{"id":"https://openalex.org/W2786774680","doi":"https://doi.org/10.7287/peerj.preprints.26504v1","title":"Internet of Things Security: A review on the RFID contactless security protocols","display_name":"Internet of Things Security: A review on the RFID contactless security protocols","publication_year":2018,"publication_date":"2018-02-11","ids":{"openalex":"https://openalex.org/W2786774680","doi":"https://doi.org/10.7287/peerj.preprints.26504v1","mag":"2786774680"},"language":"en","primary_location":{"id":"doi:10.7287/peerj.preprints.26504v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26504v1","pdf_url":"https://peerj.com/preprints/26504.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://peerj.com/preprints/26504.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013322986","display_name":"Natalie Outteridge","orcid":null},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Natalie Outteridge","raw_affiliation_strings":["School of Computing, Mathematics & Digital Technology, The Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics & Digital Technology, The Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013322986"],"corresponding_institution_ids":["https://openalex.org/I11983389"],"apc_list":null,"apc_paid":null,"fwci":0.2057,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53866729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9466000199317932,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.8102993965148926},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7890845537185669},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.7880316972732544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6829938888549805},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.5671934485435486},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.491984099149704},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.46296194195747375},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4496576488018036},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42042064666748047},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41035011410713196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3702905476093292},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37014245986938477},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20565399527549744},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17863592505455017}],"concepts":[{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.8102993965148926},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7890845537185669},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.7880316972732544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6829938888549805},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.5671934485435486},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.491984099149704},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.46296194195747375},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4496576488018036},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42042064666748047},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41035011410713196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3702905476093292},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37014245986938477},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20565399527549744},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17863592505455017},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7287/peerj.preprints.26504v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26504v1","pdf_url":"https://peerj.com/preprints/26504.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"}],"best_oa_location":{"id":"doi:10.7287/peerj.preprints.26504v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26504v1","pdf_url":"https://peerj.com/preprints/26504.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2786774680.pdf","grobid_xml":"https://content.openalex.org/works/W2786774680.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2177149248","https://openalex.org/W3142412886","https://openalex.org/W4240445323","https://openalex.org/W2168363711","https://openalex.org/W3152715454","https://openalex.org/W2388172203","https://openalex.org/W92527937","https://openalex.org/W4287627648","https://openalex.org/W2765317965","https://openalex.org/W3045206653"],"abstract_inverted_index":{"The":[0,46],"advancement":[1],"of":[2,10,31,59,90,94,105],"technology":[3,51],"that":[4],"have":[5,37],"been":[6],"produced":[7],"for":[8],"Internet":[9],"Things":[11],"(IoT)":[12],"security":[13,33,44],"has":[14,23,52],"grown":[15],"significantly":[16],"and":[17,71,103,107],"exponentially":[18],"over":[19],"the":[20,29,42,57,65,88,92,101,112],"years.":[21],"This":[22,80],"caused":[24],"a":[25,109],"major":[26],"impact":[27],"in":[28,56,96],"world":[30,58],"IoT":[32],"as":[34],"technological":[35],"companies":[36],"to":[38,64,74,77,111],"keep":[39],"up":[40],"with":[41],"ever-changing":[43],"protocols.":[45],"Radio":[47],"Frequency":[48],"Identification":[49],"(RFID)":[50],"recently":[53],"gained":[54],"popularity":[55],"IoT,":[60],"this":[61],"is":[62],"due":[63],"RFID":[66,95,106,113],"chips":[67],"involvement":[68],"within":[69],"credit":[70],"debit":[72],"cards":[73],"allow":[75],"them":[76],"become":[78],"contactless.":[79,114],"survey":[81],"will":[82],"produce":[83],"an":[84],"in-depth":[85],"discussion":[86],"about":[87],"background":[89],"RFID,":[91],"relevance":[93],"today's":[97],"society,":[98],"related":[99],"work,":[100],"advantages":[102],"disadvantages":[104],"finally":[108],"solution":[110]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
