Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

01-11-2010 | Issue 5/2010 Open Access

Information Systems Frontiers 5/2010

Classifying RFID attacks and defenses

Journal:
Information Systems Frontiers > Issue 5/2010
Authors:
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum

Abstract

RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.

Our product recommendations

Premium-Abo der Gesellschaft für Informatik

Sie erhalten uneingeschränkten Vollzugriff auf alle acht Fachgebiete von Springer Professional und damit auf über 45.000 Fachbücher und ca. 300 Fachzeitschriften.

Literature
About this article

Other articles of this Issue 5/2010

Information Systems Frontiers 5/2010 Go to the issue

Premium Partner

    Image Credits