Cargando…
Comparison and Feasibility of Various RFID Authentication Methods Using ECC
Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164036/ https://www.ncbi.nlm.nih.gov/pubmed/30200493 http://dx.doi.org/10.3390/s18092902 |
_version_ | 1783359504445865984 |
---|---|
author | Alexander, Pagán Baashirah, Rania Abuzneid, Abdelshakour |
author_facet | Alexander, Pagán Baashirah, Rania Abuzneid, Abdelshakour |
author_sort | Alexander, Pagán |
collection | PubMed |
description | Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use. |
format | Online Article Text |
id | pubmed-6164036 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-61640362018-10-10 Comparison and Feasibility of Various RFID Authentication Methods Using ECC Alexander, Pagán Baashirah, Rania Abuzneid, Abdelshakour Sensors (Basel) Review Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use. MDPI 2018-09-01 /pmc/articles/PMC6164036/ /pubmed/30200493 http://dx.doi.org/10.3390/s18092902 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Alexander, Pagán Baashirah, Rania Abuzneid, Abdelshakour Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title | Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title_full | Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title_fullStr | Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title_full_unstemmed | Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title_short | Comparison and Feasibility of Various RFID Authentication Methods Using ECC |
title_sort | comparison and feasibility of various rfid authentication methods using ecc |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164036/ https://www.ncbi.nlm.nih.gov/pubmed/30200493 http://dx.doi.org/10.3390/s18092902 |
work_keys_str_mv | AT alexanderpagan comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc AT baashirahrania comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc AT abuzneidabdelshakour comparisonandfeasibilityofvariousrfidauthenticationmethodsusingecc |