SlideShare a Scribd company logo
1 of 3
Download to read offline
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
341
Abstract— Radio-frequency identification (RFID) has become
popular for automated identification and tracking of objects,
goods and people. As the applications of RFID are expanding
every day, new security issues also will be appeared. This paper
speaks about fundamentals of RFID systems and security issues
which can be raised in each one of the RFID architecture parts, as
a wireless communication technology. This paper emphasize on
the requirement of security in each special type of RFID systems
applications, different kind of treats which can influence the
security and safety of the RFID applicants and the last
improvements of existing security and privacy methods and
protocols.
Index Terms— Reader, RFID, Security, Tag.
I. INTRODUCTION
Radio-frequency identification (RFID) is an automatic
identification and data capturing technology, which can be
used in different fields in order to identify and track goods and
people. The history of RFID returns to around 70 years back
in Second World War which RFID was used to identify
enemy aircraft. However, today’s RFID applications are
somehow different with its initial applications. Undoubtedly
new applications of RFID have made a revolution in
inventory and automation processes; RFID can be seen
everywhere from supply chain inventory to animal
identification, from health care management to RFID enable
passports or in a supermarket like a barcode for goods.
A. RFID Fundamental
RFID system has at least a tag and a reader. A tag consists
of a microchip, capacitors and an antenna coil. A tag
communicates with an RFID reader through radio signals.
RFID reader is used in order to do the tag inquiries and grasp
the needed information from the tag. The reader sends out
some radio waves to interrogate the tag. [1] These radio
waves are emitted by reader’s antenna then RFID tag replies
the radio waves while in the other side the reader is connected
to a backend database which processes the information’s sent
by the tag. RFID tag's microchip saves the information that
are important like product code, id number or any information
which must be retrieved by the reader. RFID tags are two
general types: passive and active.
 Passive tags: this type of tags does not need battery to
work. They generate power from a signal of an outer reader.
The passive tags reflect the radio frequency signal transmitted
to them from a reader then add information by modulating the
reflected signal, and obtain power from the signal of an
external reader. The most known application of passive tags is
to replace the customary barcode technology (with some
important advantages in compare to barcode) and has much
lighter weight and chipper price in compare with active tag,
and also virtually its effective lifetime is infinite .nevertheless
on the other side, read ranges of passive tags is very limited.
[2]
 Active tags: are battery-powered tags (usually on-board
battery) and so having more transmission range and stronger
signal in compare with the passive tags. That is why the
readers can touch them from longer distance. [3]The onboard
power supply increases the size and price of the active tags so
active tags are larger and more expensive than the passive
tags, thus large items tracked over long distance are the best
operational platform for active tags. In comparison of two
tags, it is obvious that passive tags are very inexpensive.
Today each piece of passive tags is around 20 cents which
seems a reasonable price to integrate into common materials
and products, although technology is trying to make them
chipper. Furthermore, passive tags size can also be quite
small. By the new technology findings, about the tags antenna
the size of new passive tags limits to about the size of a
quarter. [2]
Fig 1- RFID Components [10]
II. RFID SECURITY ISSUES
Although the contactless nature of RFID and its fast speed
in affording the information grants a big superiority over
known machine-readable identification method’s, some types
of vulnerabilities are there in RFID systems which make them
permeable to a wide range of attacks. Generally, RFID
security issue and possible attacks can be divided in three
major categories:
 Attacks which affect RFID edge hardware part
 Attacks which affect the communication part
 Attacks which affect the data support part
Radio Frequency Identification (RFID) security
issues and possible solutions
Mohsen Khosravi, Ahmad Sharifi, Dr. Asadullah Shah
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
342
B. RFID Edge hardware
It consists of RFID physical and touchable devices. In
RFID systems two major physical devices are available “tag
and reader”. Tampering vulnerability can be seen in these
devices due to common security weakness in these devices.
[3].
C. Communication part
Information swapping is the major duty of the
communication part. Most of the attacks in this part, are
pointed to radio link. If the attacker can listen in, it can be ease
to modify or jam the signal. The third part of RFID system is
data support part, which connects the RFID reader to database
and is vulnerable for different types of attacks. In each one of
three parts of an RFID system attackers try to break one of this
three security properties:
 Confidentiality
 integrity
 Availability
Confidentiality guaranties that unauthorized hands cannot
access the important information or services. Integrity ensures
that information or services are not touched, altered or
modified by unauthorized hands. Availability guaranties that
information and/or services should be always attainable to all
rightful hands. [4]According to the three general security
properties in RFID systems, possible attacks can be divided in
six general types:
 spoofing identity
 tempering with data
 Repudiation
 information exposure
 denial of service
 looming of privilege
[5] Spoofing occurs when an attacker successfully puts on
as an authorized user of a system and so, for example can
perform an inventory of a store without any authorization
through the scanning the EPC tags. When the attacker
modifies, adds, deletes, or reorders the data, tempering attack
occurs. For example modification of the tag on the passport
while, modifies EPC number on tags in the shopping mall,
