8. Conclusions and outlook
Faced with the challenges posed by the Internet of Things, and the new applications that could result from the widespread tagging of objects, it is vital to address security and privacy issues, and to understand the dangers, technological barriers and current scientific advances. This article provides an overview of RFID technology and current solutions, with their limitations. While symmetrical security solutions - i.e., those based on hash functions (see box "Properties of F hash functions" § 7.2.1) or light cryptography (based on binary operations) - have been very popular with the scientific community, as they are traditionally less resource-intensive than asymmetrical solutions, they suffer from difficulties in scaling up, which is one of the challenges of RFIDs. In some cases, they do not satisfactorily meet resource limitation requirements. Asymmetrical solutions based on asymmetrical...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusions and outlook
Article included in this offer
"Control and systems engineering"
(
143 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!