RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Protocols for RFID tag/reader authentication
Decision Support Systems
Pervasive pheromone-based interaction with RFID tags
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Impact of position and orientation of RFID tags on real time asset tracking in a supply chain
Journal of Theoretical and Applied Electronic Commerce Research
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
An embedded system for practical security analysis of contactless smartcards
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
E-passport: the global traceability or how to feel like a UPS package
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Secret-sharing based secure communication protocols for passive RFIDs
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
RFID usage issues in the supply chain
WTS'10 Proceedings of the 9th conference on Wireless telecommunications symposium
Wireless Personal Communications: An International Journal
Securing the use of RFID-enabled banknotes
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications
Journal of Network and Computer Applications
SAPCC1G2: a mutual authentication protocol promote the security of RFID and WSN integration system
International Journal of Communication Networks and Distributed Systems
RFID enabled traceability networks: a survey
Distributed and Parallel Databases
SPEcTRe: spot-checked private ecash tolling at roadside
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A robust and secure RFID-based pedigree system (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
ACSP: A novel security protocol against counting attack for UHF RFID systems
Computers & Mathematics with Applications
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
RFID-based information technology and management in agriculture and food supply chains
International Journal of Information Technology and Management
Enhanced homeland security and disaster emergency operations based on biometrics and RFID
International Journal of Computer Applications in Technology
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
Hi-index | 0.00 |
RFID is a contactless identification technology that augments real-world objects with remotely-powered computing capabilities. Even though RFID-tagging of objects such as passports, pets, prisoners, and even the elderly seems revolutionary and unprecedented, RFID technology itself has a rich history that began with Identification Friend or Foe (IFF) systems during World War II. This article charts the parallel evolution of RFID technology and its security and privacy threats and solutions. Historical RFID-based systems faced constant security threats, and many of these attacks (and their defenses) have since been canonized as classical signal warfare and countermeasures. Examining RFID and its threats from a historical perspective lets us learn from past experiences and enables us to reuse old solutions. More importantly, looking back provides us as researchers with inspiration to devise new solutions, so we can lead RFID security research into the future.This article is part of a special issue on RFID Technology.