Paper
19 December 2021 Review of RFID security technology
Xinli Zhou, Yilin Zeng, Liangbin Yang, Danyang Li
Author Affiliations +
Proceedings Volume 12128, Second International Conference on Industrial IoT, Big Data, and Supply Chain; 1212806 (2021) https://doi.org/10.1117/12.2624224
Event: 2nd International Conference on Industrial IoT, Big Data, and Supply Chain, 2021, Macao, China
Abstract
With the wide application of Radio Frequency Identification Devices (RFID) technology, the security and privacy threat of this transmission mode is becoming more and more prominent. This paper summarizes the security problems faced by RFID, such as eavesdropping, man-in-the-middle attack, physical cracking, falsifying, and so on. Based on these problems, three solutions are proposed: 1. Using sleeping or killing to change RFID relevance. 2. Using renaming or hash lock cryptography to change the uniqueness of RFID. 3. Hiding the real information according to the distance. So as to provide a theoretical basis for RFID applications to solve security problems.
© (2021) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xinli Zhou, Yilin Zeng, Liangbin Yang, and Danyang Li "Review of RFID security technology", Proc. SPIE 12128, Second International Conference on Industrial IoT, Big Data, and Supply Chain, 1212806 (19 December 2021); https://doi.org/10.1117/12.2624224
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Computer security

Databases

Internet

Distance measurement

Cryptography

Security technologies

RELATED CONTENT


Back to Top