Security threat mitigation trends in low-cost RFID systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and academia. One main focus of research interests is the authentication and privacy techniques to prevent attacks targeting the insecure wireless channel of these systems. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints, such as production costs, power consumption, time of response, and regulations compliance, makes the use of traditional cryptography in these systems a very challenging problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.

Original languageEnglish
Title of host publicationData Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009, and Second International Workshop, SETOP 2009, Revised Selected Papers
Pages193-207
Number of pages15
DOIs
Publication statusPublished - 3 May 2010
Externally publishedYes
Event4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009 - St. Malo, France
Duration: 24 Sept 200925 Sept 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5939 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009
Country/TerritoryFrance
CitySt. Malo
Period24/09/0925/09/09

Keywords

  • Electronic Product Code (EPC)
  • IT security
  • Privacy threats
  • Radio Frequency Identification (RFID)
  • Security threats
  • Wireless security

Fingerprint

Dive into the research topics of 'Security threat mitigation trends in low-cost RFID systems'. Together they form a unique fingerprint.

Cite this