Department of Computer Science and Engineering; University of Bridgeport; Bridgeport, CT 06604, USA.
Sensors (Basel). 2018 Sep 1;18(9):2902. doi: 10.3390/s18092902.
Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag's information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.
射频识别(RFID)是一种日益流行且应用广泛的技术。然而,RFID 技术在安全性和隐私性方面存在重大问题,引起了许多研究人员的关注。为了解决 RFID 安全和隐私问题,必须克服重大挑战。其中一个原因是 RFID 系统提供安全性和隐私性的限制。除了满足 RFID 技术的安全和隐私需求外,解决方案还必须具有成本效益、实用、可靠、可扩展、灵活、跨组织和持久。为了使 RFID 标识符有效且高效,它们必须在抵抗旨在获取标签信息和破坏系统或使绕过 RFID 标签应提供的保护成为可能的攻击的同时识别物品。不同的身份验证方法已在文献中提出、研究和评估。在这项工作中,我们提出了评估 RFID 身份验证的方法,并对一些最有前途的身份验证方法进行了回顾、比较和排名,以确定可能使用的最佳协议选择。