Abstract

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features isimportant at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Methods: The systematic mapping for a specific search are was done by identifying the number of RQs. These RQs help researchers obtain comprehensive related studies. The RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Results: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically chose and deeply analyzed all concepts related (RFID) techniques and implementation methods which provide a complete about the (RFID) state and environment of studies.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.