How are the attacks impacting the applications and the other way around?
Survey on Radio Frequency Identification Security and Attacks
Received a rejection of scientific paper and need to edit it according to the reviewers’ comments:
1.The paper presents a review of the uses of RFID in the healthcare sector. Since it is a review paper,expected to see more related references that guide the reader in understanding the current uses of RFID. Moreover,strongly recommend that the paper be reviewed for English editing and technical writing. Some sections, for example, have very long sentences. Figures are not referred to in the text. Also, were these figures made by the authors? as did not find any reference to them.
2.Find that the paper is not cohesive. Do not see any connections between the systematic review and the attacks. How are the attacks impacting the applications and the other way around?
3.The systematic review must be expanded. First, if it is systematic, it is necessary to describe how the review was conducted and the decisions that were made to select to papers. Also, it seems to me that there should be way more papers describing RFID applications than the ones described here. This is fine, but the authors should make this clear. First, rather than “systematic”,would call it “towards a systematic review”. Second,think it is interesting to provide an idea of how many papers (if any) are estimated to be excluded from this review. Third, the authors should identify the venues that are more interesting.
4. Regarding the attacks, their description is very shallow and do not understand exactly why these attacks are described. Think it is interesting to present the attacks and survey papers that aim to solve/mitigate them,but this is not in the current draft.
5. Survey paper – only 19 references.
This paper needs work to make it a true survey.
Must be expanded.
6. his paper is a survey of RFID(what is RFID and its applications in various domains) and RFID attacks. Survey is acceptable for conferences,but this survey is somewhat weak regarding the discussion on dealing with the attacks.
7. The figures that are supposed to illustrate how the attacks work, but none of the figures was referred to in the text of the paper. Figure 3 is actually a table, but no explanation about the columns and the 5 difference schemes.
8. No discussion on the approaches to prevent these attacks nor to solve problems caused by the attacks after they have occurred. The only place that mentioned attack prevention is a very simple sentence in the Conclusion (i.e. to use encryption) that is for general network security without mentioning anything specially for RFID security.
9. The paper presents a cursory survey on rfid security and possible attacks. There is no novel research contribution. The paper formatting is very strange and suggests little care from the authors’ side.