{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:18:38Z","timestamp":1766067518827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508095","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"138-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Survey on Radio Frequency Identification Security and Attacks"],"prefix":"10.1145","author":[{"given":"Turki","family":"Alshammri","sequence":"first","affiliation":[{"name":"Qassim University, Saudi Arabia"}]},{"given":"Mohammed","family":"Albakheet","sequence":"additional","affiliation":[{"name":"Qassim University, Saudi Arabia"}]},{"given":"Ibraheem","family":"Kateeb","sequence":"additional","affiliation":[{"name":"Qassim University, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/JSEN.2013.2293177","article-title":"A battery-assisted sensor-enhanced RFID tag enabling heterogeneous wireless sensor networks","volume":"14","author":"Danilo DE DONNO","year":"2013","unstructured":"DE DONNO , Danilo , CATARINUCCI , Luca , and TARRICON , Lucian . 2013 . A battery-assisted sensor-enhanced RFID tag enabling heterogeneous wireless sensor networks . IEEE Sensors Journal , 14 . 4 : 1048 - 1055 DE DONNO, Danilo, CATARINUCCI, Luca, and TARRICON, Lucian. 2013. A battery-assisted sensor-enhanced RFID tag enabling heterogeneous wireless sensor networks. IEEE Sensors Journal , 14.4: 1048-1055","journal-title":"IEEE Sensors Journal"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1849-x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.06.008"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14738\/tnc.25.431"},{"volume-title":"International Conference on Cryptology And Network Security. Springer","author":"Kim C. H.","key":"e_1_3_2_1_5_1","unstructured":"C. H. Kim and G. Avoine . 2009. RFID distance bounding protocol with mixed challenges to prevent relay attacks . In International Conference on Cryptology And Network Security. Springer , Berlin, Heidelberg C. H. Kim and G. Avoine. 2009. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In International Conference on Cryptology And Network Security. Springer, Berlin, Heidelberg"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.002"},{"volume-title":"2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing","author":"Kapoor G.","key":"e_1_3_2_1_7_1","unstructured":"G. Kapoor , W. Zhou and S. Piramuthu . 2008. Distance bounding protocol for multiple RFID tag authentication . In 2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing G. Kapoor, W. Zhou and S. Piramuthu. 2008. Distance bounding protocol for multiple RFID tag authentication. In 2008 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing"},{"key":"e_1_3_2_1_8_1","volume-title":"a. J. Q. L. Zhou","author":"S.-J. W.-Q.","year":"2015","unstructured":"S.-J. W.-Q. Z. a. J. Q. L. Zhou . 2015 . Survey of privacy of radio frequency identification technology. Journal of Software 26.4 S.-J. W.-Q. Z. a. J. Q. L. Zhou. 2015. Survey of privacy of radio frequency identification technology. Journal of Software 26.4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Roberts and M. Chris. 2006. Radio frequency identification (RFID). Computers & security 25.1 Roberts and M. Chris. 2006. Radio frequency identification (RFID). Computers & security 25.1","DOI":"10.1016\/j.cose.2005.12.003"},{"volume-title":"RFID: a guide to radio frequency identification","author":"Daniel V.","key":"e_1_3_2_1_10_1","unstructured":"Hunt, V. Daniel , A. Albert Puglia and M. Mike Puglia . 2007. RFID: a guide to radio frequency identification , John Wiley & Sons Hunt, V. Daniel, A. Albert Puglia and M. Mike Puglia. 2007. RFID: a guide to radio frequency identification, John Wiley & Sons"},{"volume-title":"Proceedings of the first ACM conference on Wireless network security. ACM","author":"Hancke G. P.","key":"e_1_3_2_1_11_1","unstructured":"G. P. Hancke and M. G. Kuhn . 2008. Attacks on time-of-flight distance bounding channels . In Proceedings of the first ACM conference on Wireless network security. ACM G. P. Hancke and M. G. Kuhn. 2008. Attacks on time-of-flight distance bounding channels. In Proceedings of the first ACM conference on Wireless network security. ACM"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"key":"e_1_3_2_1_13_1","volume-title":"e. a. Peris-Lopez","author":"P.","year":"2009","unstructured":"P. e. a. Peris-Lopez . 