kills or erases a tag in supply chain. Repudiation occurs when
a user denies an action and no proof exist to prove that the
action was performed, for example a retailer denies receiving
a certain pallet, case or item or in other example the owner of
the EPC number denies having information about the item to
which the tag is attacked. Information exposure happens when
the information is manifested to an unauthorized user i.e., a
smart bomb placed at a street corner detonates in the time that
a specific person with an RFID-enable passport discovered.
Denial of service occurs when the system denies service to a
valid user and for performing this attack, a tag can be killed,
blocked to shoplifter can take the stolen item out of the shop
or removed and maybe physically destroyed. Looming of
privilege occurs when an unprivileged user or attacker gains
higher privilege in the system than what they are empowered
for example attacker can write or add malicious data in to the
system as an administrator. [6]
Fig 2- Communication
III. POSSIBLE SOLUTIONS
In the previous section, shows several types of attack are
possible to occur in RFID systems. In this section, the most
known security solutions proposed ever will be explained. [7]
 Killing the tag:
The first and easiest solution, when a tag is in the treat is to
kill the tag. Each tag has a unique password, which has
programed in the production time. Once the right password
entered, the tag will be deactivated evermore.
 The solid cage method:
In this method, tag will be isolated from any
electromagnetic waves. This can be gained by using a
container made of metal mesh or foil that is impermeable by
radio signals.
 Blocking a tag:
If more than one tags respond an inquiry sent by a reader, it
figures out a collision, this method is used in the protocols like
ALOHA and tree-walking protocols. [3]
 Classic cryptographic methods:
Cryptography algorithms and methods examples are
rewritable memory, symmetric key encryption and public key
encryption, which are used to keep the system secure. [7]
 Using hash function:
One of the most proposed methods for preserving the RFID
system security is to use the hash function schemes like hash
lock scheme, randomized hash lock scheme and hash chain
scheme. [8]In addition to the named methods for maintaining
RFID systems security and privacy some types of protocols
like PRF private authentication scheme, tree-based private
authentication, delegation tree, human protocols are
proposed. [9]
IV. CONCLUSION
Although, today the RFID technology can be seen
everywhere with different types of applications, but there are
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
343
drawbacks and security issues yet that technology has not
find perfect solutions for them this security issues make the
society unwilling to accept the RFID systems with open arms
in the case of sensitive applications like banking card. So if
security and privacy problems be solved completely then the
technology can guaranty the safety of the applicants curtail
information which will lead to raise of the users satisfactory
and of course more RFID universalization.
REFERENCES
[1] Knospe, H. and H. Pohl, RFID security. Information Security
Technical Report, 2004. 9(4): p. 39-50.
[2] LIU, L.M.N.a.Y., LANDMARKING: Indoor location Sensing
Using Active RFID. Kluwer Academic Publisher.
manufactured in nwtherlands, 2004. 10: p. 10.
[3] Weinstein, R., RFID: a technical overview and its application
to the enterprise. IT professional, 2005. 7(3): p. 27-33.
[4] Mitrokotsa, A., M. Beye, and P. Peris-Lopez, Classification of
RFID Threats based on Security Principles.
[5] Thompson, T., D.R., N. Chaudhry, and C.W. Thompson. RFID
security threat model. in Conf. on Applied Research in
Information Technology. 2006.
[6] Duc, D.N., et al. Open issues in RFID security. in Internet
Technology and Secured Transactions, 2009. ICITST 2009.
International Conference for. 2009. IEEE.
[7] Pedro Peris-Lopez, J.C.H.-C., Juan M. Estevez-Tapiador, and
Arturo Ribagorda, RFID SYSTEMS: A Survey on Security
Thereats and Proposed Solutions. p. cuenca nad l. orozco-
barbosa (Eds): PWC 2006, LNCS 4217, pp. 159-170, 2006
[8] Li, Y.Z., et al. Security and privacy on authentication protocol
for low-cost RFID. in Computational Intelligence and Security,
2006 International Conference on. 2006. IEEE.
[9] IFIP international federation for information processing 2006,
2006: p. 159-170.
[10] www.digitivity.com
AUTHOR’S PROFILE
Mohsen Khosravi. He is PhD student in the Information Technology
department of Information and Communication Technology (KICT) of
International Islamic University Malaysia (IIUM). He has received his
master of Information Technology from Jawaharlal Nehru Technological
University (JNTU), Hyderabad, India. His bachelor is software engineering
from Azad university of Lahijan, Iran. His fields of interests are ADHOC,
WSN and RFID that he works on it specially.
Ahmad Sharifi. He has received M.Tech in Computer Networks and
Information Security from Jawaharlal Nehru Technological University
(JNTU), Hyderabad, India. In addition, he has received his bachelor in
Electronic engineering from industrial university of Shahroud, Iran. Ahmad
has professional experiences on technical engineering on ISP and network
designs for many years. In addition, he is involving with teaching in
universities. He interests in Cryptography, WSN, ADHOC, MATLAB,
OPNET and other related issues. His personal website is
www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC
www.ripe.net via www.sharifisp.com that is Internet Service Provider.
PROF. DR. ASADULAH SHAH.
He is Professor at Department of Computer Science, Kulliyyah of
Information and Communication Technology, IIU Malaysia. Dr. Shah has a
total of 24 years teaching and research experience. He has 60 research
publications in International and national journals and conference
proceedings. Dr. Shah has done his undergraduate degree in Electronics,
Master’s degree in Computer Technology from the University of Sindh, and
PhD in Multimedia Communication, from the University of Surrey,
England, UK. His areas of interest are multimedia compression techniques,
research methodologies, speech packetization and statistical
multiplexing. He has been teaching courses in the fields of electronics,
computers, telecommunications and management sciences.

