RFID applications and security review

C Munoz-Ausecha, J Ruiz-Rosero… - Computation, 2021 - mdpi.com
Radio frequency identification (RFID) is widely used in several contexts, such as logistics,
supply chains, asset tracking, and health, among others, therefore drawing the attention of …

Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

Survivable RFID systems: Issues, challenges, and techniques

Y Zuo - IEEE Transactions on Systems, Man, and Cybernetics …, 2010 - ieeexplore.ieee.org
Radio frequency identification (RFID) technique has been applied in high-security and high-
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …

Attacks on RFID protocols

T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve
as a quick and easy reference. This document will be updated as new attacks are found …

Dynamic key-updating: Privacy-preserving authentication for RFID systems

L Lu, J Han, L Hu, LM Ni - International Journal of …, 2012 - journals.sagepub.com
The objective of private authentication for Radio Frequency Identification (RFID) systems is
to allow valid readers to explicitly authenticate their dominated tags without leaking the …

Scalable industry data access control in RFID-enabled supply chain

S Qi, Y Zheng, M Li, Y Liu, J Qiu - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
By attaching RFID tags to products, supply chain participants can identify products and
create product data to record the product particulars in transit. Participants along the supply …

Integrating blockchain into supply chain safeguarded by PUF-enabled RFID

MD Islam, H Shen, S Badsha - Internet of Things, 2022 - Elsevier
Due to globalization, supply chain networks are moving towards higher complexity and
becoming vulnerable to various kinds of attacks such as counterfeiting, information …

Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems

W Luo, S Chen, T Li, Y Qiao - … international symposium on Mobile Ad Hoc …, 2012 - dl.acm.org
RFID (radio frequency identification) technologies are poised to revolutionize retail,
warehouse and supply chain management. One of their interesting applications is to …

Public-key encrypted bloom filters with applications to private set intersection

F Kerschbaum - US Patent 8,526,603, 2013 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer
storage medium, for retrieving, from computer-readable memory, a set, the set including a …

Attacks and improvements to an RIFD mutual authentication protocol and its extensions

S Cai, Y Li, T Li, RH Deng - Proceedings of the second ACM conference …, 2009 - dl.acm.org
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also
extended this protocol for RFID tag ownership transfer. These two protocols are designed to …