Security challenges for RFID key applications
نویسندگان
چکیده
RFID technology is an emerging market with a wide spectrum of application domains. The introduction of RFID systems in industrial manufacturing has already been taken up more than ten years ago. Currently RFID tags are appearing in public environments like ticketing applications and retail supply chains. One the one hand mass applications will imply a break-through for RFID technologies, on the other hand new security issues have to be addressed in order to obtain an add-on benefit compared to classical barcode applications. In this contribution we address RFID security issues in general and related to selected application scenarios. At first we introduce basic RFID security requirements. Subsequently application oriented security measures are discussed for three application scenarios: automotive production, retail supply chains and anti-counterfeiting for pharmaceutical products. Finally challenges and perspectives for future improvements of security measures in RFID systems and privacy issues will be outlined. 1 Security of RFID systems The consideration of RFID system security can be addressed on different levels: the field of security for middleware and databases has been generally addressed in information technologies and internet based systems during the recent decade. Therefore in this contribution we focus on the RFID tag to interrogator interface and its wireless information transmission. Basic principles for attacking such RFID frontend systems are among others:
منابع مشابه
User-aided reader revocation in PKI-based RFID systems
Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checkin...
متن کاملForward-secure RFID Authentication and Key Exchange
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This work describes two families of simple, inexpensive, and untraceable identification protocols for RFID tags. The proposed protocols involve minimal interaction between a tag and a re...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کامل