Design of an UHF RFID transponder for secure authentication
Proceedings of the 17th ACM Great Lakes symposium on VLSI
A distributed architecture for scalable private RFID tag identification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
The future of radio frequency identification
Journal of Theoretical and Applied Electronic Commerce Research
High-performance public-key cryptoprocessor for wireless mobile applications
Mobile Networks and Applications
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
SixthSense: RFID-based Enterprise Intelligence
Proceedings of the 6th international conference on Mobile systems, applications, and services
Supporting a mobile lost and found community
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML
Computational Intelligence and Security
RFID System Security Using Identity-Based Cryptography
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Proceedings of the 15th ACM conference on Computer and communications security
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Scalable privacy protecting scheme through distributed RFID tag identification
Proceedings of the workshop on Applications of private and anonymous communications
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Efficient Authentication Protocol for Low-Cost RFID Systems
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Revisiting Bluetooth Security (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
SS'08 Proceedings of the 17th conference on Security symposium
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
Information Systems Frontiers
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Security challenges of the EPCglobal network
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
iScope: personalized multi-modality image search for mobile devices
Proceedings of the 7th international conference on Mobile systems, applications, and services
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
A Highly Scalable RFID Authentication Protocol
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
Securing wireless implantable devices for healthcare: ideas and challenges
IEEE Communications Magazine
PlaceSense: a tool for sensing communities
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
A server centric authentication protocol for a RFID system
CASE'09 Proceedings of the fifth annual IEEE international conference on Automation science and engineering
Towards lightweight secure communication protocols for passive RFIDs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
The design of an RFID security protocol for saving in DB transaction costs
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Design and implementation of RFID mutual authentication protocol
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A secure and efficient authentication protocol for passive RFID tags
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
Key issues of RFID reader network system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
Secure communication for RFIDs proactive information security within computational security
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Using RFID tags to improve pilgrimage management
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
A RFID architecture framework for global supply chain applications
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Secure RFID authentication with efficient key-lookup
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secret-sharing based secure communication protocols for passive RFIDs
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Java based software framework and its integration in mobile phones using RFID technologies
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Securing RDS broadcast messages for smart grid applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations
IEEE Transactions on Information Theory
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Achieving high security and efficiency in RFID-tagged supply chains
International Journal of Applied Cryptography
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
RFID usage issues in the supply chain
WTS'10 Proceedings of the 9th conference on Wireless telecommunications symposium
MAMECTIS'10 Proceedings of the 12th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
IEEE Transactions on Information Technology in Biomedicine
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Wireless Personal Communications: An International Journal
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Assessing the potential of ubiquitous computing for improving business process performance
Information Systems and e-Business Management
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A desynchronization tolerant RFID private authentication protocol
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
An algorithm for constructing a fastest Galois NLFSR generating a given sequence
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Secure and private search protocols for RFID systems
Information Systems Frontiers
Ubiquitous RFID: Where are we?
Information Systems Frontiers
Revisiting unpredictability-based RFID privacy models
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
On RFID privacy with mutual authentication and tag corruption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A low-power RFID integrated circuits for intelligent healthcare systems
IEEE Transactions on Information Technology in Biomedicine
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Anonymous authentication for RFID systems
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Towards a practical solution to the RFID desynchronization problem
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Defending RFID authentication protocols against DoS attacks
Computer Communications
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Performance comparison of the authentication protocols in RFID system
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
Full-custom VLSI design of a unified multiplier for elliptic curve cryptography on RFID tags
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
System accuracy estimation of SRAM-based device authentication
Proceedings of the 16th Asia and South Pacific Design Automation Conference
RFID- from Tracking to the Internet of Things: A Review of Developments
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Journal of Network and Computer Applications
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Journal of Network and Computer Applications
Journal of Network and Computer Applications
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Impossibility results for RFID privacy notions
Transactions on computational science XI
Security analysis and complexity comparison of some recent lightweight RFID protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Recyclable PUFs: logically reconfigurable PUFs
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
A formal approach to distance-bounding RFID protocols
ISC'11 Proceedings of the 14th international conference on Information security
Securing RDS broadcast messages for smart grid applications
International Journal of Autonomous and Adaptive Communications Systems
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
Lightweight RFID mutual authentication protocol against feasible problems
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A robust and secure RFID-based pedigree system (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Vulnerability of an RFID authentication protocol proposed in at secubiq 2005
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Synthesis of parallel binary machines
Proceedings of the International Conference on Computer-Aided Design
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
EMAP: An efficient mutual authentication protocol for passive RFID tags
International Journal of Automation and Computing
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Optimal key-trees for tree-based private authentication
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Enabling secure secret updating for unidirectional key distribution in RFID-Enabled supply chains
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Lightweight authentication for RFID used in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Passive attack on RFID LMAP++ authentication protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Fast cloned-tag identification protocols for large-scale RFID systems
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
An extensible system for enhancing social conference experience
PSI'11 Proceedings of the 8th international conference on Perspectives of System Informatics
Probing, mocking and prototyping: participatory approaches to identity infrastructuring
Proceedings of the 12th Participatory Design Conference: Research Papers - Volume 1
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
State of the art of smart homes
Engineering Applications of Artificial Intelligence
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Journal of Network and Computer Applications
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
Information confinement, privacy, and security in RFID systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A synchronization strengthen RFID authentication protocol based on key array
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Information systems for enhancing social experience in a conference context: A sensor based approach
Programming and Computing Software
A near field communication-driven home automation framework
Personal and Ubiquitous Computing
A privacy-preserving path-checking solution for RFID-Based supply chains
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Context-based authentication and transport of cultural assets
Personal and Ubiquitous Computing
Simple Lightweight Authentication Protocol: Security and Performance Considerations
International Journal of Business Data Communications and Networking
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
International Journal of Internet Technology and Secured Transactions
Internet of Things (IoT): A vision, architectural elements, and future directions
Future Generation Computer Systems
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Hardware Cost Measurement of Lightweight Security Protocols
Wireless Personal Communications: An International Journal
Cryptanalysis of the RNTS system
The Journal of Supercomputing
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
Authentication and search mechanism for diffusing RFID-sensor networks
International Journal of Sensor Networks
Personalized multi-modality image management and search for mobile devices
Personal and Ubiquitous Computing
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Hi-index | 0.13 |
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers. This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers.