Unknown

Dataset Information

0

Comparison and Feasibility of Various RFID Authentication Methods Using ECC.


ABSTRACT: Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag's information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.

SUBMITTER: Alexander P 

PROVIDER: S-EPMC6164036 | biostudies-other | 2018 Sep

REPOSITORIES: biostudies-other

altmetric image

Publications

Comparison and Feasibility of Various RFID Authentication Methods Using ECC.

Alexander Pagán P   Baashirah Rania R   Abuzneid Abdelshakour A  

Sensors (Basel, Switzerland) 20180901 9


Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and priv  ...[more]

Similar Datasets

| S-EPMC7506697 | biostudies-literature
| S-EPMC4052535 | biostudies-other
| S-EPMC4603319 | biostudies-other
| S-EPMC9813357 | biostudies-literature
| S-EPMC9396839 | biostudies-literature
| S-EPMC3213166 | biostudies-literature
| S-EPMC6803991 | biostudies-literature
| S-EPMC11349200 | biostudies-literature
| S-EPMC7187336 | biostudies-literature
| S-EPMC8196109 | biostudies-literature