Skip to main content

Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure

  • Conference paper
  • First Online:
International Conference on Cloud Computing and Computer Networks (CCCN 2023)

Abstract

Radio frequency identification (RFID) is a technology that uses radio waves to communicate between a reader and a tag attached to an object, to identify and track it. RFID systems consist of a reader, an antenna, and a tag or transponder (Ait et al., Math Model Comput 8(4): 616–626, 2021). In this research, the aim was to examine the vulnerabilities of RFID-related physical controls in an infrastructure, to identify potential vulnerabilities, and to assess the associated risks. The findings of this study provided important insights into the current state of RFID-related physical controls in an infrastructure and will assist organizations in improving the security of their RFID systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ait, S., Lhadj Lamin, A. Raghib, and Abou El Majd, B.: Robust multi-objective optimization for solving the RFID Network Planning Problem, Mathematical Modeling and Computing, vol. 8, no. 4, pp. 616–626, https://doi.org/10.23939/mmc2021.04.616. (2021).

  2. Ahsan, K., Hanifa, S., & Kingston, P.: RFID Applications: An Introductory and Exploratory Study. International Journal of Computer Science Issues, 7, 1–8 (2010).

    Google Scholar 

  3. Xiao, Q., Gibbons, T. and Lebru, H.: RFID Technology, Security Vulnerabilities, and Countermeasures. Supply Chain the Way to Flat Organisation, 4(4), Intech., doi:https://doi.org/10.5772/6668. (2009).

  4. Williamson, A., Tsay, L.-S., Kateeb, I.A., and Burton, L.: Solutions for RFID Smart Tagged Card Security Vulnerabilities. AASRI Procedia, 4(4), 282–287. doi: https://doi.org/10.1016/j.aasri.2013.10.042. (2013).

  5. Azuaje, R.: Securing IoT: Hardware Vs Software, Journal of Advances in Information Technology, vol. 9, no. 3, pp. 79–83. doi: https://doi.org/10.12720/jait.9.3.79-83. (2018).

    Article  Google Scholar 

  6. Ait Lhadj Lamin, Samir & Abdelkader, Raghib & Abou El Majd, Badr. (2021). Robust multi-objective optimization for solving the RFID network planning problem. Mathematical Modeling and Computing, from https://doi.org/10.23939/mmc2021.04.616

  7. Valero, E., Adán, A. and Cerrada, C.: Evolution of RFID Applications in Construction: A Literature Review. Sensors, 15(7), pp. 15988–16008. doi: https://doi.org/10.3390/s150715988. (2015).

    Article  Google Scholar 

  8. Pateriya, R. K. and Sharma, S.: The evolution of RFID Security and Privacy: A Re-search Survey. In: International Conference on Communication Systems and Network Technologies, pp. 115–119. doi: https://doi.org/10.1109/CSNT.2011.31. (2011).

  9. Guizani, S.: Implementation of an RFID relay attack countermeasure. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 518523. IEEE (2015).

    Google Scholar 

  10. Liu, B., Yang, B., and Su, X.: An improved two-way security authentication protocol for RFID system, Information, vol. 9, no. 4, p. 86, https://doi.org/10.3390/info9040086. (2018).

    Article  Google Scholar 

  11. Morozova, T. V., Gurov, V. V.: Research in RFID vulnerability. In: Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1–5. IEEE (2017).

    Google Scholar 

  12. Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. (2010). Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505. https://doi.org/10.1007/s10796-009-9210-z

    Article  Google Scholar 

  13. Guizani, S. (2015) “Implementation of an RFID relay attack countermeasure,” International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 2015, pp. 1318–1323, doi: https://doi.org/10.1109/IWCMC.2015.7289273.

  14. Phillips, T., Karygiannis, T., & Kuhn, R. “Security standards for the RFID market,” in IEEE Security & Privacy, vol. 3, no. 6, pp. 85–89, Nov.–Dec. 2005, doi: https://doi.org/10.1109/MSP.2005.157.

  15. A. P. Abellon, C. J. Ariola, E. Blancaflor, A. K. Danao, D. Medel and M. Z. Santos, “Risk Assessments of Unattended Smart Contactless Cards,” 2021 IEEE 8th International Conference on Industrial Engineering and Applications (ICIEA), Chengdu, China, 2021, pp. 338–341, doi: https://doi.org/10.1109/ICIEA52957.2021.9436788.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Blancaflor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Blancaflor, E., Fiedalan, J.I., Magadan, N.F., Nuarin, J.M., Samson, E.A. (2024). Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure. In: Meng, L. (eds) International Conference on Cloud Computing and Computer Networks. CCCN 2023. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-47100-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47100-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47099-8

  • Online ISBN: 978-3-031-47100-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics