Evaluation of security risks in radio frequency identification (RFID) systems is a challenging problem in Internet of Things (IoT). This paper proposes an extended attack tree (EAT) model to identify RFID system's flaws and vulnerabilities. A corresponding formal descri... View more
Habibi, M. H., Aref, M. R.. Attacks on recent RFID authentication protocols.
Journal of Signal Processing Systems. 2013; 72 (1): 1-13
Monahan, T., Fisher, J. A.. Implanting inequality: empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices.
International Journal of Technology Assessment in Health Care. 2010; 26 (4): 370-376
Wu, X.-D., Wang, Y.-F., Bai, J.-B., Wang, H.-Y., Chu, C.-H.. RFId application challenges and risk analysis. : 1086-1090
Vivo, M. C., Polzonetti, A., Tapanelli, P.. RFID privacy and security risks: Italian case study.
Advances in Information Technology: Proceedings of the 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. 2013; 409: 173-183
Gandino, F., Montrucchio, B., Rebaudengo, M.. Tampering in RFID: a survey on risks and defenses.
Mobile Networks and Applications. 2010; 15 (4): 502-516
Jiang, R., Luo, J., Wang, X. P.. An attack tree based risk assessment for location privacy in wireless sensor networks. : 1-4
Karpati, P., Redda, Y., Opdahl, A. L., Sindre, G.. Comparing attack trees and misuse cases in an industrial setting.
Information and Software Technology. 2014; 56 (3): 294-308
Luo, H. F., Liu, R. Q., Wang, Y. K.. The security evaluation index architecture and evaluation model with RFID system. ; 462-463: 399-404
Morsi, I., Elsherief, Y., El Zawawi, A.. A security system and employees performance evaluation using RFID sensors and fuzzy logic. : 597-602
Chang, T.-H., Hsu, S.-C., Wang, T.-C.. A proposed model for measuring the aggregative risk degree of implementing an RFID digital campus system with the consistent fuzzy preference relations.
Applied Mathematical Modelling. 2013; 37 (5): 2605-2622