Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
Attribute Decoration of Attack-Defense Trees
International Journal of Secure Software Engineering
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
Radio frequency identification (RFID) uses electronic tags to produce information about entities in the real world. Security is important when the information is used to make decisions about high-value entities such as pharmaceuticals. The authors present a taxonomy of attacker behavior to show how attacks can be sequenced to invalidate the informational goals of RFID systems. The taxonomy can be used to understand the security requirements of RFID systems.