RFID Security: Attacks, Countermeasures and Challenges

Abstract

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types… (More)

Topics

1 Figure or Table

Statistics

0102030201520162017
Citations per Year

Citation Velocity: 13

Averaging 13 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics