Survey on Prominent RFID Authentication Protocols for Passive Tags

Loading...
Thumbnail Image

Authors

Baashirah, Rania
Abuzneid, Abdelshakour A.

Issue Date

2018-10-22

Type

Article

Language

en_US

Keywords

Radio-frequency identification (RFID) , Security , Privacy , Authentication , Passive tag , Security attacks , Internet of things , Lightweight protocol

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.

Description

Citation

Baashirah, R.; Abuzneid, A. Survey on Prominent RFID Authentication Protocols for Passive Tags. Sensors 2018, 18, 3584.

Publisher

MDPI

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN