2014
DOI: 10.1007/978-3-319-09885-2_17
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks

Abstract: Abstract. RFID systems are composed by tags (also known as electronic labels) storing an identification sequence which can be wirelessly retrieved by an interrogator, and transmitted to the network through middleware and database information systems. In the case of the EPC Gen2 technology, RFID tags are not provided with on-board batteries. They are passively powered through the radio frequency waves of the interrogators. Tags are also assumed to be of low-cost nature, meaning that they shall be available at a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Passive tags are small, cheap, and ultra-low power consumption, these features making them suitable for massive deployment environments and hard to reach use cases. However, this technology suffers from a low communication range (10 m) [ 107 ].…”
Section: Iot Technologies and Energy Modelsmentioning
confidence: 99%
“…Passive tags are small, cheap, and ultra-low power consumption, these features making them suitable for massive deployment environments and hard to reach use cases. However, this technology suffers from a low communication range (10 m) [ 107 ].…”
Section: Iot Technologies and Energy Modelsmentioning
confidence: 99%
“…On the other hand, there are still latent problems in the EPCglobal Network architecture that must be solved to reach a proper functioning: global network synchronization, scalability, security access to the EPC-IS and ONS, and so on. There are some outstanding works in the scientific literature that attempt to minimize and address these problems [46][47][48][49][50]. …”
Section: Radio Frequency Identificationmentioning
confidence: 99%
“…This entails that both parties have to manage certificates of authorization for accessing to the EPC-IS, ONS, among others. In addition, for the reader-to-tag communications, a data encryption algorithm must be used and shared by the parties, suppliers, and supermarket [50][51][52].…”
Section: Guide Of Good Practices For Implementing An Rfid-uhf System mentioning
confidence: 99%
See 1 more Smart Citation
“…Data Encryption and tag authentication can minimize this attack[14]. A VLFSR function for lightweight encryption security which provides resistance against various attacks on RFID is proposed in[15] MITM attacks are also known as Relay attacks which are occurred during data transmission. Kfir and Wool give names to two communicating devices; these names are Leech and Ghost.…”
mentioning
confidence: 99%