Divya C.1*
1School of Information Technology and Science, Dr G R Damodaran College of Science, Coimbatore–641014
* Corresponding Author : mercy_twin@yahoo.com
Received : - Accepted : - Published : 15-12-2011
Volume : 1 Issue : 1 Pages : 6 - 8
Bioinfo Comput Optim 1.1 (2011):6-8
RFID is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or “smart†applications for users. On the other hand, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. Radio frequency identification (RFID) systems aim to identify tags to readers in an open environment where neither visual nor physical contact is needed for communication. With the increased popularity of RFID applications, various authentication protocols have been proposed to provide security and privacy for RFID tags. In this paper we present a comprehensive survey of various authentication protocols in three perspectives, namely data protection, tracking protection, and forward security.
[1] Sarma, S.E., D. Brock and D.W. Engels, “Radio frequency
identification and the electronic product code”, IEEE Micro 21
(2001).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] Hoepman, J.H., E. Hubbers, B. Jacobs, M. Oostdijk and R.
Wichers Schreur, Crossing borders:”Security and privacy issues
of the european e-passport” in: H. Yoshiura, K. Sakurai, K.
Rannenberg,Y. Murayama and S.-i. Kawamura, editors,
Advances in Information and Computer Security, First
International
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] Kulyukin, V., A. Kutiyanawala, E. LoPresti, J. Matthews and R.
Simpson, iWalker: “Toward a rollator-mounted wayfinding
system for the elderly” in: Proceedings of the 2008 IEEE
International Conference on RFID, 2008
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] P.P. Lopez, J.C.H .Castro , J.M.E Tapiador and A.Ribagorda, “
RFID Systems: A Survey on Security Threats and Proposed
Solutions”, IFIP 2006 , PWC 2006
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] Li, Z., C.H. Chu and W. Yao, SIP-RLTS: “An RFID location
tracking system based on SIP”, in: Proceedings of the 2008
IEEE International Conference on RFID, 2008.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] A.Juels “Minimalist Cryptography for Low cost RFID Tags”,
SCN, 2004
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[7] A.Juels and R.Pappu ,”Squealing euros: Privacy Protection in
RFID Enabled Banknotes”, In Proceeding of Financial
Cryptography ,Springer Verlag, 2003
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[8] A.Juels and R.L .Rivest and M.Szydlo,”The blocker tag:
Selective blocking of RFID tags for consumer Privacy” ,ACM
Press,2003
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[9] C.C Tan, B.Sheng and Q,Li, “ Serverless Search and
Authentication protocols for RFID “, in Proceedings of
Pervasive Computing Conference ,2006.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus