A critical analysis of RFID security protocols
RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented...
| Main Authors: | , , |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE
2008
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/31691 |
| _version_ | 1848753452598951936 |
|---|---|
| author | Sharif, A. Potdar, Vidyasagar Chang, Elizabeth |
| author_facet | Sharif, A. Potdar, Vidyasagar Chang, Elizabeth |
| author_sort | Sharif, A. |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID. |
| first_indexed | 2025-11-14T08:24:45Z |
| format | Conference Paper |
| id | curtin-20.500.11937-31691 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:24:45Z |
| publishDate | 2008 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-316912017-09-13T15:55:04Z A critical analysis of RFID security protocols Sharif, A. Potdar, Vidyasagar Chang, Elizabeth RFID Reader Encryption Security Tags Hash Locking Privacy Transponder Electronic Product Code (EPC) RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID. 2008 Conference Paper http://hdl.handle.net/20.500.11937/31691 10.1109/WAINA.2008.212 IEEE fulltext |
| spellingShingle | RFID Reader Encryption Security Tags Hash Locking Privacy Transponder Electronic Product Code (EPC) Sharif, A. Potdar, Vidyasagar Chang, Elizabeth A critical analysis of RFID security protocols |
| title | A critical analysis of RFID security protocols |
| title_full | A critical analysis of RFID security protocols |
| title_fullStr | A critical analysis of RFID security protocols |
| title_full_unstemmed | A critical analysis of RFID security protocols |
| title_short | A critical analysis of RFID security protocols |
| title_sort | critical analysis of rfid security protocols |
| topic | RFID Reader Encryption Security Tags Hash Locking Privacy Transponder Electronic Product Code (EPC) |
| url | http://hdl.handle.net/20.500.11937/31691 |