Cargando…

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which...

Descripción completa

Detalles Bibliográficos
Autores principales: Alexander, Pagán, Baashirah, Rania, Abuzneid, Abdelshakour
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164036/
https://www.ncbi.nlm.nih.gov/pubmed/30200493
http://dx.doi.org/10.3390/s18092902
_version_ 1783359504445865984
author Alexander, Pagán
Baashirah, Rania
Abuzneid, Abdelshakour
author_facet Alexander, Pagán
Baashirah, Rania
Abuzneid, Abdelshakour
author_sort Alexander, Pagán
collection PubMed
description Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.
format Online
Article
Text
id pubmed-6164036
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-61640362018-10-10 Comparison and Feasibility of Various RFID Authentication Methods Using ECC Alexander, Pagán Baashirah, Rania Abuzneid, Abdelshakour Sensors (Basel) Review Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use. MDPI 2018-09-01 /pmc/articles/PMC6164036/ /pubmed/30200493 http://dx.doi.org/10.3390/s18092902 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Alexander, Pagán
Baashirah, Rania
Abuzneid, Abdelshakour
Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title_full Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title_fullStr Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title_full_unstemmed Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title_short Comparison and Feasibility of Various RFID Authentication Methods Using ECC
title_sort comparison and feasibility of various rfid authentication methods using ecc
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164036/
https://www.ncbi.nlm.nih.gov/pubmed/30200493
http://dx.doi.org/10.3390/s18092902
work_keys_str_mv AT alexanderpagan comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc
AT baashirahrania comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc
AT abuzneidabdelshakour comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc