Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications

被引:7
作者
Abdulghani, Hezam Akram [1 ]
Nijdam, Niels Alexander [1 ]
Konstantas, Dimitri [1 ]
机构
[1] Univ Geneva, Geneva Sch Econ & Management, CH-1211 Geneva, Switzerland
基金
欧盟地平线“2020”; 英国科研创新办公室;
关键词
Internet of Things; RFID; security guidelines; privacy guidelines; countermeasures; security goals; privacy and security by design; attacks; MUTUAL-AUTHENTICATION PROTOCOL; ULTRA-LIGHTWEIGHT; INTERNET; TECHNOLOGIES; ATTACKS; DESIGN; IMPLEMENTATION; IDENTIFICATION; CRYPTOGRAPHY; SYSTEMS;
D O I
10.1109/ACCESS.2022.3227449
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency Identification (RFID), which can be used to track single or multiple objects. This technology has been widely used in healthcare, supply chain, logistics, and asset tracking. However, such applications require a high level of security and privacy and are unfortunately vulnerable to various attacks and threats that need to be addressed in order for RFID-based IoT applications to reach their full potential. To this end, we propose a set of security and privacy guidelines for RFID, supported by modelling guidelines, mitigations, and the attack vectors cohesively. We compare to the state of the art and point out their shortcomings on known guidelines and reason to address these in our model. The overall methodology is as follows: (i) identify the security and privacy guideline features, (ii) highlight the security goals for RFID-based IoT applications, (iii) analyze the features in relation to RFID industrial standards, and relate them to security goals, (iv) summarize attacks and threats against RFID applications and correlate them with violated security goals, (v) derive a set of security and privacy guidelines for RFID applications in accordance with security and privacy by design frameworks. We also describe our derived guidelines in connection with the involved stakeholders, and (vi) outline the existing mitigation strategies to implement our proposed guidelines. Finally, we describe the main limitations of our work that should be investigated in the future and identify the multiple challenges that concern current security strategies.
引用
收藏
页码:131528 / 131554
页数:27
相关论文
共 207 条
[1]   A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective [J].
Abdul-Ghani, Hezam Akram ;
Konstantas, Dimitri .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
[2]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[3]  
Abdulghani H. A., 2019, SYMMETRY, V11, P1
[4]  
Abdulkader O, 2018, 2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), P102, DOI 10.1109/LT.2018.8368492
[5]  
Agarwal Y., 2016, PROC 5 INT C INTERNE, P464
[6]  
Aggarwal R., 2012, P 1 INT C SEC INT TH, P51, DOI 10.1145/2490428.2490435
[7]  
Aguirre J. I., 2007, THESIS BROWN U PROVI
[8]   Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols [J].
Ahmadian, Zahra ;
Salmasizadeh, Mahmoud ;
Aref, Mohammad Reza .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) :1140-1151
[9]  
Ahsan K, 2011, Deploying RFIDChallenges, Solutions, and Open Issues
[10]  
Aigner M., 2008, REPORT 1 PART SECURI