Abstract: As the adoption of Radio Frequency Identification (RFID) technology continues to expand, concerns about its security have grown in significance. And the study of RFID security protocols aims to enhance system security and to provide solutions that can be applied to a variety of scenarios. Therefore, this paper delves into the security protocols employed in RFID technology, investigating their applications across a range of domains such as logistics tracking, financial payments, and access control systems. Besides, through a combination of literature review and comparative analysis, the study provides an in-depth exploration of the working principles, strengths, weaknesses, and suitable use cases of protocols based on cryptography, challenge-response, and time-based mechanisms. The results indicate that cryptography-based protocols perform well in high-security environments such as financial payments, albeit with high computational complexity. Challenge-response-based protocols enhance authentication in access control systems, while time-based protocols successfully mitigate replay attacks through timestamping mechanisms, making them ideal for intelligent transportation systems. In short, each security protocol presents distinctive strengths, and the selection or integration of these protocols should be tailored to specific application scenarios to create more secure and reliable RFID systems.
Read full abstract