Study of Security Problems in RFID Systems and Existing Solutions

Authors

  • Masawood Alam Research Scholar, Department of Physics, J. P. University, Chapra, Bihar, India Author
  • Prof. Gun Sagar Yadav University Department of Physics, J. P. University, Chapra, Bihar, India Author

DOI:

https://doi.org/10.32628/IJSRST2613191

Keywords:

RFID, Cryptographic, Performance, Authentication

Abstract

In this present paper, we consider to measure the performance of an RFID system. On one hand, due to the countless number of tags in industries such as supply chain, the search overhead of a tag in the reader’s back-end database may be overwhelmingly high. Therefore, the search cost should be a concern. On the other hand, in order to protect an RFID system’s security, it is usually to implement an RFID protocol in the system. Thus, another cost of RFID security protocol is cryptographic operation cost as well as reader-tag communication cost. In [1-4], Avoine claimed that a cryptographic operation on a single computer only takes 2-23 second to finish, while it would take a lot more time to finish a cryptographic operation on a tag due to a tag’s limited memory and computational ability. Therefore, cryptographic operation cost in RFID reader side is ignorable.

Downloads

Download data is not yet available.

References

D. W. Nance and T. L. Naps. Introduction to Computer Science: Programming, Problem Solving and Data Structures. West Publishing Company, second edition, 1992.

J. F. Korsh. Data Structures, Algorithms and Program Style. PWS Publishing Co.Boston, MA, USA, 1986.

Y. Zhang and P. Kitsos. Security in RFID and Sensor Networks. Auerbach Publications, April 2009.

D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonymprotocol enabling ownership transfer of RFID tags. In B. Preneel and S. Tavares,editors, Selected Areas in Cryptography | SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 276{290, Kingston, Canada, August 2005. Springer-Verlag.

K. Emery, Distributed Eventing Architecture: RFID and Sensors in a Supply Chain, Master Thesis, MIT http://db.lcs.mit.edu/madden/html/theses/emery.pdf.

EPCglobal, Class 1 Generation 2 UHF Air Interface Protocol Standard, Version 1.0.9, (2005).

Aikaterini Mitrokotsa, Melanie R. Rieback, and Andrew S. Tanenbaum. Classifying RFID Attacks and Defenses. Information Systems Frontiers, July 2009. DOI: https://doi.org/10.1007/s10796-009-9210-z

Ari Juels, Ronald Rivest, and Michael Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Vijay Atluri, editor, Conference on Computer and Communications Security – ACM CCS, pages 103–111, Washington, DC, USA, October 2003. ACM, ACM Press.

Sarah Spiekermann and Sergei Evdokimov. Privacy Enhancing Technologies for RFID - A Critical Investigation of State of the Art Research. In IEEE Privacy and Security. IEEE, IEEE Computer Society, 2009. DOI: https://doi.org/10.1109/MSP.2009.31

Melanie Rieback, Bruno Crispo, and Andrew Tanenbaum. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. In Colin Boyd and Juan Manuel Gonz´alez Nieto, editors, Australasian Conference on Information Security and Privacy– ACISP’05, volume 3574 of Lecture Notes in Computer Science, pages 184–194, Brisbane, Australia, July 2005. Springer-Verlag. DOI: https://doi.org/10.1007/11506157_16

Ari Juels, Ronald Rivest, and Michael Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Vijay Atluri, editor, Conference on Computer and Communications Security – ACM CCS, pages 103–111, Washington, DC, USA, October 2003. ACM, ACM Press. DOI: https://doi.org/10.1145/948109.948126

Alexei Czeskis, Karl Koscher, Joshua R. Smith, and Tadayoshi Kohno. Rfids and secret handshakes: defending against ghost-andleech attacks and unauthorized reads with context-aware communications. In ACM Conference on Computer and Communications Security, pages 479–490, 2008. DOI: https://doi.org/10.1145/1455770.1455831

Tassos Dimitriou. A secure and efficient RFID protocol that could make big brother (partially) obsolete. Pervasive Computing and Communications, IEEE International Conference on, 0:269–275, 2006. DOI: https://doi.org/10.1109/PERCOM.2006.5

Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. Cryptographic Approach to “Privacy-Friendly” Tags. In RFID Privacy Workshop, MIT, Massachusetts, USA, November 2003.

Serge Vaudenay. On Privacy Models for RFID. In Advances in Cryptology - Asiacrypt 2007, volume 4833 of Lecture Notes in Computer Science, pages 68–87,Kuching, Malaysia, December 2007. Springer-Verlag. DOI: https://doi.org/10.1007/978-3-540-76900-2_5

T. van Le C. Chatmon and M. Burmester. Secure anonymous RFID authentication protocols. Technical Report TR-060112, 2006.

Tassos Dimitriou. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece, September 2005. IEEE.

Ari Juels, Ravikanth Pappu, and Bryan Parno. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. In 17th USENIX Security Symposium, pages 75–90, San Jose, California, USA, July 2008. USENIX.

David Molnar, Andrea Soppera, and DavidWagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In Bart Preneel and Stafford Tavares, editors, Selected Areas in Cryptography – SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 276–290, Kingston, Canada, August 2005. Springer-Verlag. DOI: https://doi.org/10.1007/11693383_19

Gene Tsudik. YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In International Conference on Pervasive Computing and Communications – PerCom 2006, Pisa, Italy, March 2006. IEEE, IEEE Computer Society Press.

Downloads

Published

20-02-2026

Issue

Section

Research Articles

How to Cite

[1]
Masawood Alam and Prof. Gun Sagar Yadav, Trans., “Study of Security Problems in RFID Systems and Existing Solutions”, Int J Sci Res Sci & Technol, vol. 13, no. 1, pp. 431–436, Feb. 2026, doi: 10.32628/IJSRST2613191.