Software quality engineering: a total technical and management approach
Software quality engineering: a total technical and management approach
A distributed monitoring mechanism for wireless sensor networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems
IEEE Transactions on Knowledge and Data Engineering
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Dependability through Assured Reconfiguration in Embedded System Software
IEEE Transactions on Dependable and Secure Computing
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Remote Password Extraction from RFID Tags
IEEE Transactions on Computers
IEEE Transactions on Dependable and Secure Computing
Elliptic-Curve-Based Security Processor for RFID
IEEE Transactions on Computers
Security of an RFID Protocol for Supply Chains
ICEBE '08 Proceedings of the 2008 IEEE International Conference on e-Business Engineering
Security Analysis of the SASI Protocol
IEEE Transactions on Dependable and Secure Computing
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI
IEEE Transactions on Dependable and Secure Computing
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
PUF-HB: a tamper-resilient HB based authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Secure and private search protocols for RFID systems
Information Systems Frontiers
On the Security of Chien's Ultralightweight RFID Authentication Protocol
IEEE Transactions on Dependable and Secure Computing
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags andmobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.