Survivable RFID Systems: Issues, Challenges, and Techniques
Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities f...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on human-machine systems 2010-07, Vol.40 (4), p.406-418 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 418 |
---|---|
container_issue | 4 |
container_start_page | 406 |
container_title | IEEE transactions on human-machine systems |
container_volume | 40 |
creator | Zuo, Yanjun |
description | Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions. |
doi_str_mv | 10.1109/TSMCC.2010.2043949 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TSMCC_2010_2043949</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5440949</ieee_id><sourcerecordid>2717128331</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFb_gF4CHryYut8fepJotVARbD0v2-zGpqRJ3U0K_fdubPHgaWeZ550ZHgAuERwhBNXdfPaWZSMM4x9DShRVR2CAGJMpphQfxxoqmnIlxCk4C2EFIaJUkQF4mHV-W27NonLJx3jylMx2oXXrcJ9MQuhcuE2ypakqV3_1taltMnf5si6_Y-8cnBSmCu7i8A7B5_h5nr2m0_eXSfY4TXOCRZtSruTCMMyJZIxypljOVUG5kMoSVljMrERWMSpsUSAkjHXWciOMZCYXLCdDcLOfu_FNv7fV6zLkrqpM7ZouaMEIFwITGMnrf-Sq6Xwdj9MIYoGRjG4ihfdU7psQvCv0xpdr43cR0r1O_atT9zr1QWcMXe1DpXPuL8AohX33B3x-brw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1027218439</pqid></control><display><type>article</type><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><source>IEEE Electronic Library (IEL)</source><creator>Zuo, Yanjun</creator><creatorcontrib>Zuo, Yanjun</creatorcontrib><description>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</description><identifier>ISSN: 1094-6977</identifier><identifier>ISSN: 2168-2291</identifier><identifier>EISSN: 1558-2442</identifier><identifier>EISSN: 2168-2305</identifier><identifier>DOI: 10.1109/TSMCC.2010.2043949</identifier><identifier>CODEN: ITCRFH</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Attack ; Automatic identification ; Bar codes ; Cybernetics ; Data security ; Frequency ; Health care ; Medical services ; Power system security ; Privacy ; Proposals ; Radio frequency identification ; radio frequency identification (RFID) ; Radiofrequency identification ; Readers ; recovery ; RFID tags ; Stockpiling ; Survivability ; Tags ; Tracking ; Ubiquitous computing ; Usability</subject><ispartof>IEEE transactions on human-machine systems, 2010-07, Vol.40 (4), p.406-418</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</citedby><cites>FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5440949$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5440949$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zuo, Yanjun</creatorcontrib><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><title>IEEE transactions on human-machine systems</title><addtitle>TSMCC</addtitle><description>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</description><subject>Attack</subject><subject>Automatic identification</subject><subject>Bar codes</subject><subject>Cybernetics</subject><subject>Data security</subject><subject>Frequency</subject><subject>Health care</subject><subject>Medical services</subject><subject>Power system security</subject><subject>Privacy</subject><subject>Proposals</subject><subject>Radio frequency identification</subject><subject>radio frequency identification (RFID)</subject><subject>Radiofrequency identification</subject><subject>Readers</subject><subject>recovery</subject><subject>RFID tags</subject><subject>Stockpiling</subject><subject>Survivability</subject><subject>Tags</subject><subject>Tracking</subject><subject>Ubiquitous computing</subject><subject>Usability</subject><issn>1094-6977</issn><issn>2168-2291</issn><issn>1558-2442</issn><issn>2168-2305</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFb_gF4CHryYut8fepJotVARbD0v2-zGpqRJ3U0K_fdubPHgaWeZ550ZHgAuERwhBNXdfPaWZSMM4x9DShRVR2CAGJMpphQfxxoqmnIlxCk4C2EFIaJUkQF4mHV-W27NonLJx3jylMx2oXXrcJ9MQuhcuE2ypakqV3_1taltMnf5si6_Y-8cnBSmCu7i8A7B5_h5nr2m0_eXSfY4TXOCRZtSruTCMMyJZIxypljOVUG5kMoSVljMrERWMSpsUSAkjHXWciOMZCYXLCdDcLOfu_FNv7fV6zLkrqpM7ZouaMEIFwITGMnrf-Sq6Xwdj9MIYoGRjG4ihfdU7psQvCv0xpdr43cR0r1O_atT9zr1QWcMXe1DpXPuL8AohX33B3x-brw</recordid><startdate>201007</startdate><enddate>201007</enddate><creator>Zuo, Yanjun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201007</creationdate><title>Survivable