Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Title | Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Damghani, H., Hosseinian, H., Damghani, L. |
Conference Name | 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI) |
ISBN Number | 978-1-7281-0872-8 |
Keywords | counterfeit, data privacy, Databases, digital information, Electronic Product Code (EPC), Human Behavior, human factors, Object recognition, privacy, privacy problems, pubcrawl, Radar, radio frequency identification, Radio frequency identification (RFID), radiofrequency identification, resilience, Resiliency, RFID, RFID reader, RFID security development, RFID systems, RFID tag, RFID tags, RFID technology, RFIDs, security, security bit method, telecommunication security, wireless device |
Abstract | The RFID technology is now widely used and combined with everyday life. RFID Tag is a wireless device used to identify individuals and objects, in fact, it is a combination of the chip and antenna that sends the necessary information to an RFID Reader. On the other hand, an RFID Reader converts received radio waves into digital information and then provides facilities such as sending data to the computer and processing them. Radio frequency identification is a comprehensive processing technology that has led to a revolution in industry and medicine as an alternative to commercial barcodes. RFID Tag is used to tracking commodities and personal assets in the chain stores and even the human body and medical science. However, security and privacy problems have not yet been solved satisfactorily. There are many technical and economic challenges in this direction. In this paper, some of the latest technical research on privacy and security problems has been investigated in radio-frequency identification and security bit method, and it has been shown that in order to achieve this level of individual security, multiple technologies of RFID security development should combine with each other. These solutions should be cheap, efficient, reliable, flexible and long-term. |
URL | https://ieeexplore.ieee.org/document/8735043 |
DOI | 10.1109/KBEI.2019.8735043 |
Citation Key | damghani_investigating_2019 |
- radiofrequency identification
- wireless device
- telecommunication security
- security bit method
- security
- RFIDs
- RFID technology
- RFID tags
- RFID tag
- RFID systems
- RFID security development
- RFID reader
- RFID
- Resiliency
- resilience
- counterfeit
- Radio frequency identification (RFID)
- radio frequency identification
- Radar
- pubcrawl
- privacy problems
- privacy
- Object recognition
- Human Factors
- Human behavior
- Electronic Product Code (EPC)
- Digital Information
- Databases
- data privacy