Skip to main content
Log in

Security Problems in an RFID System

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper focuses on the security and privacy threats being faced by the low-cost RFID communication system, the most challenging of which relate to eavesdropping, impersonation, and tag cloning problems. The security issues can be improved and solved by utilizing both prevention and detection strategies. Prevention technique is needed since it offers resistance capabilities toward eavesdroppers and impersonators. Detection technique is vital to minimize the negative effects of tag cloning threats. This paper proposes the use of both prevention and detection techniques to make RFID communication more secure. Lightweight cryptographic algorithm, which conforms to the EPC Class-1 Generation-2 standard, is used in the proposed mutual authentication protocol for RFID system to raise security levels. In addition, electronic fingerprinting system is deployed in the proposed solution as a detection method to distinguish counterfeit and legitimate tags.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kim J., Yang C., Jeon J. (2007) A research on issues related to RFID security and privacy. In: Wang W. (eds) IFIP international federation for information processing, Volume 252, integration and innovation orient to E-society Volume 2. Springer, Boston

    Google Scholar 

  2. Chein, H. Y., Chen, C. H. (2007). Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In Computer Standards and Interfaces, vol. 29. Amsterdam: Elsevier.

  3. Mitrokotsa, A., Rieback, M. R., Tanenbaum, A. S. (2008). Classification of RFID attacks. In Proceedings of the 2nd International Workshop on RFID Technology: Concepts, Applications, Challenges (IWRT’08), 10th International Conference on Enterprise Information Systems, Barcelona, Spain.

  4. Choi, E. Y., Lee, D. H, Lim, J. I. (2009). Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. In Computer Standards & Interfaces, Volume 31, Issue 6.

  5. Juels, A. (2005). Strengthening EPC tags against cloning. In ACM-Workshop on Wireless Security, WiSE.

  6. Bailey, D. V., Juels, A. (2006). Shoehorning Security into the EPC Tag Standards. In Computer Science. Berlin: Springer Press.

  7. Lehtonen, M., Ostojic, D., Illic, A., Michachelles, F. (2009). Securing RFID Systems by Detecting Tag Cloning. In Seventh International Conference on Pervasive Computing, Pervasive’09.

  8. Chien, H. Y., Chen, C. W. (2006). A lightweight authentication protocol for low-cost RFID. In Proceedings of the 2nd Workshop on RFID Security.

  9. Danev, B., Hedyt-Benjamin, T. S., Capkun, S. (2009). Physical-layer Identification of RFID Devices. In The Proceedings of the 18th USENIX Security Symposium. Montreal, Canada.

  10. Fingerprinting RFID Tags: Researchers Develop Anti-Counterfeiting Technology. Available from: http://www.physorg.com/news177842859.html.

  11. Li, Y. Z., Cho, Y. B., Um, N. K., & Lee, S. H. (2006). Security and privacy on authentication protocol for low-cost RFID. In IEEE International Conference on Computational Intelligence and Security.

  12. Burmester M., Munilla J. (2009) A Flyweight RFID Authentication Protocol, in RFIDSec09, the 5th Workshop on RFID Security. Leuven, Belgium

    Google Scholar 

  13. Chen C.L., Deng Y.Y. (2009) Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection, in Engineering Applications of Artificial Intelligence. Elsevier, Amsterdam

    Google Scholar 

  14. Koscher, K., Juels, A., Kohno, T., Brajkovic, V. (2008). EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond.

  15. Song, B., & Mitchell, C. J. (2008). RFID Authentication Protocol for Low-cost Tags. In WiSec’08. Alexandria, Virginia, USA.

  16. Song, B. (2008). RFID Tag Ownership Transfer. In 4th Workshop on RFID Security (RFIDsec 08), Budaperst, Hungary.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Widad Ismail.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khor, J.H., Ismail, W., Younis, M.I. et al. Security Problems in an RFID System. Wireless Pers Commun 59, 17–26 (2011). https://doi.org/10.1007/s11277-010-0186-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-010-0186-2

Keywords

Navigation