Internet of Things Security: A review on the RFID contactless security protocols
- Published
- Accepted
- Subject Areas
- Embedded Computing, Mobile and Ubiquitous Computing, Security and Privacy
- Keywords
- Internet of Things, RFID, contactless, chipless, sensor networks, ECC-based authentication, Dual chip
- Copyright
- © 2018 Outteridge
- Licence
- This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
- Cite this article
- 2018. Internet of Things Security: A review on the RFID contactless security protocols. PeerJ Preprints 6:e26504v1 https://doi.org/10.7287/peerj.preprints.26504v1
Abstract
The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the ever-changing security protocols. The Radio Frequency Identification (RFID) technology has recently gained popularity in the world of IoT, this is due to the RFID chips involvement within credit and debit cards to allow them to become contactless. This survey will produce an in-depth discussion about the background of RFID, the relevance of RFID in today's society, related work, the advantages and disadvantages of RFID and finally a solution to the RFID contactless.
Author Comment
I realise that the paper might not be fully in the scope of PeerJ CS, but I only intend to submit a preprint.