Skip to main content


Weitere Artikel dieser Ausgabe durch Wischen aufrufen

01.11.2010 | Ausgabe 5/2010 Open Access

Information Systems Frontiers 5/2010

Classifying RFID attacks and defenses

Information Systems Frontiers > Ausgabe 5/2010
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum


RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.

Unsere Produktempfehlungen

Premium-Abo der Gesellschaft für Informatik

Sie erhalten uneingeschränkten Vollzugriff auf alle acht Fachgebiete von Springer Professional und damit auf über 45.000 Fachbücher und ca. 300 Fachzeitschriften.

Über diesen Artikel

Weitere Artikel der Ausgabe 5/2010

Information Systems Frontiers 5/2010 Zur Ausgabe

Premium Partner