2009 . Shedding some light on RFID distance bounding protocols and terrorist attacks P. e. a. Peris-Lopez. 2009. Shedding some light on RFID distance bounding protocols and terrorist attacks"},{"key":"e_1_3_2_1_14_1","volume-title":"Hancke","author":"Bruno","year":"2016","unstructured":"Silva, Bruno and Gerhard P . Hancke . 2016 . IR-UWB-based non-line-of-sight identification in harsh environments: Principles and challenges. IEEE Transactions on Industrial Informatics 12.36 Silva, Bruno and Gerhard P. Hancke. 2016. IR-UWB-based non-line-of-sight identification in harsh environments: Principles and challenges. IEEE Transactions on Industrial Informatics 12.36"},{"volume-title":"International Conference on Wireless Algorithms. Systems and Application. Cham","author":"Zhou Y.","key":"e_1_3_2_1_15_1","unstructured":"Y. Zhou and J. Zhou . 2016. Distance bounding protocol for RFID Systems . In International Conference on Wireless Algorithms. Systems and Application. Cham Y. Zhou and J. Zhou. 2016. Distance bounding protocol for RFID Systems. In International Conference on Wireless Algorithms. Systems and Application. Cham"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2707"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1136-y"},{"key":"e_1_3_2_1_18_1","volume-title":"Lynn Bunn and Ted Phillips","author":"Karygiannis Tom","year":"2007","unstructured":"Tom Karygiannis , Bernard Eydt , Greg Barber , Lynn Bunn and Ted Phillips . 2007 . Guidelines for securing radio frequency identification (RFID) systems. NIST Special publication 80 Tom Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn and Ted Phillips. 2007. Guidelines for securing radio frequency identification (RFID) systems. NIST Special publication 80"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Shih Dong\u2010Her P. Sun and B. Lin. 2005. Securing industry\u2010wide EPCglobal network with WS\u2010security. Industrial Management & Data Systems Shih Dong\u2010Her P. Sun and B. Lin. 2005. Securing industry\u2010wide EPCglobal network with WS\u2010security. Industrial Management & Data Systems","DOI":"10.1108\/02635570510616148"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference","author":"Bart Preneel Dave","year":"2005","unstructured":"Singelee, Dave and Bart Preneel . 2005 . Location verification using secure distance bounding protocols . IEEE International Conference on Mobile Adhoc and Sensor Systems Conference Singelee, Dave and Bart Preneel. 2005. Location verification using secure distance bounding protocols. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference"},{"volume-title":"First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)","author":"Kuhn Gerhard","key":"e_1_3_2_1_21_1","unstructured":"Hancke, Gerhard P and Markus G. Kuhn . 2005. An RFID distance bounding protocol , First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) . IEEE Hancke, Gerhard P and Markus G. Kuhn. 2005. An RFID distance bounding protocol, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). IEEE"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Hutter Michael & Schmidt Jorn-Marc & Plos Thomas. 2009. Contact-Based Fault Injections and Power Analysis on RFID Tags. 409 - 412. 10.1109\/ECCTD.2009.5275012 Hutter Michael & Schmidt Jorn-Marc & Plos Thomas. 2009. Contact-Based Fault Injections and Power Analysis on RFID Tags. 409 - 412. 10.1109\/ECCTD.2009.5275012","DOI":"10.1109\/ECCTD.2009.5275012"},{"key":"e_1_3_2_1_23_1","unstructured":"Y. Oren and A. Shamir. 2006. Remote Power Analysis of RFID Tags. Master's thesis Weizmann Institute of Science Rehovot. Israel Y. Oren and A. Shamir. 2006. Remote Power Analysis of RFID Tags. Master's thesis Weizmann Institute of Science Rehovot. Israel"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Mitrokotsa Aikaterini & Rieback Melanie & Tanenbaum Andrew. 2008. Classification of RFID Attacks. 73-86 Mitrokotsa Aikaterini & Rieback Melanie & Tanenbaum Andrew. 2008. Classification of RFID Attacks. 73-86","DOI":"10.5220\/0001738800730086"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":25,"alternative-id":["10.1145\/3508072.3508095","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508095","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}