Study of Security Threats, Authentication Protocols and RFID Networks
DOI:
https://doi.org/10.32628/IJSRST523102108Keywords:
RFID, WSN, Radio Waves, Sensor.Abstract
In this paper, we studied about security threats, authentication protocols and RFID networks. Wireless sensor networks (WSN) and radio frequency identification (RFID) are two important wireless technologies that have a wide variety of applications and provide limitless future potentials. RFID facilitates detection and identification of objects that are not easily detectable or distinguishable by using current sensor technologies.
References
- S. W. Wang, W. H. Chen, C. S. Ong, L. Liu and Y.W. Chuang, RFID application in hospitals: A case study on a demonstration RFID project in a taiwan hospital, system sciences, HICSS’06, Proceedings of the 39th Annual Hawaii International Conference 8 (2006).
- R. Das, RFID forecasts, players & opportunities 2007–2017, Enterprise Networks & Servers, (March 2007).
- C.F. Hernández, P.H. Ibargüengoytia-González, J.G. Hernández, J.A. Díaz, “Wireless Sensor Networks and Applications: a Survey”, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.3, Pages 264 -273. March 2007.
- Hasan Tahir, Syed Asim Ali Shah, “Wireless Sensor Networks– A Security Perspective”, 12th IEEE International Multitopic Conference, Karachi, pp. 189-193, December 23-24, 2008.
- Yee Wei Law, Paul J.M. Havinga, “How to secure a wireless sensor network”, Published in Intelligent Sensors, Sensor Networks andInformation Processing 2005. IEEE pp 89-95.
- L. Zhang and Z. Wang, Integration of RFID into wireless sensor networks: Architectures, opportunities and challenging problems. Proceedings of the 5th International Conference on Grid and Cooperative Computing Workshops (GCCW’06) (2006).
- Yu, S.-C. (2008). Implementation of an innovative RFID application in libraries. Library Hi Tech, 26(3), 398–410. Retrieved from http://doi.org/10.1108/07378830810903328
- Zhang, D., & Shi, X. (2011). Self-service management platform design for library based on RFID. In 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011 - Proceedings (pp. 7237–7240.) Retrieved from http://doi.org/10.1109/AIMSEC.2011.6010604
- RFID On Line Access 22-03-2013 Http://Www.Rfid4u.Com/Downloads/Library%20Automation%20Using%20 RFID.Pdf
- Hamdoun, S.; Rachedi, A.; Benslimane, A. RSSI-based localization algorithms using spatial diversity in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 2015, 19, 157–167.
- Zhu, A.; Fan, T.; Gu, Z.; Lv, Q.; Li, C.; Ran, L. Indoor localization based on a single-tone SIMO-structured Doppler radar system. In Proceedings of the 2018 IEEE Radio and Wireless Symposium (RWS), Anaheim, CA, USA, 15–18 January 2018.
- Hatem, E.; Colin, E.; Abou-Chakra, S.; El-Hassan, B.; Laheurte, J.-M. Constellations of active UHF-RFID tags for indoor positioning. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nantes, France, 24–27 September 2018; pp. 1–4.
- Ela Innovation, SA. (2014) Ela Innovation active RFID tag and reader manufacturer. Available online: http://www.rfid-ela.eu/ (accessed on 20 July 2015).
- Hatem, E.; Colin, E.; Abou-Chakra, S.; El-Hassan, B.; Laheurte, J.-M. 3D Modeling for Propagation of UHF-RFID Tags’ Signals in an Indoor Environment. In Proceedings of the 2nd IEEE Middle East and North Africa Communications Conference (MENACOMM), Manama, Bahrain, 19–21 November 2019; pp. 1–6.
- Hoppe, R.; Wölfle, G.; Jakobus, U. Wave propagation and radio network planning software WinProp added to the electromagnetic solver package FEKO. In Proceedings of the International Applied Computational Electromagnetics Society Symposium, Firenze, Italy, 26–30 March 2017; pp. 1–2.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.