More Related Content

What's hot

Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFIDijtsrd
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
 
RFID
RFIDRFID
RFIDdont
 

What's hot (19)

Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID
RFIDRFID
RFID
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFID
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
Rfid
RfidRfid
Rfid
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID
RFIDRFID
RFID
 
RFID
RFID RFID
RFID
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
RFID
RFIDRFID
RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 

Viewers also liked

Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiProvincia Di Teramo
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksAhmad Sharifi
 
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezProvincia Di Teramo
 
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Provincia Di Teramo
 
Di flavio presentazione status-ercip
Di flavio  presentazione status-ercipDi flavio  presentazione status-ercip
Di flavio presentazione status-ercipProvincia Di Teramo
 
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Provincia Di Teramo
 
Deal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioDeal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioAhmad Sharifi
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TEProvincia Di Teramo
 
I ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoI ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoProvincia Di Teramo
 
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràIl Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràProvincia Di Teramo
 
Progetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProgetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProvincia Di Teramo
 
Reto de La Conectividad
Reto de La ConectividadReto de La Conectividad
Reto de La ConectividadNatyLiza
 

Viewers also liked (19)

Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
 
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
 
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
 
Di flavio presentazione status-ercip
Di flavio  presentazione status-ercipDi flavio  presentazione status-ercip
Di flavio presentazione status-ercip
 
Il progetto ercip
Il progetto ercipIl progetto ercip
Il progetto ercip
 
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
 
Deal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioDeal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radio
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE
 
I ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoI ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordino
 
Fiume Tordino - Flora e fauna
Fiume Tordino - Flora e faunaFiume Tordino - Flora e fauna
Fiume Tordino - Flora e fauna
 
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràIl Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
 
Progetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProgetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismico
 
Reto de La Conectividad
Reto de La ConectividadReto de La Conectividad
Reto de La Conectividad
 

Similar to Radio Frequency Identification (RFID) Security issues and possible solutions

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfManju Badiger
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEcscpconf
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemIJMTST Journal
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 

Similar to Radio Frequency Identification (RFID) Security issues and possible solutions (20)

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Rfid3
Rfid3Rfid3
Rfid3
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Radio Frequency Identification (RFID) Security issues and possible solutions

