A SIMULATION STUDY COMPARING THE RECITAL OF RFID PROTOCOLS

Divya C.1*
1School of Information Technology and Science, Dr G R Damodaran College of Science, Coimbatore–641014
* Corresponding Author : mercy_twin@yahoo.com

Received : -     Accepted : -     Published : 15-12-2011
Volume : 1     Issue : 1       Pages : 6 - 8
Bioinfo Comput Optim 1.1 (2011):6-8

Cite - MLA : Divya C. "A SIMULATION STUDY COMPARING THE RECITAL OF RFID PROTOCOLS." BIOINFO Computational Optimization 1.1 (2011):6-8.

Cite - APA : Divya C. (2011). A SIMULATION STUDY COMPARING THE RECITAL OF RFID PROTOCOLS. BIOINFO Computational Optimization, 1 (1), 6-8.

Cite - Chicago : Divya C. "A SIMULATION STUDY COMPARING THE RECITAL OF RFID PROTOCOLS." BIOINFO Computational Optimization 1, no. 1 (2011):6-8.

Copyright : © 2011, Divya C., Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

RFID is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or “smart” applications for users. On the other hand, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. Radio frequency identification (RFID) systems aim to identify tags to readers in an open environment where neither visual nor physical contact is needed for communication. With the increased popularity of RFID applications, various authentication protocols have been proposed to provide security and privacy for RFID tags. In this paper we present a comprehensive survey of various authentication protocols in three perspectives, namely data protection, tracking protection, and forward security.

References

[1] Sarma, S.E., D. Brock and D.W. Engels, “Radio frequency identification and the electronic product code”, IEEE Micro 21 (2001).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Hoepman, J.H., E. Hubbers, B. Jacobs, M. Oostdijk and R. Wichers Schreur, Crossing borders:”Security and privacy issues of the european e-passport” in: H. Yoshiura, K. Sakurai, K. Rannenberg,Y. Murayama and S.-i. Kawamura, editors, Advances in Information and Computer Security, First International  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Kulyukin, V., A. Kutiyanawala, E. LoPresti, J. Matthews and R. Simpson, iWalker: “Toward a rollator-mounted wayfinding system for the elderly” in: Proceedings of the 2008 IEEE International Conference on RFID, 2008  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] P.P. Lopez, J.C.H .Castro , J.M.E Tapiador and A.Ribagorda, “ RFID Systems: A Survey on Security Threats and Proposed Solutions”, IFIP 2006 , PWC 2006  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Li, Z., C.H. Chu and W. Yao, SIP-RLTS: “An RFID location tracking system based on SIP”, in: Proceedings of the 2008 IEEE International Conference on RFID, 2008.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] A.Juels “Minimalist Cryptography for Low cost RFID Tags”, SCN, 2004  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] A.Juels and R.Pappu ,”Squealing euros: Privacy Protection in RFID Enabled Banknotes”, In Proceeding of Financial Cryptography ,Springer Verlag, 2003  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] A.Juels and R.L .Rivest and M.Szydlo,”The blocker tag: Selective blocking of RFID tags for consumer Privacy” ,ACM Press,2003  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] C.C Tan, B.Sheng and Q,Li, “ Serverless Search and Authentication protocols for RFID “, in Proceedings of Pervasive Computing Conference ,2006.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus