Analyses of Attacks on Embedded RFID Application Under U-Healthcare System

  • Jung Tae Kim
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 235)


A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In this paper, we have analyzed and compared practical threat on U-healthcare system.


Attacks Privacy Tracking Traceability Denial of service 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: 2012-0007896).


  1. 1.
    Poulopoulos G, Markantonakis K, Mayes K (2009) A secure and efficient mutual authentication protocol for low-cost RFID systems. In: 2009 international conference on availability, reliability and security, pp 706–711 Google Scholar
  2. 2.
    Schaberreiter T et al (2008) An enumeration of RFID related threats. In: The second international conference on mobile ubiquitous computing, systems, services and technologies, pp 381–389Google Scholar
  3. 3.
    Song B (2009) Server impersonation attacks on RFID protocols. In: The second international conference on mobile ubiquitous computing, systems, services and technologies, pp 50–55Google Scholar
  4. 4.
    Erguler I, Anarim E (2011) Practical attacks and improvements to an efficient radio frequency identification authentication protocol. In: Concurrency and computation: practice and experience, pp 1838–1849Google Scholar
  5. 5.
    Park YJ et al (2012) On the accuracy of RFID tag estimation functions. J Inf Commun Converg Eng 10(1):33–39Google Scholar
  6. 6.
    Eslam Gamal A, Eman S, Mohamed H (2010) Lightweight mutual authentication protocol for low cost RFID tags. Int J Netw Secur Appl 2(2):27–37Google Scholar
  7. 7.
    Hsu C, Levermore DM, Carothers C, Babin G (2007) Enterprise collaboration: on-demand information exchange using enterprise databases, wireless sensor networks, and RFID Systems. IEEE Trans Syst Man Cybern Part A Syst Hum 37(4):519–532Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Deptartment of Electronic EngineeringMokwon UniversitySeo-Ku, DaejeonKorea

Personalised recommendations