Open Access

RECONSTRUCTING TRUST IN RFID INFRASTRUCTURES: A COMPREHENSIVE ANALYSIS OF SECURITY, PRIVACY, AND AUTHENTICATION IN CONTEMPORARY RADIO FREQUENCY IDENTIFICATION SYSTEMS

4 Universidad Nacional de La Plata, Argentina

Abstract

Radio Frequency Identification (RFID) has evolved from a narrowly defined supply-chain automation tool into a foundational technology for ubiquitous computing, logistics, identity management, retail, transportation, and cyber-physical systems. This expansion has also transformed RFID into a critical site of security and privacy risk. Because RFID tags are inexpensive, resource-constrained, and often deployed at massive scale, they are exposed to a wide range of adversarial threats including tracking, cloning, eavesdropping, unauthorized interrogation, replay attacks, ownership fraud, and covert surveillance. At the same time, RFID infrastructures are increasingly integrated with sensitive economic and governmental processes such as banknotes, passports, retail authentication, and access control systems. These developments have created a structural tension between the demand for frictionless identification and the need for strong cryptographic protection and privacy preservation.

This article provides a comprehensive and theoretically grounded investigation of RFID security and privacy grounded strictly in the canonical technical and cryptographic literature provided in the reference set. Drawing on foundational work on RFID architectures, privacy threats, cryptographic primitives, authentication protocols, and ownership transfer mechanisms, the article constructs a unified analytical framework for understanding how trust is produced, attacked, and repaired in RFID ecosystems. The study integrates system-level perspectives from EPCglobal and MIT Auto-ID with cryptographic approaches such as universal re-encryption, minimalist mutual authentication, and Gen2-compliant privacy-preserving protocols.

Through detailed theoretical elaboration, this article demonstrates that RFID security is not simply a technical problem but a socio-technical one, where the material constraints of tags, the economic imperatives of mass deployment, and the political importance of personal data intersect. The results show that while significant progress has been made in authentication and privacy protection, structural vulnerabilities remain, especially in ownership transfer, ultra-lightweight cryptography, and large-scale interoperability. The article concludes by identifying future research directions that are required to reconcile scalability, usability, and cryptographic rigor in next-generation RFID infrastructures.

Keywords

References

πŸ“„ Chen, C.-L., and Deng, Y.-Y. Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence, Elsevier, 2008.
πŸ“„ EPCglobal Inc. EPCglobal Inc. http://www.epcglobalinc.org/.
πŸ“„ EPCglobal Inc. EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocols for Communications at 860 MHz – 960 MHz version 1.1.0, 2009.
πŸ“„ Golle, P., Jakobsson, M., Juels, A., and Syverson, P. Universal re-encryption for mixnets. In Okamoto, T. (ed.), RSA Conference Cryptographers’ Track, LNCS 2964, Springer-Verlag, 2004.
πŸ“„ Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., and Scherer, R.W. Crossing borders: Security and privacy issues of the European e-passport. IWSEC 2006, LNCS 4266, Springer-Heidelberg, 2006.
πŸ“„ Juels, A., and Pappu, R. Squealing euros: Privacy protection in RFID-enabled banknotes. Financial Cryptography, 2003.
πŸ“„ Lim, C.H., and Kwon, T. Strong and robust RFID authentication enabling perfect ownership transfer. ICICS 2006, LNCS 4307, 2006.
πŸ“„ MirzaeeHossein, and Pourzaki, A. On-Chip Passive Devices Technology: Component's Characteristics, Fabrication and Commercialization. International Review on Computers and Software, 6(3), 2011.
πŸ“„ MIT Auto-ID. MIT Auto-ID Center. http://autoidlabs.mit.edu, 2004.
πŸ“„ Molnar, D., and Wagner, D. Privacy and Security in Library RFID: Issues, Practices, and Architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004.
πŸ“„ Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A. Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54, 2010.
πŸ“„ Phan, R. Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 2009.
πŸ“„ Qingling, C., Yiju, Z., and Yonghua, W. A minimalist mutual authentication protocol for RFID system and ban logic analysis. ISECS International Colloquium on Computing, Communication, Control and Management, 2008.
πŸ“„ Roberts, C.M. Radio Frequency Identification (RFID). Computers & Security, 25, 2006.
πŸ“„ Sarma, S., Weis, S., and Engels, D. RFID Systems and Security and Privacy Implications. Proceedings of the Fourth International Workshop on Cryptographic Hardware and Embedded Systems, 2002.
πŸ“„ Sun, H.-M., and Ting, W.-C. A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 2009.
πŸ“„ Van Deursen, T., and Radomirovic, S. Attacks on RFID protocols. Cryptology ePrint Archive Report 2008/310, 2008.
πŸ“„ Wyld, D.C. 24-Karat protection: RFID and retail jewelry marketing. International Journal of UbiComp, 1(1), 2010.
πŸ“„ Zhong, X. International Review on Computers and Software, 7(1), 2012.
πŸ“„ Jun-Jiat Tiang, Tien-Sze Lim, and Fabian Kung. International Review on Computers and Software, 7(1), 2012.
πŸ“„ Khedo, K.K., Sathan, D., Elaheebocus, R., Subramanian, R.K., and Rughooputh, S.D.V. Overlapping zone partitioning localization technique for RFID. International Journal of UbiComp, 1(2), 2010.
πŸ“„ Australia, E.-C. Access control, sensor control, and trans-ponders. 2008.

Similar Articles

1-10 of 15

You may also start an advanced similarity search for this article.