Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2007
As Radio Frequency Identification (RFID) technology becomes pervasive in our lives, literally woven into the fabric of our society, there exists the danger to personal privacy, loss of anonymity, and violation of location privacy to all individuals. Even cash, which offers true anonymity for consumers, may be threatened by RFID technology.
2010
Every day, people interact directly with a Radio Frequency Identification (RFID) device (tag), buying a product or accessing some desired place. The tag can then be interrogated via radio waves by an RFID reader to return a small amount of information, such as an identification code or personal data. Also, the RFID technology is very useful for supplying chain management, item tracking and other areas. At the same time, the RFID technology raises privacy and security issues. For example, applying RFID tags to individual items raises the possibility that the movement of these items can be tracked, or that individuals can be scanned to learn what items they carry. Many other examples can be named to illustrate problems arising from undesired uses of the RFID data. This paper presents some issues that can be very helpful for overcoming the above mentioned problems.
Cryptographic Hardware and Embedded Systems - CHES 2002, 2003
The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems is that computation resources are very limited, and all aspects of the RFID system are connected to each other. Understanding these connections and the resulting design trade-offs is an important prerequisite to effectively answering the challenges of security and privacy in low-cost RFID systems.
2005
RFID has recently received a lot of attention as an augmentation technology in manufacturing, SCM and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organizations. This paper gives an overview of all types of RFID privacy and security problems and its countermeasures.
— This article surveys recent technical research on the problems of privacy and security for RFID (Radio Frequency IDentification). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years – and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings and even the bodies of consumers. This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. While geared toward the non-specialist, the survey may also serve as a reference for specialist readers. A condensed version of this survey will appear in the IEEE Journal on Selected Areas in Communication (J-SAC) in 2006.
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technology in history. This can have huge security implications. The present article surveys the most important technical security challenges of RFID systems. We first provide a brief summary of the most relevant standards related to this technology. Next, we present an overview about the state of the art on RFID security, addressing both the functional aspects and the security risks and threats associated to its use. Finally, we analyze the main security solutions proposed until date.
2000
In the implementation of Radio Frequency Identification (RFID) systems concerns have been raised regarding information security and violations of end-user privacy. There is a large collection of literature available on efficient and inexpensive cryptographic engines, but they are still extravagant solutions for low cost RFID systems. Security and privacy provided by low cost RFID is both directly and indirectly limited by a number of factors that are unique to low cost RFID. This paper examines security and privacy issues regarding RFID and presents the challenges that arise in view of the unique environment presented by low cost RFID systems.
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06, 2006
Abstract: - Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond the capabilities of any of the tools available ...
Radio Frequency Identification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this work we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her control, authenticate requests, release tags, transfer them to new owners, and so on. This is the first framework that unifies previous attempts and presents detailed protocol.
ISSE 2009 Securing Electronic Business Processes, 2010
Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.
Computer Science & Information Technology ( CS & IT ), 2013
Information security and privacy" is one of the major challenges in the communication world of IT as each and every information we pass need to be secured enough to the extent that it doesn't hurt anyone's privacy. In trace and track world RFID play a pivotal role. We cannot track people as it causes a privacy risk. Migration of data to cloud also comes under threat as many things cannot be control over there. A trusted database is needed which can maintain and enforce the privacy policy. In order to cater all these requirements, a secure, cheap and complex computation encryption-decryption algorithm is required to meet this challenge. This paper is based on the research survey of previous and current security and privacy techniques used for securing RFID tag and reader communication and their impact on real world.
IEEE Potentials, 2011
Radio Frequency Identification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet to be explored. As RFID is that new paradigm which is very vulnerable to unauthorized attacks thus strict security measures have to be adopted. Laws have been made whose violation may result in total chaos only. The system using RFID needs proper and efficient scanning. RFID technology is mainly evidently foreseeable due to low cost RFID tags but sometimes cost is paid in the form of compromised privacy. Within less than a decade, quite a number of research papers that happens to deal the security issues RFID technology is facing, have appeared. In this paper we attempt to summarize current research works that has been done in the area of RFID security right from where it started and some of their open issues are also discussed. The paper is finally concluded with some suggestions for future work. Firstly, we outline some of the research work done so far, security risks faced to RFID and then we review some of the major applications of RFID.
Advances in Science, Technology and Engineering Systems Journal, 2017
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.
2006
RFID technology has been available for more than fifty years. However It has only been recently that the prices of RFID devices have fallen to the point where these devices can be used as a "throwaway" inventory. This presents numerous opportunities along with innumerable risks. A lot of research is being done to suggest methods which will ensure secure communications in RFID systems. The objective of this paper is to present an introduction to RFID technology, its current and future applications, study various potential threats to security and privacy, and give an introduction to some suggested protocols for efficient security mechanisms.
2006 Fortieth Asilomar Conference on Signals, Systems and Computers, 2006
This paper provides a survey on radio frequency identification (RFID) technology. Initially RFID tags were developed to eventually replace barcodes in supply chains. Their advantages are that they can be read wirelessly and without line of sight, contain more information than barcodes, and are more robust. The paper describes the current technology, including the frequency ranges used and standards. With the increasing ubiquity of RFID tags, however, privacy became a concern. The paper outlines possible attacks that can violate one's privacy and it also describes counter measures. The RFID technology did not stop at item-level tagging. The paper also presents current research that focuses on locating and tracking labeled object that move. Since the uses for RFID tags are so widespread, there is a large interest in lowering the costs for producing them. It turns out that printing tags might become a viable alternative to traditional production. The paper reviews the current progress.
2009
Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while using the reader either as the focal point of all communication or as a relay for tag-to-tag communication. In this scenario, the security of the computation has to be guaranteed while also privacy of individual tags must be protected. In a payment scenario, tags are used as electronic wallets similar to the notions of traditional electronic cash. Payment must be secured against malicious spending, and the privacy of tags and their payments must be protected.
2000
Low cost Radio Frequency Identification (RFID) systems are increasingly being deployed in industry and commerce. These contactless devices have raised public concern regarding violation of privacy and information security. There is a growing need in the RFID community to discover and develop techniques and methods to overcome several problems posed by the above-mentioned concerns. This paper presents proposals on feasible security mechanisms for low cost RFID systems and analyses them from both security and privacy points of view.
2000
Radio Frequency Identification (RFID) is a technology that allows for automatic and remote identification of objects and is currently discussed as one of the most important technical enablers of Pervasive Computing, boosting economic processes and home computing applications. However, as far as privacy is concerned RFID is still in its 'kindershoes'. A public outcry as to the privacy and security
Applications, Technology, Security, and Privacy, 2008
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.