  • 1. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 341 Abstract— Radio-frequency identification (RFID) has become popular for automated identification and tracking of objects, goods and people. As the applications of RFID are expanding every day, new security issues also will be appeared. This paper speaks about fundamentals of RFID systems and security issues which can be raised in each one of the RFID architecture parts, as a wireless communication technology. This paper emphasize on the requirement of security in each special type of RFID systems applications, different kind of treats which can influence the security and safety of the RFID applicants and the last improvements of existing security and privacy methods and protocols. Index Terms— Reader, RFID, Security, Tag. I. INTRODUCTION Radio-frequency identification (RFID) is an automatic identification and data capturing technology, which can be used in different fields in order to identify and track goods and people. The history of RFID returns to around 70 years back in Second World War which RFID was used to identify enemy aircraft. However, today’s RFID applications are somehow different with its initial applications. Undoubtedly new applications of RFID have made a revolution in inventory and automation processes; RFID can be seen everywhere from supply chain inventory to animal identification, from health care management to RFID enable passports or in a supermarket like a barcode for goods. A. RFID Fundamental RFID system has at least a tag and a reader. A tag consists of a microchip, capacitors and an antenna coil. A tag communicates with an RFID reader through radio signals. RFID reader is used in order to do the tag inquiries and grasp the needed information from the tag. The reader sends out some radio waves to interrogate the tag. [1] These radio waves are emitted by reader’s antenna then RFID tag replies the radio waves while in the other side the reader is connected to a backend database which processes the information’s sent by the tag. RFID tag's microchip saves the information that are important like product code, id number or any information which must be retrieved by the reader. RFID tags are two general types: passive and active.  Passive tags: this type of tags does not need battery to work. They generate power from a signal of an outer reader. The passive tags reflect the radio frequency signal transmitted to them from a reader then add information by modulating the reflected signal, and obtain power from the signal of an external reader. The most known application of passive tags is to replace the customary barcode technology (with some important advantages in compare to barcode) and has much lighter weight and chipper price in compare with active tag, and also virtually its effective lifetime is infinite .nevertheless on the other side, read ranges of passive tags is very limited. [2]  Active tags: are battery-powered tags (usually on-board battery) and so having more transmission range and stronger signal in compare with the passive tags. That is why the readers can touch them from longer distance. [3]The onboard power supply increases the size and price of the active tags so active tags are larger and more expensive than the passive tags, thus large items tracked over long distance are the best operational platform for active tags. In comparison of two tags, it is obvious that passive tags are very inexpensive. Today each piece of passive tags is around 20 cents which seems a reasonable price to integrate into common materials and products, although technology is trying to make them chipper. Furthermore, passive tags size can also be quite small. By the new technology findings, about the tags antenna the size of new passive tags limits to about the size of a quarter. [2] Fig 1- RFID Components [10] II. RFID SECURITY ISSUES Although the contactless nature of RFID and its fast speed in affording the information grants a big superiority over known machine-readable identification method’s, some types of vulnerabilities are there in RFID systems which make them permeable to a wide range of attacks. Generally, RFID security issue and possible attacks can be divided in three major categories:  Attacks which affect RFID edge hardware part  Attacks which affect the communication part  Attacks which affect the data support part Radio Frequency Identification (RFID) security issues and possible solutions Mohsen Khosravi, Ahmad Sharifi, Dr. Asadullah Shah
  • 2. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 342 B. RFID Edge hardware It consists of RFID physical and touchable devices. In RFID systems two major physical devices are available “tag and reader”. Tampering vulnerability can be seen in these devices due to common security weakness in these devices. [3]. C. Communication part Information swapping is the major duty of the communication part. Most of the attacks in this part, are pointed to radio link. If the attacker can listen in, it can be ease to modify or jam the signal. The third part of RFID system is data support part, which connects the RFID reader to database and is vulnerable for different types of attacks. In each one of three parts of an RFID system attackers try to break one of this three security properties:  Confidentiality  integrity  Availability Confidentiality guaranties that unauthorized hands cannot access the important information or services. Integrity ensures that information or services are not touched, altered or modified by unauthorized hands. Availability guaranties that information and/or services should be always attainable to all rightful hands. [4]According to the three general security properties in RFID systems, possible attacks can be divided in six general types:  spoofing identity  tempering with data  Repudiation  information exposure  denial of service  looming of privilege [5] Spoofing occurs when an attacker successfully puts on as an authorized user of a system and so, for example can perform an inventory of a store without any authorization through the scanning the EPC tags. When the attacker modifies, adds, deletes, or reorders the data, tempering attack occurs. For example modification of the tag on the passport while, modifies EPC number on tags in the shopping mall, kills