Survivable RFID Systems: Issues, Challenges, and Techniques

Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on human-machine systems 2010-07, Vol.40 (4), p.406-418
1. Verfasser: Zuo, Yanjun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 418
container_issue 4
container_start_page 406
container_title IEEE transactions on human-machine systems
container_volume 40
creator Zuo, Yanjun
description Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.
doi_str_mv 10.1109/TSMCC.2010.2043949
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TSMCC_2010_2043949</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5440949</ieee_id><sourcerecordid>2717128331</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFb_gF4CHryYut8fepJotVARbD0v2-zGpqRJ3U0K_fdubPHgaWeZ550ZHgAuERwhBNXdfPaWZSMM4x9DShRVR2CAGJMpphQfxxoqmnIlxCk4C2EFIaJUkQF4mHV-W27NonLJx3jylMx2oXXrcJ9MQuhcuE2ypakqV3_1taltMnf5si6_Y-8cnBSmCu7i8A7B5_h5nr2m0_eXSfY4TXOCRZtSruTCMMyJZIxypljOVUG5kMoSVljMrERWMSpsUSAkjHXWciOMZCYXLCdDcLOfu_FNv7fV6zLkrqpM7ZouaMEIFwITGMnrf-Sq6Xwdj9MIYoGRjG4ihfdU7psQvCv0xpdr43cR0r1O_atT9zr1QWcMXe1DpXPuL8AohX33B3x-brw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1027218439</pqid></control><display><type>article</type><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><source>IEEE Electronic Library (IEL)</source><creator>Zuo, Yanjun</creator><creatorcontrib>Zuo, Yanjun</creatorcontrib><description>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</description><identifier>ISSN: 1094-6977</identifier><identifier>ISSN: 2168-2291</identifier><identifier>EISSN: 1558-2442</identifier><identifier>EISSN: 2168-2305</identifier><identifier>DOI: 10.1109/TSMCC.2010.2043949</identifier><identifier>CODEN: ITCRFH</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Attack ; Automatic identification ; Bar codes ; Cybernetics ; Data security ; Frequency ; Health care ; Medical services ; Power system security ; Privacy ; Proposals ; Radio frequency identification ; radio frequency identification (RFID) ; Radiofrequency identification ; Readers ; recovery ; RFID tags ; Stockpiling ; Survivability ; Tags ; Tracking ; Ubiquitous computing ; Usability</subject><ispartof>IEEE transactions on human-machine systems, 2010-07, Vol.40 (4), p.406-418</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</citedby><cites>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5440949$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5440949$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zuo, Yanjun</creatorcontrib><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><title>IEEE transactions on human-machine systems</title><addtitle>TSMCC</addtitle><description>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</description><subject>Attack</subject><subject>Automatic identification</subject><subject>Bar codes</subject><subject>Cybernetics</subject><subject>Data security</subject><subject>Frequency</subject><subject>Health care</subject><subject>Medical services</subject><subject>Power system security</subject><subject>Privacy</subject><subject>Proposals</subject><subject>Radio frequency identification</subject><subject>radio frequency identification (RFID)</subject><subject>Radiofrequency identification</subject><subject>Readers</subject><subject>recovery</subject><subject>RFID tags</subject><subject>Stockpiling</subject><subject>Survivability</subject><subject>Tags</subject><subject>Tracking</subject><subject>Ubiquitous computing</subject><subject>Usability</subject><issn>1094-6977</issn><issn>2168-2291</issn><issn>1558-2442</issn><issn>2168-2305</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFb_gF4CHryYut8fepJotVARbD0v2-zGpqRJ3U0K_fdubPHgaWeZ550ZHgAuERwhBNXdfPaWZSMM4x9DShRVR2CAGJMpphQfxxoqmnIlxCk4C2EFIaJUkQF4mHV-W27NonLJx3jylMx2oXXrcJ9MQuhcuE2ypakqV3_1taltMnf5si6_Y-8cnBSmCu7i8A7B5_h5nr2m0_eXSfY4TXOCRZtSruTCMMyJZIxypljOVUG5kMoSVljMrERWMSpsUSAkjHXWciOMZCYXLCdDcLOfu_FNv7fV6zLkrqpM7ZouaMEIFwITGMnrf-Sq6Xwdj9MIYoGRjG4ihfdU7psQvCv0xpdr43cR0r1O_atT9zr1QWcMXe1DpXPuL8AohX33B3x-brw</recordid><startdate>201007</startdate><enddate>201007</enddate><creator>Zuo, Yanjun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201007</creationdate><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><author>Zuo, Yanjun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Attack</topic><topic>Automatic identification</topic><topic>Bar codes</topic><topic>Cybernetics</topic><topic>Data security</topic><topic>Frequency</topic><topic>Health care</topic><topic>Medical services</topic><topic>Power system security</topic><topic>Privacy</topic><topic>Proposals</topic><topic>Radio frequency identification</topic><topic>radio frequency identification (RFID)</topic><topic>Radiofrequency identification</topic><topic>Readers</topic><topic>recovery</topic><topic>RFID tags</topic><topic>Stockpiling</topic><topic>Survivability</topic><topic>Tags</topic><topic>Tracking</topic><topic>Ubiquitous computing</topic><topic>Usability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zuo, Yanjun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on human-machine systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zuo, Yanjun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survivable RFID Systems: Issues, Challenges, and Techniques</atitle><jtitle>IEEE transactions on human-machine systems</jtitle><stitle>TSMCC</stitle><date>2010-07</date><risdate>2010</risdate><volume>40</volume><issue>4</issue><spage>406</spage><epage>418</epage><pages>406-418</pages><issn>1094-6977</issn><issn>2168-2291</issn><eissn>1558-2442</eissn><eissn>2168-2305</eissn><coden>ITCRFH</coden><abstract>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TSMCC.2010.2043949</doi><tpages>13</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1094-6977
ispartof IEEE transactions on human-machine systems, 2010-07, Vol.40 (4), p.406-418
issn 1094-6977
2168-2291
1558-2442
2168-2305
language eng
recordid cdi_crossref_primary_10_1109_TSMCC_2010_2043949
source IEEE Electronic Library (IEL)
subjects Attack
Automatic identification
Bar codes
Cybernetics
Data security
Frequency
Health care
Medical services
Power system security
Privacy
Proposals
Radio frequency identification
radio frequency identification (RFID)
Radiofrequency identification
Readers
recovery
RFID tags
Stockpiling
Survivability
Tags
Tracking
Ubiquitous computing
Usability
title Survivable RFID Systems: Issues, Challenges, and Techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T10%3A41%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survivable%20RFID%20Systems:%20Issues,%20Challenges,%20and%20Techniques&rft.jtitle=IEEE%20transactions%20on%20human-machine%20systems&rft.au=Zuo,%20Yanjun&rft.date=2010-07&rft.volume=40&rft.issue=4&rft.spage=406&rft.epage=418&rft.pages=406-418&rft.issn=1094-6977&rft.eissn=1558-2442&rft.coden=ITCRFH&rft_id=info:doi/10.1109/TSMCC.2010.2043949&rft_dat=%3Cproquest_RIE%3E2717128331%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1027218439&rft_id=info:pmid/&rft_ieee_id=5440949&rfr_iscdi=true