Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Key issues of RFID reader network system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
Radio Frequency Identification is a technology that uses radio waves to automatically identify physical objects. Researchers have been rapidly developing RFID systems over the last few years, and such systems have proven benefits in many application domains. However, RFID systems also raise serious privacy and security concerns. This article offers a brief review of the main threats to RFID systems and proposes a methodology for qualitatively evaluating the risk level for various application domains. The evaluation is based on three criteria: the system's deployment range, the type of link between the RFID tag and identity-related data, and the domain's security demands. The author also presents a taxonomy of some existing RFID applications and discusses each in relation to the evaluation criteria.