TY - GEN
T1 - Security threat mitigation trends in low-cost RFID systems
AU - Garcia-Alfaro, Joaquin
AU - Barbeau, Michel
AU - Kranakis, Evangelos
PY - 2010/5/3
Y1 - 2010/5/3
N2 - The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and academia. One main focus of research interests is the authentication and privacy techniques to prevent attacks targeting the insecure wireless channel of these systems. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints, such as production costs, power consumption, time of response, and regulations compliance, makes the use of traditional cryptography in these systems a very challenging problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.
AB - The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and academia. One main focus of research interests is the authentication and privacy techniques to prevent attacks targeting the insecure wireless channel of these systems. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints, such as production costs, power consumption, time of response, and regulations compliance, makes the use of traditional cryptography in these systems a very challenging problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.
KW - Electronic Product Code (EPC)
KW - IT security
KW - Privacy threats
KW - Radio Frequency Identification (RFID)
KW - Security threats
KW - Wireless security
UR - https://www.scopus.com/pages/publications/77951573438
U2 - 10.1007/978-3-642-11207-2_15
DO - 10.1007/978-3-642-11207-2_15
M3 - Conference contribution
AN - SCOPUS:77951573438
SN - 3642112064
SN - 9783642112065
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 193
EP - 207
BT - Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009, and Second International Workshop, SETOP 2009, Revised Selected Papers
T2 - 4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009
Y2 - 24 September 2009 through 25 September 2009
ER -