RFID Security Issues in IoT:A Comparative Study
The landscape of Internet of Things (IoT) has been evolving at an increasing rate over the recent years. With the ease of availability of mobile devices, there has been a tremendous leap in technology associated with it. Thus, the need for efficient intercommunication among these devices arises. To ensure that IoT is seamlessly integrated into the daily life of people using appropriate technology is essential. One of the important associated technologies with IoT is RFID. RFID proves to be a simpler and efficient technology to implement IoT at various levels. Since IoT is greatly imapcting the lives of people, one of the major concerns of IoT is the security. IoT will have millions of devices and users connected to each other.
It is important to authenticate both users and devices to prevent any breach of information. With the limitations in RFID technology, various authentication protocols have been developed to provide optimal solutions.
Keywords
- Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, ImrichChlamtac, 2012, Internet of things: Vision, applications and research challenges, Ad Hoc Networks, 10(7), pp. 1497–1516.
- Md. Mahmud Hossain, MaziarFotouhi, RagibHasan, 2015, Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things, pp. 21 – 28.
- Rolf H. Weber, 2010, Internet of Things – New security and privacy challenges, ScienceDirect, 26(1), pp. 23 – 30.
- Rodrigo Romana, JianyingZhoua, Javier Lopezb, 2013, On the features and challenges of security and privacy in distributed internet of things, ScienceDirect, Volume 57(10).
- Charith Perera, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, Albert Y. Zomaya, 2014, Big Data Privacy in the Internet of Things Era, Research Gate, 17(03), pp: 32 – 39.
- Arbia Riahi, YacineChallal, Enrico Natalizio, ZiedChtourou, AbdelmadjidBouabdallah, 2013, A Systemic Approach for IoT Security, IEEE, pp.351-355.
- Qi Jing, Athanasios V. Vasilakos, Jiafu Wan,Jingwei Lu, DechaoQiu, 2014, Security of the Internet of Things: perspectives and challenges, Wireless Networks, 20(8), pp 2481-2501.
- Jung Tae Kim. 2014, Privacy and Security Issues for Healthcare System with Embedded RFID System on Internet of Things, Advanced Science and Technology Letters, 72, pp.109-112.
- Evan Welbourne, Leilani Battle, Garret Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, and Gaetano Borriello, 2009, Building the Internet of Things Using RFID, IEEE Internet Computing, 13(3), pp. 48 - 55.
- Tuhin Borgohain, Uday Kumar, SugataSanyal, 2015, Survey of Security and Privacy Issues of Internet of Things
- Nidhi Desai, Manik Lal Das, 2015, On the Security of RFID Authentication Protocols, Electronics, Computing and Communication Technologies (CONECCT).
- Tieyan Li, Guilin Wang, 2007, Security analysis of two ultra-lightweight RFID authentication protocols, IFIP International Federation for Information Processing, 232, pp. 109 – 120.
- Sangita Mohite, GurudattKulkarni, Ramesh Sutar, 2013, RFID Security Issues, International Journal of Engineering Research & Technology (IJERT), 2, (9), pp. 746 – 748.
- Prajnamaya Dass, Hari Om, 2016, A secure authentication scheme for RFID systems, Science Direct, 78, (1), pp. 100 – 106.
- Mike Burmester, Breno de Medeiros, 2007, RFID Security: Attacks, Countermeasures and Challenges, The RFID Journal Conference.
- Tri Van Le, Mike Burmester and Breno de Medeiros, 2007, Forward-secure RFID Authentication and Key Exchange, IACR ePrint.
- Ari Juels, Stephen A. Weis, 2009, Defining strong privacy for RFID, ACM Transactions on Information and System Security (TISSEC), 13(1).
- Honorio Martín, Enrique San Millan, Pedro Peris-Lopez, Juan E. Tapiador, 2013, Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication 2014, A Lightweight Authentication Protocol for Internet of Things, Next-Generation Electronics (ISNE).
Abstract Views: 260
PDF Views: 3