Conclusions and outlook
RFID systems: technology, risks, and security solutions
Archive REF: H5325 V1
Conclusions and outlook
RFID systems: technology, risks, and security solutions

Authors : Ethmane EL MOUSTAINE, Maryline LAURENT

Publication date: November 10, 2012 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

8. Conclusions and outlook

Faced with the challenges posed by the Internet of Things, and the new applications that could result from the widespread tagging of objects, it is vital to address security and privacy issues, and to understand the dangers, technological barriers and current scientific advances. This article provides an overview of RFID technology and current solutions, with their limitations. While symmetrical security solutions - i.e., those based on hash functions (see box "Properties of F hash functions" § 7.2.1) or light cryptography (based on binary operations) - have been very popular with the scientific community, as they are traditionally less resource-intensive than asymmetrical solutions, they suffer from difficulties in scaling up, which is one of the challenges of RFIDs. In some cases, they do not satisfactorily meet resource limitation requirements. Asymmetrical solutions based on asymmetrical...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Conclusions and outlook

Article included in this offer

"Control and systems engineering"

( 143 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details