RFID Systems: Issues, Challenges, and Techniques</title><author>Zuo, Yanjun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-4698ba526385546595c69f46789d35fd25d81d9547dff117adedd6a7a85ac75c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Attack</topic><topic>Automatic identification</topic><topic>Bar codes</topic><topic>Cybernetics</topic><topic>Data security</topic><topic>Frequency</topic><topic>Health care</topic><topic>Medical services</topic><topic>Power system security</topic><topic>Privacy</topic><topic>Proposals</topic><topic>Radio frequency identification</topic><topic>radio frequency identification (RFID)</topic><topic>Radiofrequency identification</topic><topic>Readers</topic><topic>recovery</topic><topic>RFID tags</topic><topic>Stockpiling</topic><topic>Survivability</topic><topic>Tags</topic><topic>Tracking</topic><topic>Ubiquitous computing</topic><topic>Usability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zuo, Yanjun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on human-machine systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zuo, Yanjun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survivable RFID Systems: Issues, Challenges, and Techniques</atitle><jtitle>IEEE transactions on human-machine systems</jtitle><stitle>TSMCC</stitle><date>2010-07</date><risdate>2010</risdate><volume>40</volume><issue>4</issue><spage>406</spage><epage>418</epage><pages>406-418</pages><issn>1094-6977</issn><issn>2168-2291</issn><eissn>1558-2442</eissn><eissn>2168-2305</eissn><coden>ITCRFH</coden><abstract>Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted RFID tags and mobile hand-held readers, however, various risks could threaten their abilities to provide essential services to users. High mobility of the RFID system components and the open nature make an RFID system vulnerable to various attacks. Currently, although some techniques exist that might help improve survivability; there is still no complete proposal on survivability of an RFID system despite its growing popularity and importance in many applications. In this paper, we study survivability issues related to RFID systems and survey existing techniques whose usability and adaptability toward survivability would be beneficial. Survivability is defined as the ability of a system to continuously provide essential services to support the system's mission even in the presence of malicious attacks or system failures. We discuss the issues and challenges in developing survivable RFID systems and propose research directions.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TSMCC.2010.2043949</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1094-6977 |
ispartof | IEEE transactions on human-machine systems, 2010-07, Vol.40 (4), p.406-418 |
issn | 1094-6977 2168-2291 1558-2442 2168-2305 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TSMCC_2010_2043949 |
source | IEEE Electronic Library (IEL) |
subjects | Attack Automatic identification Bar codes Cybernetics Data security Frequency Health care Medical services Power system security Privacy Proposals Radio frequency identification radio frequency identification (RFID) Radiofrequency identification Readers recovery RFID tags Stockpiling Survivability Tags Tracking Ubiquitous computing Usability |
title | Survivable RFID Systems: Issues, Challenges, and Techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T10%3A41%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survivable%20RFID%20Systems:%20Issues,%20Challenges,%20and%20Techniques&rft.jtitle=IEEE%20transactions%20on%20human-machine%20systems&rft.au=Zuo,%20Yanjun&rft.date=2010-07&rft.volume=40&rft.issue=4&rft.spage=406&rft.epage=418&rft.pages=406-418&rft.issn=1094-6977&rft.eissn=1558-2442&rft.coden=ITCRFH&rft_id=info:doi/10.1109/TSMCC.2010.2043949&rft_dat=%3Cproquest_RIE%3E2717128331%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1027218439&rft_id=info:pmid/&rft_ieee_id=5440949&rfr_iscdi=true |