Classification of the operating frequencies of RFID tags [34].

Classification of the operating frequencies of RFID tags [34].

Source publication
Article
Full-text available
The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach t...

Contexts in source publication

Context 1
... to these factors, the operating frequencies of RFID tags can be classified into four bands: low frequencies (LF), high frequencies (HF), and ultra-high frequencies (UHF) [34]. Table 1 summarizes the different frequency bands of RFID tags. ...
Context 2
... 2021, 21, x FOR PEER REVIEW 6 of 40 high frequencies (HF), and ultra-high frequencies (UHF) [34]. Table 1 summarizes the different frequency bands of RFID tags. ...
Context 3
... Zhao Alamr Naeem Dinarvand Benssalah Zheng Yang Aloui Izza T R T R T R T R T R T R T R T R T R T R Random number 1 1 1 1 1 2 1 2 1 1 1 1 1 1 0 0 1 1 1 1 Scalar multiplication 5 5 5 5 4 5 5 5 3 3 3 1 4 4 1 1 2 2 2 4 Point addition 2 2 2 2 1 1 1 1 0 0 1 1 3 3 Even though all these protocols are based on elliptic curves, they do not all use the same number of operations. For this reason, we see that Dinarvand's protocol uses three scalar multiplication operations for tag and reader, while the Liao, Zhao, and Naeem's protocols require five scalar multiplications for the tag and five for the reader. ...

Similar publications

Article
Full-text available
Objects/tags are generally passes through multiple readers before achieving the final destination within the IoT network. Hence, object identification is a significant issue as some bogus objects may take part for malicious access. Considering this situation, RFID can be used for unique identification and validation of IoT objects. However, it reco...

