Analyses of Attacks on Embedded RFID Application Under U-Healthcare System
A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In this paper, we have analyzed and compared practical threat on U-healthcare system.
KeywordsAttacks Privacy Tracking Traceability Denial of service
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: 2012-0007896).
- 1.Poulopoulos G, Markantonakis K, Mayes K (2009) A secure and efficient mutual authentication protocol for low-cost RFID systems. In: 2009 international conference on availability, reliability and security, pp 706–711 Google Scholar
- 2.Schaberreiter T et al (2008) An enumeration of RFID related threats. In: The second international conference on mobile ubiquitous computing, systems, services and technologies, pp 381–389Google Scholar
- 3.Song B (2009) Server impersonation attacks on RFID protocols. In: The second international conference on mobile ubiquitous computing, systems, services and technologies, pp 50–55Google Scholar
- 4.Erguler I, Anarim E (2011) Practical attacks and improvements to an efficient radio frequency identification authentication protocol. In: Concurrency and computation: practice and experience, pp 1838–1849Google Scholar
- 5.Park YJ et al (2012) On the accuracy of RFID tag estimation functions. J Inf Commun Converg Eng 10(1):33–39Google Scholar
- 6.Eslam Gamal A, Eman S, Mohamed H (2010) Lightweight mutual authentication protocol for low cost RFID tags. Int J Netw Secur Appl 2(2):27–37Google Scholar
- 7.Hsu C, Levermore DM, Carothers C, Babin G (2007) Enterprise collaboration: on-demand information exchange using enterprise databases, wireless sensor networks, and RFID Systems. IEEE Trans Syst Man Cybern Part A Syst Hum 37(4):519–532Google Scholar