Security of RFID Based Internet of Things Applications: Requirements and Open Issues

被引:0
作者
Chamekh, Marwa [1 ]
Hamdi, Mohamed [2 ]
El Asmi, Sadok [1 ]
Kim, Tai-Hoon [3 ]
机构
[1] Univ Carthage, SUPCOM, COSIM Res Lab, Tunis, Tunisia
[2] Univ Carthage, SUPCOM, Tunis, Tunisia
[3] Univ Tasmania, Sch Informat Sci, Hobart, Tas, Australia
来源
2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD) | 2018年
关键词
RFID; Internet of things; Security; Privacy; MUTUAL-AUTHENTICATION PROTOCOL; CRYPTANALYSIS; PRIVACY; DEVICES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is the concept of forming an autonomous network using everyday objects to create real-life services. This gave rise to several new applications used in logistics, home automation, e-health and so forth. However, this type of applications requires a high level of privacy and security. Radio Frequency Identification (RFID) system presents one of the most promising enabler of IoT applications. This paper presents a set of security requirements for RFID based IoT applications. It then introduces a critical analysis of existing work and the ability of various proposals to protect the security of these applications in a RFID deployment. This critical review represents a roadmap for our project which aims to provide a security solution for RFID networks.
引用
收藏
页码:699 / 703
页数:5
相关论文
共 35 条
[1]  
Aguilar-Angulo J., 2012, P 2012 IEEE FAIBL TE, P1
[2]  
[Anonymous], 2013, TECHNICAL REPORT
[3]  
[Anonymous], 2010, CRYPTOL INF SECUR SE, DOI DOI 10.3233/978-1-60750-485-6-49
[4]  
Avoine Gildas, 2013, Radio Frequency Identification. Security and Privacy Issues. 8th International Workshop, RFIDSec 2012. Revised Selected Papers, P20, DOI 10.1007/978-3-642-36140-1_2
[5]  
Beaulieu R., 2012, TECH REP
[6]  
Burmester Mike., 2008, ASIACCS 08, P283
[7]   Development and Application of a Chinese Webpage Suicide Information Mining System (Sims) [J].
Chen, Penglai ;
Chai, Jing ;
Zhang, Lu ;
Wang, Debin .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
[8]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[9]   Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol [J].
Cho, Jung-Sik ;
Jeong, Young-Sik ;
Park, Sang Oh .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2015, 69 (01) :58-65
[10]  
Dinur I, 2011, LECT NOTES COMPUT SC, V7073, P327, DOI 10.1007/978-3-642-25385-0_18