Quantifying cryptographic techniques in radio frequency identification protocols and ways of remedying the security threats

  • Authors:
  • Cristina Hurjui;Stefan Holban;Adrian Graur

  • Affiliations:
  • Department of Computers and Automation, Department of Computers, 'Stefan cel Mare' University of Suceava, 'Politehnica' University of Timisoara, Timisoara, Romania;Department of Computers and Automation, Department of Computers, 'Stefan cel Mare' University of Suceava, 'Politehnica' University of Timisoara, Timisoara, Romania;Department of Computers and Automation, Department of Computers, 'Stefan cel Mare' University of Suceava, 'Politehnica' University of Timisoara, Timisoara, Romania

  • Venue:
  • WSEAS TRANSACTIONS on COMMUNICATIONS
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Critical examinations concerning the Radio Frequency Identification security and privacy have determined wide analysis over the time. RFID applications have always assumed two important hierarchies: structures aiming to offer security to RFID systems and structures aiming to offer functionality, with no security issues. A way of creating radio frequency identification systems more secure relies on cryptography. Nine RFID protocols of identification and authentication are examined in this paper, so as to analyze the strong points and to find solutions for the weak or jeopardizing points that threaten the security and privacy of RFID systems. By reaching the best security and privacy solutions, using of RFID systems will bring visibility within developing business strategies or logistics processes, in thoroughly transparency. In many situations, the threatening over RFID structures is the result of designing weak protocols. Presumable attacks on RFID structures are evaluated; important ways of comparison and analysis amongst nine existing protocols are outlined. At the end of each description, solutions of treating the weak points are emphasized.