Reference Hub2
RFID Security Issues, Defenses, and Security Schemes

RFID Security Issues, Defenses, and Security Schemes

Atul Kumar, Ankit Kumar Jain
ISBN13: 9781799832997|ISBN10: 1799832996|ISBN13 Softcover: 9781799833000|EISBN13: 9781799833017
DOI: 10.4018/978-1-7998-3299-7.ch017
Cite Chapter Cite Chapter

MLA

Kumar, Atul, and Ankit Kumar Jain. "RFID Security Issues, Defenses, and Security Schemes." Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security, edited by Mohit Dua and Ankit Kumar Jain, IGI Global, 2021, pp. 293-310. https://doi.org/10.4018/978-1-7998-3299-7.ch017

APA

Kumar, A. & Jain, A. K. (2021). RFID Security Issues, Defenses, and Security Schemes. In M. Dua & A. Jain (Eds.), Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security (pp. 293-310). IGI Global. https://doi.org/10.4018/978-1-7998-3299-7.ch017

Chicago

Kumar, Atul, and Ankit Kumar Jain. "RFID Security Issues, Defenses, and Security Schemes." In Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security, edited by Mohit Dua and Ankit Kumar Jain, 293-310. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-3299-7.ch017

Export Reference

Mendeley
Favorite

Abstract

Radio frequency identification (RFID) consists of a tag and reader. The RFID system is used in various places, such as finding the location of devices and toll payment. In computer security, CIA (confidentiality, integrity, authentication) is the primary concern for RFID security. In existing scenario, there are various threats present in the RFID system such as de-synchronization attack, disclosure attack, tracking attack and so on. There are various threats that RFID systems are vulnerable to such as a de-synchronization attack, disclosure attack, dos attack, and tracking attack. This chapter discusses various attacks on the RFID system in terms of confidentiality, integrity, and availability as these devices contain a limited amount of memory and low power battery. Therefore, these devices need a lightweight solution for the RFID system. Hence, this chapter additionally discusses various authentication schemes such as lightweight scheme and ultra-lightweight scheme for RFID systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.