Abstract
Radio frequency identification (RFID) is a technology that uses radio waves to communicate between a reader and a tag attached to an object, to identify and track it. RFID systems consist of a reader, an antenna, and a tag or transponder (Ait et al., Math Model Comput 8(4): 616–626, 2021). In this research, the aim was to examine the vulnerabilities of RFID-related physical controls in an infrastructure, to identify potential vulnerabilities, and to assess the associated risks. The findings of this study provided important insights into the current state of RFID-related physical controls in an infrastructure and will assist organizations in improving the security of their RFID systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ait, S., Lhadj Lamin, A. Raghib, and Abou El Majd, B.: Robust multi-objective optimization for solving the RFID Network Planning Problem, Mathematical Modeling and Computing, vol. 8, no. 4, pp. 616–626, https://doi.org/10.23939/mmc2021.04.616. (2021).
Ahsan, K., Hanifa, S., & Kingston, P.: RFID Applications: An Introductory and Exploratory Study. International Journal of Computer Science Issues, 7, 1–8 (2010).
Xiao, Q., Gibbons, T. and Lebru, H.: RFID Technology, Security Vulnerabilities, and Countermeasures. Supply Chain the Way to Flat Organisation, 4(4), Intech., doi:https://doi.org/10.5772/6668. (2009).
Williamson, A., Tsay, L.-S., Kateeb, I.A., and Burton, L.: Solutions for RFID Smart Tagged Card Security Vulnerabilities. AASRI Procedia, 4(4), 282–287. doi: https://doi.org/10.1016/j.aasri.2013.10.042. (2013).
Azuaje, R.: Securing IoT: Hardware Vs Software, Journal of Advances in Information Technology, vol. 9, no. 3, pp. 79–83. doi: https://doi.org/10.12720/jait.9.3.79-83. (2018).
Ait Lhadj Lamin, Samir & Abdelkader, Raghib & Abou El Majd, Badr. (2021). Robust multi-objective optimization for solving the RFID network planning problem. Mathematical Modeling and Computing, from https://doi.org/10.23939/mmc2021.04.616
Valero, E., Adán, A. and Cerrada, C.: Evolution of RFID Applications in Construction: A Literature Review. Sensors, 15(7), pp. 15988–16008. doi: https://doi.org/10.3390/s150715988. (2015).
Pateriya, R. K. and Sharma, S.: The evolution of RFID Security and Privacy: A Re-search Survey. In: International Conference on Communication Systems and Network Technologies, pp. 115–119. doi: https://doi.org/10.1109/CSNT.2011.31. (2011).
Guizani, S.: Implementation of an RFID relay attack countermeasure. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 518523. IEEE (2015).
Liu, B., Yang, B., and Su, X.: An improved two-way security authentication protocol for RFID system, Information, vol. 9, no. 4, p. 86, https://doi.org/10.3390/info9040086. (2018).
Morozova, T. V., Gurov, V. V.: Research in RFID vulnerability. In: Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1–5. IEEE (2017).
Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. (2010). Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505. https://doi.org/10.1007/s10796-009-9210-z
Guizani, S. (2015) “Implementation of an RFID relay attack countermeasure,” International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 2015, pp. 1318–1323, doi: https://doi.org/10.1109/IWCMC.2015.7289273.
Phillips, T., Karygiannis, T., & Kuhn, R. “Security standards for the RFID market,” in IEEE Security & Privacy, vol. 3, no. 6, pp. 85–89, Nov.–Dec. 2005, doi: https://doi.org/10.1109/MSP.2005.157.
A. P. Abellon, C. J. Ariola, E. Blancaflor, A. K. Danao, D. Medel and M. Z. Santos, “Risk Assessments of Unattended Smart Contactless Cards,” 2021 IEEE 8th International Conference on Industrial Engineering and Applications (ICIEA), Chengdu, China, 2021, pp. 338–341, doi: https://doi.org/10.1109/ICIEA52957.2021.9436788.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Blancaflor, E., Fiedalan, J.I., Magadan, N.F., Nuarin, J.M., Samson, E.A. (2024). Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure. In: Meng, L. (eds) International Conference on Cloud Computing and Computer Networks. CCCN 2023. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-47100-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-47100-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47099-8
Online ISBN: 978-3-031-47100-1
eBook Packages: EngineeringEngineering (R0)