JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Survey of RFID Deployment and Security Issues
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Survey of RFID Deployment and Security Issues
Grover, Amit; Berghel, Hal;
  PDF(new window)
 Abstract
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.
 Keywords
RFID;RFID Standards;RFID Protocols;RFID Security;EPC structure;RFID Applications;RFID Classification;
 Language
English
 Cited by
1.
Reliability and security of arbiter-based physical unclonable function circuits, International Journal of Communication Systems, 2013, 26, 6, 757  crossref(new windwow)
2.
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing, International Journal of Distributed Sensor Networks, 2014, 2014, 1  crossref(new windwow)
3.
Modeling RFID readers deployment in three-dimensional space, International Journal of RF Technologies, 2016, 7, 2-3, 131  crossref(new windwow)
4.
Building a Smooth Medical Service for Operating Room Using RFID Technologies, Journal of Applied Mathematics, 2014, 2014, 1  crossref(new windwow)
5.
“Solutions for RFID Smart Tagged Card Security Vulnerabilities”, AASRI Procedia, 2013, 4, 282  crossref(new windwow)
 References
1.
Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.4.

2.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.37.

3.
Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.5.

4.
Newitz, Annalee, "The RFID Hacking Underground", Wired Magazine, http://www.wired.com/wired/archive/14.05/rfid_pr.html

5.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.99.

6.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.12.

7.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.89.

8.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.73.

9.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.69.

10.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.91.

11.
http://www.rfid.averydennison.com/products.php#2

12.
Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.13-20.

13.
Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.

14.
"A Summary of RFID Standards", http://www.rfidjournal.com/article/view/1335/2

15.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.81.

16.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.112.

17.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.25,132

18.
RFID: The Next Generation Auto-ID Technology, http://www.mwjournal.com/Journal/RFID_Next_Generation_Auto_ID_Technology/AR_7232/

19.
Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.

20.
Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.100.

21.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.297-363.

22.
"Are RFID Chips a Personal Security Risk?", http://www.smartertravel.com/travel-advice/are-rfidchips-personal-security-risk.html?id=2672576

23.
http://www.spychips.com/index.html

24.
Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.63.

25.
http://barcodereader.systemid.com/index.php/2010/09/24/wal-mart-uses-rfid-to-track-underwear/

26.
http://cq.cx/verichip.pl

27.
http://www.engadget.com/2008/03/19/rfid-credit-cards-easily-hacked-with-8-reader/

28.
http://www.youtube.com/watch?v=vmajlKJlT3U

29.
http://www.youtube.com/watch?v=NW3RGbQTLhE

30.
http://www.computerworld.com/s/article/9069558/How_they_hacked_it_The_MiFare_RFID_crack_explained

31.
RFID: Cloning vs. Spoofing, Bert Moore, http://www.aimglobal.org/members/news/templates/template.aspx?articleid=1564&zoneid=24

32.
http://www.thingmagic.com/rfid-security-issues

33.
http://www.rfidvirus.org/

34.
http://www.idstronghold.com/Secure-Sleeves-for-ID-Payment-Cards-IDSH1003-001-/productinfo/IDSH1003-001/

35.
http://www.pacsafe.com/www/index.php?_room=3&_action=detail&id=150

36.
http://www.vagabondish.com/flipside-rfid-protected-wallet/

37.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.276.

38.
Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.297.

39.
http://www.gizmag.com/go/5865/

40.
Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.279

41.
Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.343.

42.
Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.342.

43.
Kyuhee An, Kiyeal Lee, and Mokdong Chung, "Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos", International Journal of Information Processing Systems, Vol.2, No.3, December, 2006. crossref(new window)

44.
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, "Security Framework for RFID-based Applications in Smart Home Environment", Journal of Information Processing Systems, Vol.7, No.1, March, 2011. crossref(new window)

45.
Dae-Hee Seo and Im-Yeong Lee, "A Study on RFID System with Secure Service Availability for Ubiquitous Computing", International Journal of Information Processing Systems, Vol.1, No.1, 2005. crossref(new window)