New Applications of RFID And Security Threats

Authors

  • Ankesh Kumar  Research Scholar, University Department of Physics, B. R. A. Bihar University, Muzaffarpur, Bihar, India
  • Dr. K. B. Singh  P. G. Department of Physics, L. S. College, Muzaffarpur, B. R. A. Bihar University, Muzaffarpur, Bihar, India
  • Dr. Pankaj Kumar  P. G. Department of Physics, L. S. College, Muzaffarpur, B. R. A. Bihar University, Muzaffarpur, Bihar, India

Keywords:

RFID, RFID Tags, Counterfeiting, Authentication, Adversary, Ant-Cloning.

Abstract

In this research paper, we have described the various cryptographic properties and security features of RFID systems. Radio-frequency identification is a technology for the automated identification of objects and people. RFID is one of the most challenging devices in recent years in many fields such as wireless communication, circuits and electromagnetic areas. The reason is that there are so many potential or ongoing applications of RFID systems such as supply chains, livestock/inventory tracking, toll management, airline baggage management, access control, and so on. Operational and security requirements for RFID systems such as system scalability, anonymity, and ant-cloning are difficult to obtain due to constraints in area, memory, etc.

References

  1. “Specification of RFID Air Interface”, http:// www.epcglobaline.org.
  2. D. White. NCR: RFID in retail. In S. Garfinkel and B. Rosenberg, editors, RFID: Applications, Security, and Privacy, pages 381–395. Addison-Wesley, 2005.
  3. A Juels and S A Weis Authenticating pervasive devices with human protocols.In V. Shoup, editor, Advances in Cryptology: Proceedings of CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 293 308. Springer-Verlag, 2005.
  4. P. Tuyls and L. Batina RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, Lecture Notes in Computer Science, San Jose, USA, February 13-17 2006. Springer Verlag.
  5. C. Kocher, J. Jaffe and B. June . Differential Power Analysis,CRYPTO99
  6. M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong Authentication for RFID Systems Using the AES Algorithm. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems, CHES 2004, volume LNCS 3156, pages 357-370. Springer, 2004.
  7. SStephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels ”Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, in The First International Conference on Security in Pervasive Computing SPC 2003, March 2003.

Downloads

Published

2023-12-30

Issue

Section

Research Articles

How to Cite

[1]
Ankesh Kumar, Dr. K. B. Singh, Dr. Pankaj Kumar, " New Applications of RFID And Security Threats, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 10, Issue 6, pp.521-525, November-December-2023.