data encryption.…”
Section: Related Workmentioning
confidence: 99%
“…However, [17] discussed the technical obstacles and security risks associated with RFID tags, for instance, those pertaining to the effect of natural factors on reliable radio transmissions and security threats such as eavesdropping and tag cloning. The work in [18] proposed a lightweight security protocol to overcome these challenges, which included the use of mutual authentication based on encrypted random numbers, use of digital certificates, automatic resetting of the original states to prevent blocking and jamming, and data encryption.…”
Section: Related Workmentioning
confidence: 99%
“…• Jamming and Blocking: Increasing the amount of tags will basically raise the likelihood of blocking and jamming. To insert the fake tags in reading zone will be much easier and increase numbers of denial of service (DNS) [14].…”
Section: Attacks On Different Layers Of Rfid Networkmentioning
confidence: 99%
“…Unauthorized tag reading, Replay attacks, tag content, People tracking, and Tag cloning changes can be happened in relay attacks. In this research, threats as a general security problem are considered and these threat are not calculated as RFID architectural problems [14].…”
Section: Attacks On Different Layers Of Rfid Networkmentioning
confidence: 99%
“…To insert the fake tags in reading zone will be much easier and increase numbers of denial of service (DNS) [14].…”
Section: Attacks On Different Layers Of Rfid Networkmentioning
confidence: 99%
“…In this research, threats as a general security problem are considered and these threat are not calculated as RFID architectural problems [14].…”
Section:  Replay Attackmentioning
confidence: 99%