or erases a tag in supply chain. Repudiation occurs when a user denies an action and no proof exist to prove that the action was performed, for example a retailer denies receiving a certain pallet, case or item or in other example the owner of the EPC number denies having information about the item to which the tag is attacked. Information exposure happens when the information is manifested to an unauthorized user i.e., a smart bomb placed at a street corner detonates in the time that a specific person with an RFID-enable passport discovered. Denial of service occurs when the system denies service to a valid user and for performing this attack, a tag can be killed, blocked to shoplifter can take the stolen item out of the shop or removed and maybe physically destroyed. Looming of privilege occurs when an unprivileged user or attacker gains higher privilege in the system than what they are empowered for example attacker can write or add malicious data in to the system as an administrator. [6] Fig 2- Communication III. POSSIBLE SOLUTIONS In the previous section, shows several types of attack are possible to occur in RFID systems. In this section, the most known security solutions proposed ever will be explained. [7]  Killing the tag: The first and easiest solution, when a tag is in the treat is to kill the tag. Each tag has a unique password, which has programed in the production time. Once the right password entered, the tag will be deactivated evermore.  The solid cage method: In this method, tag will be isolated from any electromagnetic waves. This can be gained by using a container made of metal mesh or foil that is impermeable by radio signals.  Blocking a tag: If more than one tags respond an inquiry sent by a reader, it figures out a collision, this method is used in the protocols like ALOHA and tree-walking protocols. [3]  Classic cryptographic methods: Cryptography algorithms and methods examples are rewritable memory, symmetric key encryption and public key encryption, which are used to keep the system secure. [7]  Using hash function: One of the most proposed methods for preserving the RFID system security is to use the hash function schemes like hash lock scheme, randomized hash lock scheme and hash chain scheme. [8]In addition to the named methods for maintaining RFID systems security and privacy some types of protocols like PRF private authentication scheme, tree-based private authentication, delegation tree, human protocols are proposed. [9] IV. CONCLUSION Although, today the RFID technology can be seen everywhere with different types of applications, but there are
  • 3. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 343 drawbacks and security issues yet that technology has not find perfect solutions for them this security issues make the society unwilling to accept the RFID systems with open arms in the case of sensitive applications like banking card. So if security and privacy problems be solved completely then the technology can guaranty the safety of the applicants curtail information which will lead to raise of the users satisfactory and of course more RFID universalization. REFERENCES [1] Knospe, H. and H. Pohl, RFID security. Information Security Technical Report, 2004. 9(4): p. 39-50. [2] LIU, L.M.N.a.Y., LANDMARKING: Indoor location Sensing Using Active RFID. Kluwer Academic Publisher. manufactured in nwtherlands, 2004. 10: p. 10. [3] Weinstein, R., RFID: a technical overview and its application to the enterprise. IT professional, 2005. 7(3): p. 27-33. [4] Mitrokotsa, A., M. Beye, and P. Peris-Lopez, Classification of RFID Threats based on Security Principles. [5] Thompson, T., D.R., N. Chaudhry, and C.W. Thompson. RFID security threat model. in Conf. on Applied Research in Information Technology. 2006. [6] Duc, D.N., et al. Open issues in RFID security. in Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for. 2009. IEEE. [7] Pedro Peris-Lopez, J.C.H.-C., Juan M. Estevez-Tapiador, and Arturo Ribagorda, RFID SYSTEMS: A Survey on Security Thereats and Proposed Solutions. p. cuenca nad l. orozco- barbosa (Eds): PWC 2006, LNCS 4217, pp. 159-170, 2006 [8] Li, Y.Z., et al. Security and privacy on authentication protocol for low-cost RFID. in Computational Intelligence and Security, 2006 International Conference on. 2006. IEEE. [9] IFIP international federation for information processing 2006, 2006: p. 159-170. [10] www.digitivity.com AUTHOR’S PROFILE Mohsen Khosravi. He is PhD student in the Information Technology department of Information and Communication Technology (KICT) of International Islamic University Malaysia (IIUM). He has received his master of Information Technology from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. His bachelor is software engineering from Azad university of Lahijan, Iran. His fields of interests are ADHOC, WSN and RFID that he works on it specially. Ahmad Sharifi. He has received M.Tech in Computer Networks and Information Security from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. In addition, he has received his bachelor in Electronic engineering from industrial university of Shahroud, Iran. Ahmad has professional experiences on technical engineering on ISP and network designs for many years. In addition, he is involving with teaching in universities. He interests in Cryptography, WSN, ADHOC, MATLAB, OPNET and other related issues. His personal website is www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC www.ripe.net via www.sharifisp.com that is Internet Service Provider. PROF. DR. ASADULAH SHAH. He is Professor at Department of Computer Science, Kulliyyah of Information and Communication Technology, IIU Malaysia. Dr. Shah has a total of 24 years teaching and research experience. He has 60 research publications in International and national journals and conference proceedings. Dr. Shah has done his undergraduate degree in Electronics, Master’s degree in Computer Technology from the University of Sindh, and PhD in Multimedia Communication, from the University of Surrey, England, UK. His areas of interest are multimedia compression techniques, research methodologies, speech packetization and statistical multiplexing. He has been teaching courses in the fields of electronics, computers, telecommunications and management sciences.