Handbook of Applied Cryptography
Handbook of Applied Cryptography
Writing Secure Code
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Bidirectional mobile code trust management using tamper resistant hardware
Mobile Networks and Applications - Security in mobile computing environments
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Verifiable distributed oblivious transfer and mobile agent security
Mobile Networks and Applications
Memory Protection through Dynamic Access Control
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
Agri-Food Traceability Management using a RFID System with Privacy Protection
AINA '07 Proceedings of the 21st International Conference on Advanced Networking and Applications
Non-control-data attacks are realistic threats
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Analysis of Threats to the Security of EPC Networks
CNSR '08 Proceedings of the Communication Networks and Services Research Conference
Security Threats on EPC Based RFID Systems
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
RFID Security: Techniques, Protocols and System-On-Chip Design
RFID Security: Techniques, Protocols and System-On-Chip Design
Critical RFID Privacy-Enhancing Technologies
Computing in Science and Engineering
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Implementing a tamper-evident database system
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Tamper detection for ubiquitous RFID-Enabled supply chain
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A tutorial survey on vehicular ad hoc networks
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
RFID is a well-known pervasive technology, which provides promising opportunities for the implementation of new services and for the improvement of traditional ones. However, pervasive environments require strong efforts on all the aspects of information security. Notably, RFID passive tags are exposed to attacks, since strict limitations affect the security techniques for this technology. A critical threat for RFID-based information systems is represented by data tampering, which corresponds to the malicious alteration of data recorded in the tag memory. The aim of this paper is to describe the characteristics and the effects of data tampering in RFID-based information systems, and to survey the approaches proposed by the research community to protect against it. The most important recent studies on privacy and security for RFID-based systems are examined, and the protection given against tampering is evaluated. This paper provides readers with an exhaustive overview on risks and defenses against data tampering, highlighting RFID weak spots and open issues.