@book {Maarof2018105, title = {Security in the internet of things}, series = {Security and Privacy in Smart Sensor Networks}, year = {2018}, pages = {105-121}, doi = {10.4018/978-1-5225-5736-4.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049817262\&doi=10.4018\%2f978-1-5225-5736-4.ch006\&partnerID=40\&md5=80e4b7c3b0310d29dc82712e2dc2e6bc}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference {Maarof201411, title = {Security analysis of low cost RFID systems}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 2}, pages = {11-16}, abstract = {RFID technology attracts strong interest worldwide; it provides a means for automatic identification of objects and is regarded as an indispensable part in the vision of the Internet of things. With the aid of RFID systems, life shall become more convenient and businesses shall become more productive. The low cost RFID technology faces serious security and privacy threats, wireless communication and cost-down consideration on RFID systems are the two main factors that cause these security threats. In order to comply with the resource constraint, a few new authentication protocols with lightweight encryptions are invented to fit the physical limitation of a passive tag. However, those proposed schemes cannot provide enough security level in general; more specifically, they cannot prevent all major or general attacks such as eavesdropping, tracking, replay attack and Denial of Service, and preserve the forward secrecy of tagged object at the same time. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107902}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949928462\&doi=10.1109\%2fWCCCS.2014.7107902\&partnerID=40\&md5=6a46bc68b72d6d71ccd82de1c152cc52}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} }