Survey on Prominent RFID Authentication Protocols for Passive Tags

Loading...
Thumbnail Image
Authors
Baashirah, Rania
Abuzneid, Abdelshakour A.
Issue Date
2018-10-22
Type
Article
Language
en_US
Keywords
Radio-frequency identification (RFID) , Security , Privacy , Authentication , Passive tag , Security attacks , Internet of things , Lightweight protocol
Research Projects
Organizational Units
Journal Issue
Alternative Title
Abstract
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.
Description
Citation
Baashirah, R.; Abuzneid, A. Survey on Prominent RFID Authentication Protocols for Passive Tags. Sensors 2018, 18, 3584.
Publisher
MDPI
License
Journal
Volume
Issue
PubMed ID
DOI
ISSN
EISSN