Citations

... Considering larger key lengths contribute to maximizing security, however, for hardware accelerators, operating larger lengths of the target key with a low-area constraint poses serious challenges. Examples of these environments (operating larger lengths of the target key with a lowarea constraint) include ubiquitous computing [4][5][6], radio-frequency-identification (RFID) networks [7,8], and safe autonomous robots [9]. Therefore, this work aims to provide a hardware accelerator optimizing both throughput and area simultaneously for elliptic curve point multiplication. ...
Article
Full-text available
This article proposes a flexible hardware accelerator optimized from a throughput and area point of view for the computationally intensive part of elliptic curve cryptography. The target binary fields, defined by the National Institute of Standards and Technology, are GF(2163), GF(2233), GF(2283), GF(2409), and GF(2571). For the optimization of throughput, the proposed accelerator employs a digit-parallel multiplier. The size of the digit is 41 bits. The proposed accelerator has reused the multiplication and squaring circuit for area optimization to compute modular inversions. Flexibility is included using three additional buffers on top of the proposed accelerator architecture to load different input parameters. Finally, a dedicated controller is used to optimize control signal handling. The architecture is modeled using Verilog and implemented up to the post-place-and-route level on a Xilinx Virtex-7 field-programmable gate array. The area utilization of our accelerator in slices is 1479, 1998, 2573, 3271, and 4469 for m=163 to 571. The time needed to perform one-point multiplication is 7.15, 10.60, 13.26, 20.96, and 30.42 μs. Similarly, the throughput over area figures for the same key lengths are 94.56, 47.21, 29.30, 14.58, and 7.35. Consequently, achieved results and a comprehensive performance comparison show the suitability of the proposed design for constrained environments that demand throughput/area-efficient implementations.
... Thus, published papers either detail specific attacks [37][38][39] or develop advanced defenses [40][41][42]. Particular care was devoted to authentication protocols [19,20,[43][44][45][46], since they are the basis of the most crucial countermeasures. Previous research undoubtedly had the merit of addressing many of the possible attacks using a plethora of different techniques, whose efficacy was carefully evaluated. ...
... In the MIM case, the SPA is practically impossible to perform if the communication distance between the reader and the tag is a few centimeters, whereas it is a possible attack if a reading range of a few meters is exploited. In any case, some elliptic curve cryptography (ECC) protocols can protect the transmitted data [44]. Specifically, Liao's ECC protocol [40] exploits the Montgomery ladder as an effective countermeasure to SPA [63]. ...
Article
Full-text available
World population and life expectancy have increased steadily in recent years, raising issues regarding access to medical treatments and related expenses. Through last-generation medical sensors, NFC (Near Field Communication) and radio frequency identification (RFID) technologies can enable healthcare internet of things (H-IoT) systems to improve the quality of care while reducing costs. Moreover, the adoption of point-of-care (PoC) testing, performed whenever care is needed to return prompt feedback to the patient, can generate great synergy with NFC/RFID H-IoT systems. However, medical data are extremely sensitive and require careful management and storage to protect patients from malicious actors, so secure system architectures must be conceived for real scenarios. Existing studies do not analyze the security of raw data from the radiofrequency link to cloud-based sharing. Therefore, two novel cloud-based system architectures for data collected from NFC/RFID medical sensors are proposed in this paper. Privacy during data collection is ensured using a set of classical countermeasures selected based on the scientific literature. Then, data can be shared with the medical team using one of two architectures: in the first one, the medical system manages all data accesses, whereas in the second one, the patient defines the access policies. Comprehensive analysis of the H-IoT system can be useful for fostering research on the security of wearable wireless sensors. Moreover, the proposed architectures can be implemented for deploying and testing NFC/RFID-based healthcare applications, such as, for instance, domestic PoCs.
... • Desynchronization attack: The main goal of this type of Dos attack is to block the update of secret keys transferred between the tag and the reader. A scenario occurs when an attacker can sabotage the synchronous state between the tag and the reader by preventing the sent message updates, causing the tag and the reader to store different values [119]. ...
Article
Full-text available
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency Identification (RFID), which can be used to track single or multiple objects. This technology has been widely used in healthcare, supply chain, logistics, and asset tracking. However, such applications require a high level of security and privacy and are unfortunately vulnerable to various attacks and threats that need to be addressed in order for RFID-based IoT applications to reach their full potential. To this end, we propose a set of security and privacy guidelines for RFID, supported by modelling guidelines, mitigations, and the attack vectors cohesively. We compare to the state of the art and point out their shortcomings on known guidelines and reason to address these in our model. The overall methodology is as follows: (i) identify the security and privacy guideline features, (ii) highlight the security goals for RFID-based IoT applications, (iii) analyze the features in relation to RFID industrial standards, and relate them to security goals, (iv) summarize attacks and threats against RFID applications and correlate them with violated security goals, (v) derive a set of security and privacy guidelines for RFID applications in accordance with security and privacy by design frameworks. We also describe our derived guidelines in connection with the involved stakeholders, and (vi) outline the existing mitigation strategies to implement our proposed guidelines. Finally, we describe the main limitations of our work that should be investigated in the future and identify the multiple challenges that concern current security strategies.
... From this table, we can notice that the Lopez and Dahab coordinates are the best choice for binary fields and are the least expensive in terms of number of operations required to compute scalar multiplication [15]. In addition, table 3 shows the utilization intensity of different coordinate systems by the most recent research works published in the literature [17]. The results obtained from this table justify the choice of Lopez and Dahab coordinates to represent the elliptic curve points using less number of required arithmetic operations. ...
... All these works have shown that the implementation of an ECC cryptographic algorithm in an RFID system is dedicated to ensure confidentiality and mutual authentication as well as to protect the communication against various attacks: cloning, eavesdropping, tracking attacks [14]. Our paper published in 2021 [15], presented a survey on the security analysis of ECC-based RFID protocols. From this paper we found that the protocols of Naeem [16], Dinarvand [17] and Benssalah [18] present a better computational performance that respects the RFID tag resources. ...
... Several mitigation techniques have been developed to deal with DoS attacks such as the deployment of strong authentication mechanisms, the use of physical unclonable functions (PUF) [25], the possible use of alarms triggered when a tag is being tampered with, and the constant update of the RFID devices [20]. In [26], a comparative study has been presented, which studies different RFID authentication protocols and highlights those protocols which handle DoS attacks. As for the battery drainage due to DoS attacks, strong authentication protocols will be deployed in the proposed system to try to reduce the possibility of these attacks to the minimum. ...
Article
Full-text available
Since 2020, the world is still facing a global economic and health crisis due to the COVID-19 pandemic. One approach to fighting this global crisis is to track COVID-19 cases by wireless technologies, which requires receiving reliable, efficient, and accurate data. Consequently, this article proposes a model based on Lagrange optimization and a distributed deep learning model to assure that all required data for tracking any suspected COVID-19 patient is received efficiently and reliably. Finding the optimum location of the Radio Frequency Identifier (RFID) reader relevant to the base station results in the reliable transmission of data. The proposed deep learning model, developed using the one-dimensional convolutional neural network and a fully connected network, resulted in lower mean absolute squared errors when compared to state-of-the-art regression benchmarks. The proposed model based on Lagrange optimization and deep learning algorithms is evaluated when changing different network parameters, such as requiring signal-to-interference-plus-noise-ratio, reader transmission power, and the required system quality-of-service. The analysis of the obtained results, which indicates the appropriate transmission distance between an RFID reader and a base station, shows the effectiveness and the accuracy of the proposed approach, which leads to an easy and efficient tracking system.
... The objective of these threats is to give an attacker the possibility to intercept this communication or extract secret data in order to imitate one of the legitimate entities. Possible attacks against an RFID system can be classified into three main groups: impersonation attacks, tracking attacks and denialof-service attacks [69]. ...
Article
Full-text available
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks.. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).